2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS) 2019
DOI: 10.1109/dcoss.2019.00054
|View full text |Cite
|
Sign up to set email alerts
|

Performance of Secure Boot in Embedded Systems

Abstract: With the proliferation of the Internet of Things (IoT), the need to prioritize the overall system security is more imperative than ever. The IoT will profoundly change the established usage patterns of embedded systems, where devices traditionally operate in relative isolation. Internet connectivity brought by the IoT exposes such previously isolated internal device structures to cyber-attacks through the Internet, which opens new attack vectors and vulnerabilities. For example, a malicious user can modify the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…Modern chips provide several security features to prevent side‐channel attacks by implementing different cryptographic techniques. Booting attacks : Security procedures are not enabled at the boot stage so IoT edge devices can be vulnerable to several attacks. The attacker can capture the node during the reboot process by taking the advantage of these vulnerabilities 55 . To prevent this attack boot process must be secure in these devices. Sleep deprivation : In such types of attacks, the intruder tries to drain the power sources of edge devices.…”
Section: Security Issues In the Industrial Internet Of Thingsmentioning
confidence: 99%
“…Modern chips provide several security features to prevent side‐channel attacks by implementing different cryptographic techniques. Booting attacks : Security procedures are not enabled at the boot stage so IoT edge devices can be vulnerable to several attacks. The attacker can capture the node during the reboot process by taking the advantage of these vulnerabilities 55 . To prevent this attack boot process must be secure in these devices. Sleep deprivation : In such types of attacks, the intruder tries to drain the power sources of edge devices.…”
Section: Security Issues In the Industrial Internet Of Thingsmentioning
confidence: 99%
“…Implementing secure boot, whether in hardware or software, can introduce performance overheads. This translates to increased area requirements in hardware, while in software, it can lead to increased power consumption [32].…”
Section: ) Secure Boot With Recoverymentioning
confidence: 99%
“…For example, Profentzas et. al [9] evaluate the overhead of software-based and hardware-based secure boot on embedded platforms, namely, raspberry pi and beaglebone. Their study shows that the secured system presents an increased boot time ranging from 4% to 36%, depending on the technique and algorithms employed.…”
Section: Related Workmentioning
confidence: 99%