Proposed Embedded Security Framework For
Proposed Embedded Security Framework For
Proposed Embedded Security Framework For
IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security
requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies
throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially in the area of IoT.
Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to
provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful
breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy
consumption and memory requirements of the devices. Finally, this paper proposes an embedded security framework as a feature of
software/hardware co-design methodology.
A. Physical Attacks
These types of attacks tamper with the hardware
components and are relatively harder to perform because it
requires expensive material. Some examples are de-packaging
of chip, layout reconstruction, micro-probing, and particle
beam techniques.
B. Side Channel attacks
These attacks are based on “side channel Information” that
can be retrieved from the encryption device that is neither the Fig. 3. Security concerns for IOT
plaintext to be encrypted nor the ciphertext resulting from the 1. User identification: It refers to the process of validating
encryption process. Encryption devices produce timing users before allowing them to use the system.
information that is easily measurable, radiation of various 2. Tamper resistance: It refers to the desire to maintain these
sorts, power consumption statistics, and more. Side channel security requirements even when the device falls into the
attacks makes use of some or all of this information to recover hands of malicious parties, and can be physically or logically
the key the device is using. It is based on the fact that logic probed.
operations have physical characteristics that depend on the 3. Secure execution environment: It refers to a secure,
input data. Examples of side channel information are timing managed-code, runtime environment designed to protect
attacks, power analysis attacks, fault analysis attacks, against deviant applications.
electromagnetic attacks, environmental attacks[3]. 4. Secure content: Content security or Digital Rights
Management (DRM) protects the rights of the digital content
C. Cryptanalysis attacks
used in the system.
These attacks are focused on the ciphertext and they try to 5. Secure network access: This provides a network
break the encryption, i.e. find the encryption key to obtain the connection or service access only if the device is authorized.
plaintext. Examples of cryptanalysis attacks include 6. Secure data communication: It includes authenticating
Ciphertext-only attack, Known-plaintext attack, Chosen- communicating peers, ensuring confidentiality and integrity of
plaintext attack, Man-in-the-middle attack, etc. communicated data, preventing repudiation of a
D. Software Attacks communication transaction, and protecting the identity of
Software Attacks are the major source of security communicating entities.
vulnerabilities in any system. Software attacks exploit 7. Identity Management: It is broad administrative area that
implementation vulnerabilities in the system through its own deals with identifying individuals / things in a system and
communication interface. This kind of attack includes controlling their access to resources within that system by
exploiting buffer overflows and using trojan horse programs, associating user rights and restrictions with the established
worms or viruses to deliberately inject malicious code into the identity.
system. 8. Secure storage: This involves confidentiality and
integrity of sensitive information stored in the system.
3
Computational time
Energy Efficiency
run across all platforms will become exceedingly difficult Existing solutions[8-14]/ Comparison
Side-channel
HW-attack
Parameters
SW-attack
which raises the need for standard interoperable security
Flexible
cost
protocols.
to communication and cryptographic computations. birth to the death of system. After discovering the sources and
Secure operating systems: Rich operating systems with a the reasons of vulnerabilities, safeguards should be embedded
secure kernel which will ensure a secure communication in the design methodology. An embedded security framework
inside the processor by providing secure runtime execution and architecture is dependent on precise definitions of
environment, secure booting, secure content, etc. parameters like resource constraints, network specification
Future application Areas: Understanding the technical, (protocols, throughput, topology, services, etc...) and system
economical, social context of a given application area, in order specification (protocols, device size, service which are
to develop security solutions which are appropriate and managed, multi-rate specification, etc.). This will provide the
acceptable. necessary information to define the boundaries between the
Secure Storage: Protect the sensitive information stored in secure and insecure part of the system (data and hardware
RAM / ROM and secondary storage. levels). Proper system-level study will enable the selection of
the candidate solutions for the hardware and software parts.
Following figure 6 illustrates the embedded security These candidates will be used, together with the
architecture. specifications, as inputs for the hardware/software co-design
methodology which will lead to a security framework and
architecture for IoT system.
