A Study of The Advances in Iot Security: September 2018
A Study of The Advances in Iot Security: September 2018
A Study of The Advances in Iot Security: September 2018
net/publication/329408769
CITATIONS READS
4 1,623
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Michael Opoku Agyeman on 26 April 2019.
The devices with lower specifications would be ideal Provider model capture visualiz Analytics
ation
for solutions with smaller tasks which would require less
Amazon web IaaS Yes Yes Yes B. Processing
services Processing on a device is also another constraint to
Google cloud IaaS Yes Yes Yes implementing better security as the process will need to
Windows azure IaaS Yes Yes Yes perform they designed task as well as the security on top of
Rackspace IaaS Yes Yes No which could involve extra gates/transistors and additional
modules to do so.
Open Cloud
Engine yard PaaS Yes No No C. Design
Red hat Open PaaS No No No The design of a device is also a constraint as the size of the
shift device could also be a factor which implements extra modules
Heroku PaaS No Yes Yes / transistors will influence the devices designs size and
Salesforce SaaS No No Yes complexity. These implementations could include cost and
efficacy which could render the solution to be unviable for
Microsoft office SaaS Yes No Yes
deployment. By running simulations, the design can be tested
365 and optimized before building which will reduce the cost and
Google apps SaaS Yes No Yes make the device more efficient.
Zendesk SaaS No No Yes
V. IOT DEVICE EFFICIANTCY
Fig. 6. Cloud Providers
Making a deice more efficient has the benefit of making the
There are some different types of cloud computing which device not need as much power or resources to do the same
suit different solutions Fig. 6. Shows some of the most used job which will as a result decrease the cost.
providers as well as their features.
A. Code compression [3]
1) IaaS Code compression can be used improve a devices
Infrastructure as a Service is a model is where an performance and power consumption when used with
organization/business will rent out specific services needed for encryption and integrity checking to secure processor memory
there solution and is usual a “pay as you go” basis. This means transactions can reduce the memory footprint as well as
you will only pay for what you use unlike other services which providing more information per memory access.
your rent all their services for a fixed price even if you don’t
VI. IOT DEVICE SECURITY
use some.
With this increase in IoT devices we can see many
2) PaaS advantages for both consumers and businesses which
Platform as a service is designed to streamline the streamline a lot of processes, but they can also come with
development process by shifting the system management to some disadvantages. One of these disadvantages is security &
the provider and offering pre-configured components for privacy and having our personal data (banking information /
businesses/organization to use such as Databases/ application location / activity) being transmitted between devices comes
servers / programming languages. with the risk of losing a lot of our privacy. The IoT opens the
doors to many malicious hacks who wish to exploit IoT device
3) SaaS weaknesses to access our personal information to be used for
Software as a service is a cloud service which offers their own gain.
software on demand which are hosted and managed by the A. Authentication
provider and is normally a subscription and can improve
1) Noise Insertion [7]
communication and team collaboration.
Noise cancelation aim to protect the raw data when its
inside the computing unit to avoid an attacker from using side-
IV. IOT DEVICE CONSTRAINTS channel attacks to retrieve the data.
A. Power Consumption The way this method works is by inserting noise using a
Devices are built for a purpose and will be designed based key for sensitive data, although this method isn’t as secure as
on that purpose. And the more a device must do such as encryption it has the benefit of being very lightweight in
store/collection information will add to the power comparison. By selecting key locations where the data noise is
consumption. Adding extra security to a device will require canceled out making it readable you can keep the data secure
more power then the original design, implementation methods in the device and eliminate unnecessary overhead.
such as encryption will increase the power needed to complete
the same operation.
Fig. 7. Noice canselling scheme
REFERENCES
[1] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang and W. Zhao, "A Survey
Fig. 12. Secure sensing overview on Internet of Things: Architecture, Enabling Technologies, Security
and Privacy, and Applications," in IEEE Internet of Things Journal, vol.
By deploying shared memory in the normal world 4, no. 5, pp. 1125-1142, Oct. 2017.
which the secure world can access we are able to share the doi: 10.1109/JIOT.2017.2683200
sensors data when needed. The application can then request to [2] D. A. H. Shehab and O. A. Batarfi, "RCR for preventing stack smashing
attacks bypass stack canaries," 2017 Computing Conference, London,
the secure monitor in the secure world which can then switch United Kingdom, 2017, pp. 795-800.
the application mode from normal world to secure world doi: 10.1109/SAI.2017.8252186
which can verify the request has been authorized. The senor [3] E. W. Netto, R. Vaslin, G. Gogniat and J. P. Diguet, "A Code
data once the request has been verified and checked for any Compression Method to Cope with Security Hardware Overheads,"
potential threats can be written to the shared memory which Computer Architecture and High Performance Computing, 2007. SBAC-
can be read by the normal world. PAD 2007. 19th International Symposium on, Rio Grande do Sul, 2007,
pp. 185-192.
doi: 10.1109/SBAC-PAD.2007.40
2) Secpage [5]
[4] F. Ye and Y. Qian, "A Security Architecture for Networked Internet of Conference on Dependable and Secure Computing, Taipei, 2017, pp.
Things Devices," GLOBECOM 2017 - 2017 IEEE Global 146-152.
Communications Conference, Singapore, 2017, pp. 1-6. doi: 10.1109/DESEC.2017.8073840
doi:10.1109/GLOCOM.2017.8254021 [8] R. Jinnai, A. Inomata, I. Arai and K. Fujikawa, "Proposal of hardware
[5] K. Liang, Y. Feng, J. Wei and W. Guo, "SecPage - A Lightweight device model for IoT endpoint security and its implementation," 2017
Memory Protection Architecture," 2016 IEEE IEEE International Conference on Pervasive Computing and
Trustcom/BigDataSE/ISPA, Tianjin, 2016, pp. 1917-1922. Communications Workshops (PerCom Workshops), Kona, HI, 2017, pp.
doi: 10.1109/TrustCom.2016.0293 91-93.
[6] M. Ye, N. Hu and S. Wei, "Lightweight secure sensing using hardware doi:10.1109/PERCOMW.2017.7917533
isolation," 2016 IEEE SENSORS, Orlando, FL, 2016, pp. 1-3. [9] T. Thangam, G. Gayathri and T. Madhubala, "A novel logic locking
doi: 10.1109/ICSENS.2016.7808904 technique for hardware security," 2017 IEEE International Conference
on Electrical, Instrumentation and Communication Engineering
[7] Y. W. Lee and N. A. Touba, "Computing with obfuscated data in
(ICEICE), Karur, Tamilnadu, India, 2017, pp. 1-7.
arbitrary logic circuits via noise insertion and cancellation," 2017 IEEE
doi: 10.1109/ICEICE.2017.8192439