Abstract
With the increasing emergence of pervasive electronic devices in our lives, the Internet of Things (IoT) has become a reality with its influence on our day to day activities set to further increase with a projected 50 billion connected devices by the year 2020 [8]. These smart devices and sensors will be found in our homes, our cars, our workplaces, etc., and have the potential to revolutionise how we interact with the world today. The slew of data generated by such a volume of devices necessitates the use of smart, autonomous machine-to-machine (M2M) communications; however, this necessarily poses serious security and privacy issues as we will no longer have direct control over with whom and what our devices communicate. This could potentially open up new attack vectors for criminal hackers to exploit through the use of malicious or tampered IoT devices. Compounding the problem is that to enable the ubiquitous nature of the IoT, the embedded devices themselves are often low-cost, low-power, throwaway units which are restricted both in memory and computing power. Generally, low-cost devices targeted at the IoT space, such as the ARM Cortex-M or the Atmel tinyAVR families of microcontroller units (MCUs), contain little if any embedded security features. Their lightweight nature is such that even highly optimised cryptographic implementations targeted at specific MCU still require a significant timing, and corresponding energy, overhead [9]. Hence, it is clear we need a new approach to securing the IoT. In this chapter, we outline the proposed use of Physical Unclonable Functions (PUFs) for the provision of IoT device security.
Original language | English |
---|---|
Title of host publication | Engineering secure internet of things systems |
Editors | Benjamin Aziz, Alvaro Arenas, Bruno Crispo |
Publisher | Engineering and Technology Publishing |
Pages | 207-228 |
Number of pages | 22 |
ISBN (Electronic) | 9781785610530 |
ISBN (Print) | 9781785610547 |
DOIs | |
Publication status | Published - 01 Jan 2016 |
Bibliographical note
Publisher Copyright:© The Institution of Engineering and Technology 2016. All rights reserved.
Keywords
- ARM Cortex-M
- Atmel tinyAVR
- Attack vectors
- Computing power
- Criminal hackers
- Cryptography
- Data privacy
- Embedded devices
- Embedded security features
- Embedded systems
- Internet of Things
- IoT device privacy
- IoT device security
- IoT space
- Lightweight cryptographic identity solutions
- Low-cost devices
- Malicious IoT devices
- MCU
- Microcontroller units
- Microcontrollers
- Optimised cryptographic implementations
- Pervasive electronic devices
- Physical unclonable functions
- Power aware computing
- Smart autonomous machine-to-machine communications
- Smart devices
- Smart sensors
- Tampered IoT devices
- Ubiquitous computing
ASJC Scopus subject areas
- General Engineering