ebook img

Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (Chapman & Hall/CRC Internet of Things) PDF

321 Pages·2021·23.093 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (Chapman & Hall/CRC Internet of Things)

Chapman & Hall/CRC Internet of Things SECURITY OF INTERNET OF THINGS NODES CHALLENGES, ATTACKS, AND COUNTERMEASURES Edited by Chinmay Chakraborty, Sree Ranjani Rajendran and Muhammad Habibur Rehman A Chapman & Hall Book Security of Internet of Things Nodes Chapman & Hall/CRC Internet of Things: Data-Centric Intelligent Computing, Informatics, and Communication The role of adaptation, machine learning, computational Intelligence, and data analytics in the field of IoT Systems is becoming increasingly essential and intertwined. The capability of an intelligent system is growing depending upon various self-decision-making algorithms in IoT Devices. IoT based smart systems generate a large amount of data that cannot be processed by traditional data processing algorithms and applications. Hence, this book series involves different computational methods incorporated within the system with the help of Analytics Reasoning, learning methods, Artificial intelligence, and Sense-making in Big Data, which is most concerned in IoT-enabled environment. This series focuses to attract researchers and practitioners who are working in Information Technology and Computer Science in the field of intelligent computing paradigm, Big Data, machine learning, Sensor data, Internet of Things, and data sciences. The main aim of the series is to make available a range of books on all aspects of learning, analytics and advanced intelligent systems and related technologies. This series will cover the theory, research, de- velopment, and applications of learning, computational analytics, data processing, machine learning algorithms, as embedded in the fields of engineering, computer science, and Information Technology. Series Editors Dac-Nhuong Le, Souvik Pal Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures Chinmay Chakraborty, Sree Ranjani Rajendran and Muhammad Habibur Rehman Security of Internet of Things Nodes Challenges, Attacks, and Countermeasures Edited by Chinmay Chakraborty, Sree Ranjani Rajendran, and Muhammad Habibur Rehman First edition published 2021 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 and by CRC Press 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN © 2022 selection and editorial matter, Chinmay Chakraborty, Sree Ranjani Rajendran, Rajat Subhra Chakraborty; individual chapters, the contributors CRC Press is an imprint of Taylor & Francis Group, LLC Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologise to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilised in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www. copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Names: Chakraborty, Chinmay, 1984- editor. | Rajendran, Sree Ranjani, editor. | Rehman, Muhammad Habibur, editor. Title: Security of internet of things nodes : challenges, attacks, and countermeasures / edited by Dr. Chinmay Chakraborty, Dr. Sree Ranjani Rajendran ’ Dr. Muhammad Habibur Rehman. Description: Boca Raton, FL : CRC Press, 2021. | Series: Chapman ’ Hall CRC internet of things | Includes bibliographical references and index. | Summary: “The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level”‐‐ Provided by publisher. Identifiers: LCCN 2021010097 (print) | LCCN 2021010098 (ebook) | ISBN 9780367650490 (hbk) | ISBN 9780367650513 (pbk) | ISBN 9781003127598 (ebk) Subjects: LCSH: Internet of things‐‐Security measures. Classification: LCC TK5105.8857 .S45 2021 (print) | LCC TK5105.8857 (ebook) | DDC 005.8‐‐dc23 LC record available at https://lccn.loc.gov/2021010097 LC ebook record available at https://lccn.loc.gov/2021010098 ISBN: 978-0-367-65049-0 (hbk) ISBN: 978-0-367-65051-3 (pbk) ISBN: 978-1-003-12759-8 (ebk) Typeset in Palatino by MPS Limited, Dehradun Contents Preface............................................................................................................................................vii About the Editors..........................................................................................................................xi 1 Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms............................................................................1 2 Multi-bit True Random Number Generator for IoT Devices using Memristor...............................................................................................................................35 3 Secured Testing of AES Cryptographic ICs for IoT Devices.....................................55 4 Biometric-based Secure Authentication for IoT-Enabled Devices and Applications...................................................................................................................81 5 An Improved Verification Scheme based on User Biometrics.................................107 6 Obfuscation to Mitigate Hardware Attacks in Edge Nodes of IoT System............................................................................................................................125 7 Lightweight Security Solutions for IoT using Physical-Layer-Key Generation............................................................................................................................169 