Cargando…

Hardware Security of Fog End-Devices for the Internet of Things

The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-at...

Descripción completa

Detalles Bibliográficos
Autores principales: Butun, Ismail, Sari, Alparslan, Österberg, Patrik
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7601476/
https://www.ncbi.nlm.nih.gov/pubmed/33050165
http://dx.doi.org/10.3390/s20205729
_version_ 1783603430531530752
author Butun, Ismail
Sari, Alparslan
Österberg, Patrik
author_facet Butun, Ismail
Sari, Alparslan
Österberg, Patrik
author_sort Butun, Ismail
collection PubMed
description The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.
format Online
Article
Text
id pubmed-7601476
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-76014762020-11-01 Hardware Security of Fog End-Devices for the Internet of Things Butun, Ismail Sari, Alparslan Österberg, Patrik Sensors (Basel) Review The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory. MDPI 2020-10-09 /pmc/articles/PMC7601476/ /pubmed/33050165 http://dx.doi.org/10.3390/s20205729 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Butun, Ismail
Sari, Alparslan
Österberg, Patrik
Hardware Security of Fog End-Devices for the Internet of Things
title Hardware Security of Fog End-Devices for the Internet of Things
title_full Hardware Security of Fog End-Devices for the Internet of Things
title_fullStr Hardware Security of Fog End-Devices for the Internet of Things
title_full_unstemmed Hardware Security of Fog End-Devices for the Internet of Things
title_short Hardware Security of Fog End-Devices for the Internet of Things
title_sort hardware security of fog end-devices for the internet of things
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7601476/
https://www.ncbi.nlm.nih.gov/pubmed/33050165
http://dx.doi.org/10.3390/s20205729
work_keys_str_mv AT butunismail hardwaresecurityoffogenddevicesfortheinternetofthings
AT sarialparslan hardwaresecurityoffogenddevicesfortheinternetofthings
AT osterbergpatrik hardwaresecurityoffogenddevicesfortheinternetofthings