Trusted Execution Environments for Internet of Things Devices

Author:

Kayyidavazhiyil Abhilash, ,Kaipacheri, Sheena,

Abstract

A trusted execution Environment (TEE) could be a comfy place of a computer’s essential processor that's designed to shield the most touchy information and operations. TEEs are utilized in an expansion of applications, which incorporates cell gadgets, price processing, and statistics safety. The usage of TEEs is becoming increasingly crucial because the amount of touchy records that are processed and stored electronically continues to develop. TEEs can help guard statistics from being accessed or changed with the resource of unauthorised customers, and can also assist ensure that facts aren't always compromised at some stage in transmission. TEEs typically applied the employment of specialized hardware that would offer a better degree of protection than software program-most effective solutions. Hardware-primarily based total TEEs can also offer better overall performance and power efficiency than software-handiest solutions. There are some particular TEE implementations to be had, which incorporates Intel’s TXT, ARM’s TrustZone, and Samsung’s KNOX. Each of those implementations has its very personal strengths and weaknesses, so it's miles more crucial to pick the right TEE on your precise software. reckoning on execution environments are becoming an increasing number of necessities because the amount of touchy facts that's processed and stored electronically continues growing. TEEs can assist shield facts from being accessed or modified by means of way of unauthorized customers, and might also help make sure that records aren't compromised at some point of transmission. TEEs normally implemented the employment of specialized hardware, which will offer a far better degree of protection than software program-only answers. To research how this period has been implemented to the exceptional IoT eventualities, which normally address unique characteristics which incorporate device useful resource constraints, we allotted a scientific literature evaluation.

Publisher

Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP

Subject

Electrical and Electronic Engineering,Mechanics of Materials,Civil and Structural Engineering,General Computer Science

Reference17 articles.

1. A. Gabbai, Kevin Ashton Describes the Internet of Things, Jan. 2015, [online] Available: https://bit.ly/2PvshSn.

2. K. Ashton, That 'Internet of Things' Thing, Jan. 2009, [online] Available: https://www.rfidjournal.com/articles/view?4986.

3. M. Henze, L. Hermerschmidt, D. Kerpen, R. Häußling, B. Rumpe and K. Wehrle, "A comprehensive approach to privacy in the cloud-based Internet of Things", Future Gener. Comput. Syst., vol. 56, pp. 701-718, Mar. 2016.

4. G. Kortuem, F. Kawsar, V. Sundramoorthy and D. Fitton, "Smart objects as building blocks for the Internet of Things", IEEE Internet Comput., vol. 14, no. 1, pp. 44-51, Jan. 2010.

5. S. Weagle, The Rise of IoT Botnet Threats and DDoS Attacks, Jan. 2019, [online] Available: https://bit.ly/2Qs4bIL.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3