Figure 5 - uploaded by Jaydip Sen
Content may be subject to copyright.
Generic secure boot architecture 

Generic secure boot architecture 

Source publication
Conference Paper
Full-text available
Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. IoT imposes peculiar constraints in terms of connectivity, computational power and energy budget, which make it significantly different from those contemplated by the canonical doctrine of security in distributed systems. In o...

Context in source publication

Context 1
... security becomes a big issue. Many research initiatives have been undertaken to counter the issues of security in embedded systems. We find great treatment on the issues of embedded system security in [10], where authors have described security requirements, design challenges, basic concepts, different security protocols like Secure Socket Layer (SSL) [11], open SSL [12], architectures. The SSL protocol is typically layered on top of the transport layer of the network protocol stack, and is either embedded in the protocol suite or is integrated with applications such as web browsers. This is shown in Fig. 2. IV. T RUSTED C OMPUTING In order to provide security at the physical or execution level, we need to build our solution based on secure execution environment (SEE). An SEE is a processing unit which is capable of executing applications in a protected manner, meaning the attacks originating from outside the SEE cannot tamper with code and data belonging to the SEE. The first building block of an SEE is of course a secure processor – either a dedicated processor or one capable of supporting a secure mode, which is hardware compartmentalized from the non-secure mode. Utilizing a dedicated processor has the advantage of ease of separation as well as offloading the main processor from handling security tasks. The disadvantage of a dedicated processor is the increase in silicon footprint. The advantages of using one processor with two compartments is exploiting remaining Millions Instructions Per Second (MIPS) if available, while the disadvantages include the need for better system design, and harder proof of security robustness. The second building block is secure code and data memory – most likely dedicated on-chip RAMs. It is important to remember that whenever code is present outside the SEE memory it should be integrity protected against modifications (and possibly protected for confidentiality by means of encryption if required). Whenever data is present outside the SEE memory it should be protected both for confidentiality and for integrity [25]. In this respect, we find that recently good amount of development has taken place in embedded platform security. Among the commercial releases, Trusted Platform Module by Atmel [13] and Trustzone by ARM [14] are worth mentioning. Trusted platform module (TPM) is to provide the minimal hardware needs to build a trusted platform in software. While usually implemented as a secure coprocessor, the functionality of a TPM is limited enough to allow for a relatively cheap implementation – at the price that the TPM itself does not solve any security problem, but rather offers a foundation to build upon. Thus, such a module can be added to an existing architecture rather cheaply, providing the lowest layer for larger security architecture. The main driver behind this approach is the Trusted Computing Group (TCG), a large consortium of the main players in the IT industry, and the successor to the Trusted Computing Platform Alliance (TCPA) [15]. TrustZone consists of a hardware-enforced security environment providing code isolation, together with secure software that provides both the fundamental security services and interfaces to other elements in the trusted chain, including smartcards, operating systems and general applications. TrustZone separates two parallel execution worlds: the non- secure ‘normal’ execution environment, and a trusted, certifiable secure world. TrustZone offers a number of key technical and commercial benefits to developers and end-users. TrustZone software components are a result of a successful collaboration with software security experts, Trusted Logic, and provide a secure execution environment and basic security services such as cryptography, safe storage and integrity checking to help ensure device and platform security. By enabling security at the device level, TrustZone provides a platform for addressing security issues at the application and user levels. Below (Fig. 3 & 4) we show the hardware and software architecture of ARM Trustzone. It is to be noted that one of the main features of trusted computing is secure boot. Secure Boot (also known as High Assurance Boot) is a technique for verifying and asserting the integrity of an executable image prior to passing the control to it. Assuming the verification mechanism is based on the digital signature of the image being verified, the reliability of this verification is at best as good as the reliability of the protection mechanism provided in the device for the public key of the image signer. The most important assumption here is that the code that performs the integrity verification process is itself trustworthy. To assert this assumption, the implementations typically put the public key material (as well as the verification code) into non-writable areas of memory, which in turn are protected using some sort of hardware protection mechanism. Generic Secure boot architecture is shown in Fig. 5 [17]. In this approach, the first step after boot-up is to verify the integrity of the Secure Boot code itself using digital signature verification. Next, the Secure Boot code performs integrity checking of basic security parameters (such as the signers' public key), and then after that validation of system images (such as the entire kernel or individual system libraries) occurs, and finally the user-space application validation takes place. The integrity