REFERENCES
[1]. Rolf H. Weber , "Internet of Things – New security and privacy
challenges", Computer Law & Security Review, Volume 26, Issue 1,
January 2010, Pages 23-30
[2]. Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady ,
“Security in embedded systems: Design challenges ” ,August 2004 ,
Transactions on Embedded Computing Systems (TECS) , Volume 3
Issue 3 , ACM
[3]. Hagai Bar-El ,”An Introduction to Side Channel Attacks “ , White
paper,Discretix Technologies limited,
[4]. Christof Paar, André Weimerskirch, “Embedded security in a pervasive
world” , Information Security Technical Report, 2007 – Elsevier ,
Volume 12, Issue 3, 2007, Pages 155-161.
[5]. Matthew Eby, Jan Werner, Gabor Karsai, Akos Ledeczi, "Embedded
systems security co-design" , April 2007, SIGBED Review , Volume 4
Issue 2 ,Publisher: ACM
Fig. 6. Embedded Security Framework and architecture [6]. Gebotys, C.H.; Tiu, C.C.; Chen, X., "A countermeasure for EM attack
of a wireless PDA," Information Technology: Coding and Computing,
The architecture can be divided into hardware and software 2005. ITCC 2005. International Conference on , vol.1, no., pp. 544-549
Vol. 1, 4-6 April 2005
level with lightweight standardized protocols supporting at the [7]. Tiri, K. and Verbauwhede, “Design Method for Constant Power
physical and MAC layer. The level of security within the Consumption of Differential Logic Circuits”, In Proceedings of the
device will vary depending on the nature of the protected Conference on Design, Automation and Test in Europe - Volume 1
(March 07 - 11, 2005). Design, Automation, and Test in Europe. IEEE
content and kind of application. The architecture should Computer Society, Washington, DC, 628-633.
provide physical protection to secret keys by keeping the [8]. T. Kerins, W.P. Marnane E.M. Popovici: An FPGA Implementation of
components like secure ROM, which is handling the secret a Flexible Secure Elliptic Curve Cryptography Processor. Distinguished
Paper. International Workshop on Applied Reconfigurable Computing
keys, inside the secure SoC. The Secure Bootloader should ARC 2005, Proceedings, pp.22-30, IADIS press.
ensure that the device boots up with the genuine OS or [9]. Murphy, Gerard; Keeshan, Aidan; Agarwal, Rachit; Popovici,
firmware with right process privileges. Secure ROM, secure Emanuel,“Hardware - Software Implementation of Public-Key
Cryptography for Wireless Sensor Networks ”, Irish Signals and
runtime execution environment, secure memory management Systems Conference, 2006. IET , 28-30 June 2006 Page(s):463 – 468.
unit are the prime focus for inbuilt security. Also rich [10]. Wilson P, Frey A, Mihm T, Kershaw D, Alves T., "Implementing
operating system with necessary security functionality, secure Embedded Security on Dual-Virtual-CPU Systems" , Design & Test of
kernel interface and compatible standardized security Computers, IEEE Volume 24, Issue 6, Nov.-Dec. 2007
[11]. Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Eduardo
protocols for IoT system will contribute towards the secure Wanderley, Russell Tessier, Wayne Burleson, "A security approach for
security architecture and framework for IoT. off-chip memory in embedded microprocessor systems",
Microprocessors and Microsystems, Volume 33, Issue 1, February
2009, Pages 37-45
IX. CONCLUSION [12]. Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha, “A
Embedded Security for IoT will be crucial and important compiler-hardware approach to software protection for embedded
systems”, Computers and Electrical Engineering 35 (2009) 315–328,
with strong security mechanisms which will prevent damages 2008 Elsevier Ltd.
and economical losses offering new business opportunities. [13]. Fons, M.; Fons, F.; Canto, E.;"Embedded security: New trends in
However, sound security solutions are not attained easily. personal recognition systems"; Microelectronics and Electronics
Conference, 2007. RME. Ph.D. Research in 2-5 July 2007.
There are many challenges that should be defied. A sound [14]. Saputra, H.; Ozturk, O.; Vijaykrishnan, N.; Kandemir, M.; Brooks,
solution considers the security from the beginning i.e. from R.;"A data-driven approach for embedded security" ; VLSI, 2005.
design to implementation, to detect the vulnerabilities from the Proceedings. IEEE Computer Society Annual Symposium on 11-12
May 2005 Page(s):104 - 109.