首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things
【2h】

State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things

机译:基于最先进的软件遥控证明:机会和事物互联网的开放问题

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-connected devices which are revolutionizing many domains, such as healthcare, transportation, smart cities, to mention only a few. Along with the unprecedented new opportunities, the IoT revolution is creating an enormous attack surface for potential sophisticated cyber attacks. In this context, Remote Attestation (RA) has gained wide interest as an important security technique to remotely detect adversarial presence and assure the legitimate state of an IoT device. While many RA approaches proposed in the literature make different assumptions regarding the architecture of IoT devices and adversary capabilities, most typical RA schemes rely on minimal Root of Trust by leveraging hardware that guarantees code and memory isolation. However, the presence of a specialized hardware is not always a realistic assumption, for instance, in the context of legacy IoT devices and resource-constrained IoT devices. In this paper, we survey and analyze existing software-based RA schemes (i.e., RA schemes not relying on specialized hardware components) through the lens of IoT. In particular, we provide a comprehensive overview of their design characteristics and security capabilities, analyzing their advantages and disadvantages. Finally, we discuss the opportunities that these RA schemes bring in attesting legacy and resource-constrained IoT devices, along with open research issues.
机译:事物互联网(物联网)生态系统包括数十亿个异构互联网连接的设备,这些设备正在彻底改变许多域,例如医疗保健,运输,智能城市,仅提及少数几个。随着前所未有的新机会,物联网革命正在为潜在的复杂网络攻击创造一个巨大的攻击面。在这种情况下,远程证明(RA)作为远程检测对抗性存在并确保物联网设备的合法状态的重要安全技术获得了广泛的兴趣。虽然文献中提出的许多RA方法对IOT设备和对手能力的架构进行了不同的假设,但大多数典型的RA计划通过利用保证代码和内存隔离的硬件来依赖最小的信任根。然而,专用硬件的存在并不总是在传统IOT设备的上下文中的现实假设和资源受限约束设备。在本文中,我们通过IOT的镜头调查和分析现有的基于软件的RA方案(即,RA计划,不依赖于专用硬件组件)。特别是,我们全面概述了他们的设计特征和安全能力,分析了它们的优缺点。最后,我们讨论了这些RA计划带来遗留和资源受限的物联网设备的机会以及开放的研究问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号