Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing

Author:

Litvinov Egor1ORCID,Llumiguano Henry2ORCID,Santofimia Maria J.2ORCID,del Toro Xavier2ORCID,Villanueva Felix J.2ORCID,Rocha Pedro3ORCID

Affiliation:

1. Nokia Corporation, 90620 Oulu, Finland

2. Department of Technology and Information Systems, University of Castilla-La Mancha, 13001 Ciudad Real, Spain

3. CINTESIS@RISE, Department of Behavioural Sciences, Abel Salazar Biomedical Sciences Institute (ICBAS), University of Porto, 4099-002 Porto, Portugal

Abstract

Internet of Things cybersecurity is gaining attention as the number of devices installed in IoT environments is exponentially increasing while the number of attacks successfully addressed to these devices are also proliferating. Security concerns have, however, been mainly addressed to service availability and information integrity and confidentiality. Code integrity, on the other hand, is not receiving proper attention, mainly because of the limited resources of these devices, thus preventing the implementation of advanced protection mechanisms. This situation calls for further research on how traditional mechanisms for code integrity can be adapted to IoT devices. This work presents a mechanism for code integrity in IoT devices based on a virtual-machine approach. A proof-of-concept virtual machine is presented, specially designed for providing code integrity during firmware updates. The proposed approach has been experimentally validated in terms of resource consumption among the most-widespread micro-controller units. The obtained results demonstrate the feasibility of this robust mechanism for code integrity.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference28 articles.

1. Enabling smart behavior through automatic service composition for Internet of Things–based Smart Homes;Santofimia;Int. J. Distrib. Sens. Netw.,2018

2. Hilton, S. (2023, March 12). Dyn Analysis Summary of Friday October 21 Attack. Dyn Blog. Available online: https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack.

3. Cybersecurity for cardiac implantable electronic devices: What should you know?;Baranchuk;J. Am. Coll. Cardiol.,2018

4. Takahashi, D. (2017). Insulin Pump Hacker Says Vendor Medtronic is Ignoring Security Risk, Venture Beat. Available online: https://venturebeat.com/business/insulin-pump-hacker-says-vendor-medtronic-is-ignoring-security-risk/.

5. Rockoff, J. (2016). J&J warned insulin pump vulnerable to cyber hacking. Wall Str. J., Available online: https://www.wsj.com/articles/j-j-warns-insulin-pump-vulnerable-to-cyber-hacking-1475610989.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Security Principles in Smart and Agile Cybersecurity for IoT and IIoT Environments;Advances in Information Security, Privacy, and Ethics;2024-06-30

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3