EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices

被引:17
|
作者
Yan, Wenwen [1 ]
Fu, Anmin [1 ]
Mu, Yi [2 ]
Xia, Zhe [3 ]
Yu, Shui [4 ]
Kuang, Boyu [1 ]
机构
[1] Nanjing Univ Sci & Technol, Nanjing, Peoples R China
[2] Fujian Normal Univ, Fuzhou, Peoples R China
[3] Wuhan Univ Technol, Wuhan, Peoples R China
[4] Univ Technol Sydney, Sydney, NSW, Australia
来源
PROCEEDINGS OF THE 2ND INTERNATIONAL ACM WORKSHOP ON SECURITY AND PRIVACY FOR THE INTERNET-OF-THINGS (IOT S&P'19) | 2019年
基金
中国国家自然科学基金;
关键词
IoT; Physical attack; Distribute attestation; Accusation; SECURITY; SCHEME;
D O I
10.1145/3338507.3358614
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The wide deployment of devices in Internet of Things (IoT) not only brings many benefits, but also incurs some security challenges. Remote attestation becomes an attractive method to guarantee the security of IoT devices. Unfortunately, most current attestation schemes only focus on the software attacks, but cannot detect the physical attacks. Several remote attestation schemes resilient to physical attacks still have some drawbacks in energy consumption, runtime, and security. In this paper, we propose an Efficient Attestation scheme resilient to Physical Attacks (EAPA) for IoT devices. We exploit a distributed attestation mode to make the protocol be executed in parallel, which reduces the total runtime to O(1). Besides, we introduce an accusation mechanism to report compromised devices and design a new key update method, ensuring the efficiency and the security of our scheme. Furthermore, we present the security analysis and the performance evaluation of EAPA. The results indicate that EAPA has the lowest energy and runtime consumption compared with related works. Particularly, it shows a constant value in terms of runtime consumption.
引用
收藏
页码:2 / 7
页数:6
相关论文
共 50 条
  • [41] A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms
    Polychronou, Nikolaos-Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2022, 27 (01)
  • [42] A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms
    Polychronou, Nikolaos-Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    ACM Transactions on Design Automation of Electronic Systems, 2021, 27 (01):
  • [43] RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices
    Cao, Jin
    Li, Sheng
    Ma, Ruhui
    Han, Yuxi
    Zhang, Yueyu
    Li, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (19) : 19174 - 19187
  • [44] An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
    Pallavi, Sode
    Narayanan, V. Anantha
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 694 - 698
  • [45] A survey on Classification of Cyber-attacks on IoT and IIoT devices
    Shah, Yash
    Sengupta, Shamik
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 406 - 413
  • [46] Attacks on Resource-Constrained IoT Devices and Security Solutions
    Sharma, Ravi
    Sharma, Nonita
    INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [47] Survey of Snaring Cyber Attacks on IoT Devices with Honeypots and Honeynets
    Oza, Antara D.
    Kumar, Gardas Naresh
    Khorajiya, Moin
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [48] Membership Inference Attacks Against Incremental Learning in IoT Devices
    Zhang, Xianglong
    Zhang, Huanle
    Zhang, Guoming
    Yang, Yanni
    Li, Feng
    Fan, Lisheng
    Huang, Zhijian
    Cheng, Xiuzhen
    Hu, Pengfei
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (05) : 4006 - 4021
  • [49] Towards Attention Mechanism in Detecting Botnet Attacks for IoT Devices
    Chowdhury, Anindya Roy
    Moradi, Hamidreza
    Siddula, Madhuri
    Bhavsar, Mansi
    Roy, Kaushik
    2024 7TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, BIG DATA, COMPUTING AND DATA COMMUNICATION SYSTEMS, ICABCD 2024, 2024,
  • [50] Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices
    Ho, Jun-Won
    IEEE ACCESS, 2018, 6 : 54343 - 54354