8 Threat and Attack Models in IoT Devices...................................................................185 9 Review on Hardware Attacks and Security Challenges in IoT Edge Nodes..........................................................................................................................211 10 Study of Hardware Attacks on Smart System Design Lab......................................233 11 A Novel Threat Modeling and Attack Analysis for IoT Applications..................263 12 Trust Management in Internet-of-Things Devices.....................................................281 Index.............................................................................................................................................303 v Preface This book covers a wide range of research topics on the security of Internet-of-Things (IoT) nodes. It also covers challenges and countermeasures to mitigate relevant security issues in multiple perspectives. The wide-range coverage of security issues differentiates this book from other relevant publications. The book aims systematically to collect and present quality research and give a wide benefit to a huge community of researchers, educators, practitioners, and industries. IoT is the interconnection of a large number of resource-constrained devices such as sensors, actuators, and nodes that generate large volumes of data. This is then processed into useful actions in areas such as home and building automation, intelligent transportation and connected vehicles, industrial automation, smart healthcare, smart cities, and others. Connected devices are data collectors and data processors. Personal information collected and stored by these devices, such as name, age, health data, location, and more, can help criminals committ identity theft. At the same time, IoT is a growing trend, with a stream of new products hitting the market. Here’s the problem: when one is connected to everything, there are more ways to steal information. That makes users attractive targets for people who want to profit from stolen data. Important challenges remain to fulfil the IoT vision, including data provenance and integrity, trust management, identity management, and privacy. This book aims to describe how software, embedded and hardware security approaches address these security challenges. The devices connected to IoT should be secured from vulnerabilities, like software threats and hardware threats, which can cause the loss of several billions of dollars to semiconductor industries. This book focuses on the security challenges of IoT devices and countermeasures to overcome those vulnerabilities. Also, it highlights the issue of managing trust on IoT nodes to build secured IoT systems. IoT devices should authenticate and identify the correct users; otherwise, unauthorised users may attack the devices. Thus there is a necessity of a system model for the IoT devices to ensure security at the hardware level. The book content is structured into 12 chapters. Chapter 1 discusses robust hologram- based obfuscation technique to enable hardware-level security in IoT nodes. In this approach, two Digital Signal Processing (DSP) designs are merged, such that the functionality of one design is camouflaged in another. This camouflaging is analogous to a security-image hologram, which is the reason this obfuscation technique has been called “hologram-based obfuscation”. The hologram-based obfuscation methodology accepts the scheduled CDFG of two DSP kernel applications as primary inputs and generates an obfuscated common data-path of both DSP kernels. Hologram-based obfuscation affects a larger number of gates compared to other structural obfuscation techniques. Moreover, it achieves a higher area efficiency. However, hologram-based obfuscation is only applicable if two applications have partial similarity in their structure. Chapter 2 focuses on a random number generator that could be useful everywhere, especially in the IoT environment. The authors design a simple but effective CMOS-Memristor- based random number generator, which shows good statistical results in simulations and has low hardware and energy requirements. The proposed architecture harvested the randomness of memristor along with the traditional randomness caused due to manufacturing process variations. In their design, the authors use two identical ring oscillators and compare the delay between them to generate random bits. Such design is more useful where space and energy both are primary concerns. The primary advantage of their design is that they may produce vii viii Preface multiple bits in a single cycle, which significantly enhances the throughput of the random number generator. This can be done easily by tapping numerous nodes of both ring oscillators instead of tapping the nodes at last, as in the case of a single-bit ring oscillator. The authors also modified their architecture and simulated the same design after the removal of the memristor components from the architecture to evidence the difference in statistical randomness in both designs. Chapter 3 discusses cryptographic algorithms used for security purposes in IoT devices. Various side-channel attacks on AES