4.6 Review

Hardware Security of Fog End-Devices for the Internet of Things

期刊

SENSORS
卷 20, 期 20, 页码 -

出版社

MDPI
DOI: 10.3390/s20205729

关键词

cloud; edge; fog; IoT; IIoT; privacy; protection; HSM; PUF; TRM; SoC

资金

  1. Knowledge foundation (KKS) under grant research profile NIIT
  2. Swedish Civil Contingencies Agency (MSB)
  3. EU Horizon 2020 Framework Program [773717]
  4. Swedish Foundation for International Cooperation in Research and Higher Education (STINT) Initiation Grants program [IB2019-8185]

向作者/读者索取更多资源

The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据