skip to main content
10.1145/2990299.2990301acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
research-article

Embedded virtualization for the design of secure IoT applications

Authors Info & Claims
Published:01 October 2016Publication History

ABSTRACT

Embedded virtualization has emerged as a valuable way to reduce costs, improve software quality, and decrease design time. Additionally, virtualization can enforce the overall system's security from several perspectives. One is security due to separation, where the hypervisor ensures that one domain does not compromise the execution of other domains. At the same time, the advances in the development of IoT applications opened discussions about the security flaws that were introduced by IoT devices. In a few years, billions of these devices will be connected to the cloud exchanging information. This is an opportunity for hackers to exploit their vulnerabilities, endangering applications connected to such devices. At this point, it is inevitable to consider virtualization as a possible approach for IoT security. In this paper we discuss how embedded virtualization could take place on IoT devices as a sound solution for security.

References

  1. ARM. ARM Architecture Reference Manual ARMv7-A and ARMv7-R edition, 2012.Google ScholarGoogle Scholar
  2. A. Celesti, D. Mulfari, M. Fazio, M. Villari, and A. Puliafito. Exploring container virtualization in iot clouds. In 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pages 1--6, May 2016.Google ScholarGoogle ScholarCross RefCross Ref
  3. K. Cheng, Y. Bai, R. Wang, and Y. Ma. Optimizing soft real-time scheduling performance for virtual machines with srt-xen. In Cluster, Cloud and Grid Computing (CCGrid), 2015 15th IEEE/ACM International Symposium on, pages 169--178, May 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T. Cucinotta, G. Anastasi, and L. Abeni. Respecting temporal constraints in virtualised services. In Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International, volume 2, pages 73--78, July 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Freescale. e500mc Core Reference Manual. Technical report, 03 2013.Google ScholarGoogle Scholar
  6. Imagination Technologies Ltd. MIPS32 Architecture for Programmers Volume IV-i: Virtualization Module of the MIPS32 Architecture. Technical report, 12 2013.Google ScholarGoogle Scholar
  7. D. Kozlov, J. Veijalainen, and Y. Ali. Security and privacy threats in iot architectures. In Proceedings of the 7th International Conference on Body Area Networks, BodyNets '12, pages 256--262, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Kraijak and P. Tuwanut. A survey on iot architectures, protocols, applications, security, privacy, real-world implementation and future trends. In 11th WiCOM 2015, pages 1--6, Sept 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan. Internet of things (iot) security: Current status, challenges and prospective measures. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pages 336--341, Dec 2015.Google ScholarGoogle ScholarCross RefCross Ref
  10. Microchip. Pic32mz embedded connectivity with fpu starter kit. http://microchip.wikidot.com/boards:pic32mz-ef, Accessed September 2, 2016.Google ScholarGoogle Scholar
  11. C. Moratelli, S. Filho, and F. Hessel. Hardware-assisted interrupt delivery optimization for virtualized embedded platforms. In 2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), pages 304--307, Dec 2015.Google ScholarGoogle ScholarCross RefCross Ref
  12. D. Muench, M. Paulitsch, and A. Herkersdorf. Temporal separation for hardware-based i/o virtualization for mixed-criticality embedded real-time systems using pcie sr-iov. In Architecture of Computing Systems (ARCS), 2014 27th International Conference on, pages 1--7, Feb 2014.Google ScholarGoogle Scholar
  13. A. Patel, M. Daftedar, M. Shalan, and M. Watheq El-Kharashi. Embedded hypervisor xvisor: A comparative analysis. In Parallel, Distributed and Network-Based Processing (PDP), 2015 23rd Euromicro International Conference on, pages 682--691, March 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. prpl Foundation. Security guidance for critical areas of embedded computing. Web, Available at https://prpl.works/security-guidance/. Accessed at 10 ago., 2016.Google ScholarGoogle Scholar
  15. SysGO. Pikeos 3.3 datasheet, 02 2008.Google ScholarGoogle Scholar
  16. S. Trujillo, A. Crespo, and A. Alonso. Multipartes: Multicore virtualization for mixed-criticality systems. In Digital System Design (DSD), 2013 Euromicro Conference on, pages 260--265, Sept 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Xu, J. B. Wendt, and M. Potkonjak. Security of iot systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, ICCAD '14, pages 417--423, Piscataway, NJ, USA, 2014. IEEE Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Zampiva, C. Moratelli, and F. Hessel. A hypervisor approach with real-time support to the mips m5150 processor. In Quality Electronic Design (ISQED), 2015 16th International Symposium on, pages 495--501, March 2015.Google ScholarGoogle ScholarCross RefCross Ref
  19. D. Zhang, D. Liu, L. Liang, L. Yao, K. Zhong, and Z. Shao. Nv-cfs: Nvram-assisted scheduling optimization for virtualized mobile systems. In High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), pages 802--805, Aug 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Z.-K. Zhang, M. C. Y. Cho, and S. Shieh. Emerging security threats and countermeasures in iot. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pages 1--6, New York, NY, USA, 2015. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Zhou, Z. Ai, J. Yang, Y. Chen, J. Li, Q. Zhou, and K.-C. Li. A hypervisor for mips-based architecture processors - a case study in loongson processors. In International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th, pages 865--872, Nov 2013.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Embedded virtualization for the design of secure IoT applications

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            RSP '16: Proceedings of the 27th International Symposium on Rapid System Prototyping: Shortening the Path from Specification to Prototype
            October 2016
            141 pages
            ISBN:9781450345354
            DOI:10.1145/2990299

            Copyright © 2016 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 October 2016

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Upcoming Conference

            ESWEEK '24
            Twentieth Embedded Systems Week
            September 29 - October 4, 2024
            Raleigh , NC , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader