Abstract
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough. These devices must be protected against sophisticated attacks, especially if the groundwork for the attacks is already laid in devices during design or manufacturing process, such as with HTs. This paper will discuss the stealthy nature of these HT, highlight HT taxonomy and insertion methods, and provide countermeasures.
Subject
Control and Optimization,Computer Networks and Communications,Instrumentation
Reference48 articles.
1. Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare
2. Health IT Securityhttps://healthitsecurity.com/news/healthcare-ransomware-medical-device-security-key-2018-trends
3. Security and privacy in the internet of things
4. A security survey of middleware for the Internet of Things;Fremantle;Peer J.,2015
5. Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques;Hayajneh;IEEE Access,2018
Cited by
60 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献