cryptographic ICs are reported from the literature. The chapter also discusses existing countermeasures for securing the scan chain which is typically inserted in the AES cryptographic ICs. It presents design and simulation results of the scan-inserted AES crypto-module. Also, the chapter discusses proposed methods used to enhance the security of the scan chain of the AES crypto- module. It then presents the results and analysis of the implemented crypto-module. The chapter concludes with highlights of the application of security towards the testing architecture of crypto-chips. Chapter 4 discusses biometric-based secure authentication approaches for IoT-enabled devices and applications. The chapter considers the IoT system from the perspectives of a consumer, vendor, and researcher to figure out the present scenario and give future direction to the authentication-related security issues in IoT subsystems. Chapter 5 presents an improved verification scheme based on user biometrics. The purpose of this study is to introduce a novel and well-structured threat-modeling approach which is specifically tailored for IoT devices. Chapter 6 presents countermeasures for hardware security vulnerabilities in IoT devices. The authors discuss the origin of hardware security and highlight the types of security attacks on IoT devices. Also, the authors elaborate on the consequences and challenges of security attacks on IoT nodes. Moreover, the authors present the discussion of various artificial intelligence and machine-learning techniques to countermeasure hardware attacks in IoT devices. Finally, the chapter deals with the implementation of hardware obfuscation for DSP through suitable signal- processing transformations like folding, parallel processing, pipelining, and retiming, to mitigate vulnerability in the computing nodes of IoT systems. Chapter 7 presents lightweight security solutions for IoT using physical-layer-key- generation methods. In this chapter, a secure key- generation scheme from physical layer characteristics is introduced as a possible lightweight security alternative to traditional upper-layer security approaches. The proposed scheme is based on the wiretap channel model; security is achieved by generating keys at both the communicating ends independently based on inherent common channel characteristics like randomness. It is based on the principle of spatial decorrelation and channel reciprocity for identical carrier frequency. Chapter 8 presents threats and attack models in IoT devices. The authors discuss the need for security in IoT devices and present a detailed discussion on IoT architecture. Further, a taxonomy of security threats and attack models is presented for different layers, such as physical layer, data link layer, network layer, transport layer, application layer, and multilayer attacks. Also, various malware attacks and their impact on security objectives is presented. Chapter 9 presents a review of hardware attacks and security challenges in IoT edge nodes. The authors discuss hardware attacks, protection algorithms, secure hardware levels, attacks during the manufacturing process, attacks during design, and sophisticated attacks. Counterfeiting and debug security in IoT edge nodes are mostly Preface ix interlinked with the perception layer in IoT. Challenges in hardware-based IoT designs need a new security architecture, especially in the edge nodes in IoT. The next-generation system-on-chip devices’ security features have the solution for intrinsic hardware security. The open problems such as trade-off between security and power are also discussed broadly. These problems affect the design of secured devices in IoT hardware. Chapter 10 presents a study of hardware attacks on the smart system design lab. This chapter focuses on the simulation of the smart system design lab using an IoT builder, and studies recent attacks related to the physical structure with a future direction towards countermeasures. Chapter 11 presents a novel threat-modeling and analysis approach for IoT applications. The proposed approach consists of a seven-step threat- modeling process. This methodology also addresses the aspects of IoT devices which directly affect the user, which are Privacy threats, Safety threats, and Malfunction threats (PSM). This method increases the performance and effectiveness of threat-modeling, which leads to increased mitigation of the identified threats. The final part of the study presents practical mitigation techniques to eliminate threats in IoT devices. Chapter 12 discusses security-related trust management issues in IoT devices. First, the authors discuss trust management issues to understand the properties of trust and the goals of IoT trust management. The goal of this chapter is also to review various confidence models in the wireless sensor networks (WSN) and other network domains, along with the impact and need for IoT confidence management, trust computing, and IoT management issues. We are sincerely thankful to all the contributors including editors, authors, reviewers, and the CRC staff for supporting and actively contributing to this project. We are also very grateful to the series editors for their feedback on this book.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.