2020
DOI: 10.1109/access.2020.2975016
|View full text |Cite
|
Sign up to set email alerts
|

Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks

Abstract: Internet of Things (IoT) devices have connected millions of houses around the globe via the internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) have become a serious concern, which affects IoT edge devices (IoT-ED). In this paper, the possibility of the IoT-ED with embedded HT that can cause serious security, privacy, and availability problems to the IoT based Home Area Network (HAN) has been discussed. Conventional network attack detection techniques work at the n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 45 publications
0
4
0
Order By: Relevance
“…On the other hand, ref. [4] argued that having an encrypted data transfer acts as a major factor in enhancing the security of the data. Additionally, using an encrypted form of data ensures data security by keeping the data available to both the sender and user [5].…”
Section: Factors Associated With the Security Of Iot Devices And Networkmentioning
confidence: 99%
“…On the other hand, ref. [4] argued that having an encrypted data transfer acts as a major factor in enhancing the security of the data. Additionally, using an encrypted form of data ensures data security by keeping the data available to both the sender and user [5].…”
Section: Factors Associated With the Security Of Iot Devices And Networkmentioning
confidence: 99%
“…Mazuera-Rozo et al [327] stressed that defining access control policies for smart homes must be made as simple as possible for the smart homeowner to manage users and devices. Muhammad et al [328] proposed a method to detect multiple attacks simultaneously and to distinguish between different types of attacks. Jiang et al [329] developed a system that offers real-time monitoring of indoor environmental conditions, as well as the automatic control of home appliances that meets the demands of smart homes.…”
Section: Smart Environmentsmentioning
confidence: 99%
“…In [39] Mohammed, et al, (2020) has discussed the IoT-ED possibility with implanted HT which provides serious privacy, security, and available issues to the IoT based HAN. Moreover, the traditional network attack detection models have worked the network protocol layers, while the IoT-ED with HT leads to the demonstration of attack at the firmware or/and physical level.…”
Section: A Related Workmentioning
confidence: 99%