Industry has been the tireless engine of prosperity. The introduction of the Internet acts as a booster to this engine, but, unfortunately, where money goes, crime follows. Big corporations spend a lot of money to secure their IT systems. Although Internet of Things (IoT) devices are not as big nor powerful as these IT systems, their power comes from their vast number. This is even more true if these devices are connected to the Internet. Industrial automation has adopted these IoT devices in the Industrial Internet of Things (IIoT), giving yet another boost to growth. However, the effort to secure IoT devices is nearly bleak in comparison to industry{\textquoteright}s IT infrastructure. This work has the aim to illustrate that this does not need to be the case. In Trusted IoT, existing ideas in academia are translated into concrete use cases. Four use cases are handled: Environmental monitoring, IIoT on Coarse-Grained Reconfigurable Architectures (CGRAs), mobile robots and RISC-V driven unmanned aerial vehicles. Details are provided on the proof-of-concept implementations and results, addressing the security threats identified in the adversary model. Our findings highlight that solutions for securing IoT devices are feasible and achievable by focusing on the architectural level.
Braeken, A, da Silva, B, Segers, L, Knödtel, J, Reichenbach, M, Wulf, C, Pertuz, S, Göhringer, D, Vliegen, J, Rabbani, MM & Mentens, N 2024, Trusted Computing Architectures for IoT Devices. in I Skliarova, P Brox Jiménez, M Véstias & PC Diniz (eds), Applied Reconfigurable Computing. Architectures, Tools, and Applications - 20th International Symposium, ARC 2024, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14553 LNCS, Springer Science and Business Media Deutschland GmbH, pp. 241-254, 20th International Symposium on Applied Reconfigurable Computing, ARC 2024, Aveiro, Portugal, 20/03/24. https://doi.org/10.1007/978-3-031-55673-9_17
Braeken, A., da Silva, B., Segers, L., Knödtel, J., Reichenbach, M., Wulf, C., Pertuz, S., Göhringer, D., Vliegen, J., Rabbani, M. M., & Mentens, N. (2024). Trusted Computing Architectures for IoT Devices. In I. Skliarova, P. Brox Jiménez, M. Véstias, & P. C. Diniz (Eds.), Applied Reconfigurable Computing. Architectures, Tools, and Applications - 20th International Symposium, ARC 2024, Proceedings (pp. 241-254). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 14553 LNCS). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-55673-9_17
@inproceedings{c4069ea7f3d24deea84c8647b5500332,
title = "Trusted Computing Architectures for IoT Devices",
abstract = "Industry has been the tireless engine of prosperity. The introduction of the Internet acts as a booster to this engine, but, unfortunately, where money goes, crime follows. Big corporations spend a lot of money to secure their IT systems. Although Internet of Things (IoT) devices are not as big nor powerful as these IT systems, their power comes from their vast number. This is even more true if these devices are connected to the Internet. Industrial automation has adopted these IoT devices in the Industrial Internet of Things (IIoT), giving yet another boost to growth. However, the effort to secure IoT devices is nearly bleak in comparison to industry{\textquoteright}s IT infrastructure. This work has the aim to illustrate that this does not need to be the case. In Trusted IoT, existing ideas in academia are translated into concrete use cases. Four use cases are handled: Environmental monitoring, IIoT on Coarse-Grained Reconfigurable Architectures (CGRAs), mobile robots and RISC-V driven unmanned aerial vehicles. Details are provided on the proof-of-concept implementations and results, addressing the security threats identified in the adversary model. Our findings highlight that solutions for securing IoT devices are feasible and achievable by focusing on the architectural level.",
keywords = "Architectures, IoT, Security",
author = "An Braeken and {da Silva}, Bruno and Laurent Segers and Johannes Kn{\"o}dtel and Marc Reichenbach and Cornelia Wulf and Sergio Pertuz and Diana G{\"o}hringer and Jo Vliegen and Rabbani, {Md Masoom} and Nele Mentens",
note = "Publisher Copyright: {\textcopyright} The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.; 20th International Symposium on Applied Reconfigurable Computing, ARC 2024 ; Conference date: 20-03-2024 Through 22-03-2024",
year = "2024",
doi = "10.1007/978-3-031-55673-9_17",
language = "English",
isbn = "9783031556722",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Science and Business Media Deutschland GmbH",
pages = "241--254",
editor = "Iouliia Skliarova and {Brox Jim{\'e}nez}, Piedad and M{\'a}rio V{\'e}stias and Diniz, {Pedro C.}",
booktitle = "Applied Reconfigurable Computing. Architectures, Tools, and Applications - 20th International Symposium, ARC 2024, Proceedings",
address = "Germany",
}