Design of Security Chips in the IoT Ecosystem

Authors

  • Jiayi Zhang

DOI:

https://doi.org/10.54097/hset.v70i.12478

Keywords:

Security chips in the IoT, TEE, HSM, TPM.

Abstract

With the rapid growth of IoT devices, security issues are becoming increasingly prominent. The main research object of this article is the Internet of Things security chip. In response to the difficulties faced by the current Internet of Things security and the importance of Internet of Things security, this article mainly introduces the basic design principles of Internet of Things security chips, and provides a detailed introduction to the structures and applications of three classic models: TEE, HSM, and TPM. In addition, comparative analysis was conducted on these models. IoT security is a highly challenging field that requires comprehensive consideration of security issues at different levels and stages. The IoT security chips play a crucial role in ensuring the security and data privacy of IoT devices. In the future, IoT security chips may be combined with emerging technologies such as blockchain, artificial intelligence, and quantum encryption to enhance security and credibility.

Downloads

Download data is not yet available.

References

Diffie W, Hellman M E. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer, 1977, 10(6): 74-84.

Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 1978, 21(2): 120–126.

Kocher P C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (eds) Advances in Cryptology — CRYPTO ’96. CRYPTO 1996. Lecture Notes in Computer Science, vol 1109. Springer, Berlin, Heidelberg.

Katagi M, Moriai S. Lightweight cryptography for the internet of things. Sony Corporation, 2008, 2008: 7-10.

Tsudik G. The Security of Home Automation Protocols. IEEE Computer Society, 2016.

Yang W, Zhou W, Zhao S et al. Survey of IoT security research: threats, detection and defense. Journal on Communications, 2021, 42(8): 188-205.

Mrabet H, Belguith S, Alhomoud A, et al. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors (Basel), 2020, 20: 13.

Mohammed A, Issa T, Isaac W. Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique. Internet of Things, 2019, 7.

Clements A A, Almakhdhub N S, Saab K S, et al. Protecting bare-metal embedded systems with privilege overlays. 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017: 289-303.

Kim C H, Kim T, Choi H, et al. Securing Real-Time Microcontroller Systems through Customized Memory View Switching. NDSS, 2018.

Jauernig P, Sadeghi A R, Stapf E. Trusted Execution Environments: Properties, Applications, and Challenges. IEEE Security & Privacy, 2020, 18(2): 56-60.

Goyal S, Mathew R. Security issues in IOT computing. Proceedings of the International Conference on Computer Networks, Big Data and IoT, Springer, Madurai, India, 2020.

Mohammad F, Ikram A, Muhammad S K, Su M K, Junsu K. Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges. Complexity, 2020, 2020: 6612919.

Deepthi S L M, Yamini G, Srinivasarao P, Sivaramakrishna K. A novel and cost-effective approach for privacy. International Journal of Advanced Computer Communications and Control, 2014, 2: 3.

Canedo E D, Junior R T, Albuquerque R O. Trust model for reliable file exchange in IOT computing. International Journal of Computer Science and Information Technology (IJCSIT), 2012, 4: 1.

TCG. TCG Specification Architecture Overview. TCG Specification Revision 1.4, The Trusted Computing Group, Portland, OR, USA, 2007.

Sabt M, Achemlal M, Bouabdallah A. Trusted Execution Environment: What It is, and What It is Not. 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 2015: 57-64,

Arfaoui G, Gharout S, Traoré J. Trusted Execution Environments: A Look under the Hood. 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, Oxford, UK, 2014: 259-266.

Downloads

Published

15-11-2023

How to Cite

Zhang, J. (2023). Design of Security Chips in the IoT Ecosystem. Highlights in Science, Engineering and Technology, 70, 306-315. https://doi.org/10.54097/hset.v70i.12478