Hardware security of fog end-devices for the internet of things
Review article, 2020

The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.

IoT

Fog

HSM

Privacy

SoC

Edge

TRM

IIoT

Cloud

Protection

PUF

Author

Ismail Butun

Chalmers, Computer Science and Engineering (Chalmers), Networks and Systems (Chalmers)

Alparslan Sari

University of Delaware

Patrik Österberg

Mid Sweden University

Sensors

14248220 (eISSN)

Vol. 20 20 1-28 5729

Integrated cyber-physical solutions for intelligent distribution grid with high penetration of renewables (UNITED-GRID)

European Commission (EC) (EC/H2020/773717), 2017-11-01 -- 2020-04-30.

Resilient Information and Control Systems (RICS)

Swedish Civil Contingencies Agency (2015-828), 2015-09-01 -- 2020-08-31.

Subject Categories

Computer Engineering

Communication Systems

Computer Systems

DOI

10.3390/s20205729

PubMed

33050165

More information

Latest update

2/25/2022