ABSTRACT
Embedded virtualization has emerged as a valuable way to reduce costs, improve software quality, and decrease design time. Additionally, virtualization can enforce the overall system's security from several perspectives. One is security due to separation, where the hypervisor ensures that one domain does not compromise the execution of other domains. At the same time, the advances in the development of IoT applications opened discussions about the security flaws that were introduced by IoT devices. In a few years, billions of these devices will be connected to the cloud exchanging information. This is an opportunity for hackers to exploit their vulnerabilities, endangering applications connected to such devices. At this point, it is inevitable to consider virtualization as a possible approach for IoT security. In this paper we discuss how embedded virtualization could take place on IoT devices as a sound solution for security.
- ARM. ARM Architecture Reference Manual ARMv7-A and ARMv7-R edition, 2012.Google Scholar
- A. Celesti, D. Mulfari, M. Fazio, M. Villari, and A. Puliafito. Exploring container virtualization in iot clouds. In 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pages 1--6, May 2016.Google ScholarCross Ref
- K. Cheng, Y. Bai, R. Wang, and Y. Ma. Optimizing soft real-time scheduling performance for virtual machines with srt-xen. In Cluster, Cloud and Grid Computing (CCGrid), 2015 15th IEEE/ACM International Symposium on, pages 169--178, May 2015.Google ScholarDigital Library
- T. Cucinotta, G. Anastasi, and L. Abeni. Respecting temporal constraints in virtualised services. In Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International, volume 2, pages 73--78, July 2009. Google ScholarDigital Library
- Freescale. e500mc Core Reference Manual. Technical report, 03 2013.Google Scholar
- Imagination Technologies Ltd. MIPS32 Architecture for Programmers Volume IV-i: Virtualization Module of the MIPS32 Architecture. Technical report, 12 2013.Google Scholar
- D. Kozlov, J. Veijalainen, and Y. Ali. Security and privacy threats in iot architectures. In Proceedings of the 7th International Conference on Body Area Networks, BodyNets '12, pages 256--262, 2012. Google ScholarDigital Library
- S. Kraijak and P. Tuwanut. A survey on iot architectures, protocols, applications, security, privacy, real-world implementation and future trends. In 11th WiCOM 2015, pages 1--6, Sept 2015.Google ScholarCross Ref
- R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan. Internet of things (iot) security: Current status, challenges and prospective measures. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pages 336--341, Dec 2015.Google ScholarCross Ref
- Microchip. Pic32mz embedded connectivity with fpu starter kit. http://microchip.wikidot.com/boards:pic32mz-ef, Accessed September 2, 2016.Google Scholar
- C. Moratelli, S. Filho, and F. Hessel. Hardware-assisted interrupt delivery optimization for virtualized embedded platforms. In 2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), pages 304--307, Dec 2015.Google ScholarCross Ref
- D. Muench, M. Paulitsch, and A. Herkersdorf. Temporal separation for hardware-based i/o virtualization for mixed-criticality embedded real-time systems using pcie sr-iov. In Architecture of Computing Systems (ARCS), 2014 27th International Conference on, pages 1--7, Feb 2014.Google Scholar
- A. Patel, M. Daftedar, M. Shalan, and M. Watheq El-Kharashi. Embedded hypervisor xvisor: A comparative analysis. In Parallel, Distributed and Network-Based Processing (PDP), 2015 23rd Euromicro International Conference on, pages 682--691, March 2015. Google ScholarDigital Library
- prpl Foundation. Security guidance for critical areas of embedded computing. Web, Available at https://prpl.works/security-guidance/. Accessed at 10 ago., 2016.Google Scholar
- SysGO. Pikeos 3.3 datasheet, 02 2008.Google Scholar
- S. Trujillo, A. Crespo, and A. Alonso. Multipartes: Multicore virtualization for mixed-criticality systems. In Digital System Design (DSD), 2013 Euromicro Conference on, pages 260--265, Sept 2013. Google ScholarDigital Library
- T. Xu, J. B. Wendt, and M. Potkonjak. Security of iot systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, ICCAD '14, pages 417--423, Piscataway, NJ, USA, 2014. IEEE Press. Google ScholarDigital Library
- S. Zampiva, C. Moratelli, and F. Hessel. A hypervisor approach with real-time support to the mips m5150 processor. In Quality Electronic Design (ISQED), 2015 16th International Symposium on, pages 495--501, March 2015.Google ScholarCross Ref
- D. Zhang, D. Liu, L. Liang, L. Yao, K. Zhong, and Z. Shao. Nv-cfs: Nvram-assisted scheduling optimization for virtualized mobile systems. In High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), pages 802--805, Aug 2015. Google ScholarDigital Library
- Z.-K. Zhang, M. C. Y. Cho, and S. Shieh. Emerging security threats and countermeasures in iot. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pages 1--6, New York, NY, USA, 2015. ACM. Google ScholarDigital Library
- R. Zhou, Z. Ai, J. Yang, Y. Chen, J. Li, Q. Zhou, and K.-C. Li. A hypervisor for mips-based architecture processors - a case study in loongson processors. In International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th, pages 865--872, Nov 2013.Google ScholarCross Ref
Index Terms
- Embedded virtualization for the design of secure IoT applications
Recommendations
ACRN: a big little hypervisor for IoT development
VEE 2019: Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution EnvironmentsWith the rapid growth of Internet of Things (IoT) and the new emerging IoT computing paradigm such as edge computing, it is prevalent to see that today’s real-time and functional safety devices, particularly in industrial IoT and automotive scenarios, ...
Emerging Security Threats and Countermeasures in IoT
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications SecurityIoT (Internet of Things) diversifies the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level. As sensitive and private ...
Comments