of each layer relies on the integrity of the layers underneath. At any point, if the verification fails, the system can be put in a halt-state. In ARM Trustzone, the secure boot scheme adds cryptographic checks to each stage of the Secure world boot process. This process aims to assert the integrity of all of the Secure world software images that are executed, preventing any unauthorized or maliciously modified software from running. The secure boot process implements a chain of trust. Starting with an implicitly trusted component, every other component can be authenticated before being executed. The ownership of the chain can change at each stage - a PuK (Personal Unblocking Key) belonging to the device OEM might be used to authenticate the first bootloader, but the Secure world OS binary might include a secondary PuK that is used to authenticate the applications that it loads. Unless a design can discount hardware shack attacks the foundations of the secure boot process, known as the root of trust, must be located in the on-SoC ROM. The SoC ROM is the only component in the system that cannot be trivially modified or replaced by simple reprogramming attacks. Storage of the PuK for the root of trust can be problematic; embedding it in the on- SoC ROM implies that all devices use the same PuK. This makes them vulnerable to class-break attacks if the PuK is stolen or successfully reverse-engineered. On-SoC One-Time- Programmable (OTP) hardware, such as poly-silicon fuses, can be used to store unique values in each SoC during device manufacture. This enables a number of different PuK values to be stored in a single class of devices, reducing risk of class break attacks. Another secure boot implementation is found for Linux platform, which is part of SELinux [18]. To provide the appropriate levels of protection, these environments are enhanced with mandatory access control (MAC) mechanisms. One method to achieve a MAC is by implementing Role-Based Access Control (RBAC). NSA's SELinux, among other features such as MLS (Multi Level Security), provides Linux with MAC through RBAC [18]. With the explosive growth of mobile devices and application, it is true that the next generation of open operating systems won’t be on desktops or mainframes but on the small mobile devices, which enables greater integration with existing online services. Developed by the Open Handset Alliance (led by Google), Android is a widely anticipated open source operating system for mobile devices that provides a base operating system, an application middleware layer, a Java Software Development Kit (SDK), and a collection of system applications. Android restricts application interaction to its special APIs by running each application as its own user identity. This controlled interaction has several beneficial security features. Android protects applications and data through a combination of two enforcement mechanisms, one at the system level and the other at the inter-component communication (ICC) level. ICC mediation defines the core security framework. It is built on the guarantees provided by the underlying Linux system. As the central point of security enforcement, the Android middleware mediates all ICC processes by reasoning about labels assigned to applications and components. A reference monitor provides MAC enforcement of how applications access components. Security enforcement in Android occurs in two places: each application executes as its own user identity, allowing the underlying Linux system to provide system-level isolation; and the Android middleware contains a reference monitor that mediates the establishment of ICC. Both mechanisms are vital to the phone’s security, but the first is straightforward to implement, whereas the second requires careful consideration of both mechanism and policy [24]. In [26], authors have presented SCANDROID, (Security Certifier for anDroid) a tool for automated security certification of Android applications. SCANDROID statically analyzes data flows through Android applications, and can make security-relevant decisions automatically, based on such flows. In particular, it can decide whether it is safe for an application to run with certain permissions, based on the permissions enforced by other applications. Alternatively, it can provide enough context to the user to make informed security-relevant decisions. V. CONCLUSION AND FUTURE WORK With the advent of pervasive nature of today’s computing, security is becoming very critical ...

Similar publications

Article
Full-text available
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, the...

Citations

... The proposed strategy offered the IoT network's devices effective and reliable security services. Based on the idea of trusted computing [14], research on embedded security requirements included methods and solutions for fending off cyberattacks as well as technology for tamper-proofing embedded devices. investigates how to securely invoke patients' records from past case databases while protecting the privacy of both currently diagnosed patients and the case database and construct a privacy-preserving medical record searching scheme based on the ElGamal Blind Signature. ...
Article
Full-text available
Medical Internet of Things (M-IoT) synchronizes medical devices in a network to provide smart healthcare monitoring to doctors and to provide an interactive model for patients. This embedded networked system gained lots of importance in the last few years. Now almost every hospital adopts M-IoT. Though it had a lot of challenges in the initial stages of implementation such as feasibility, accuracy, and autonomy, now it has bridged the flaws with the help of several researchers in this field. But still, M-IoT lags behind in security and privacy aspects due to which attackers can intrude on the network and exploit patients’ health data. By examining the various intensive security threats imposed on M-IoT a unique way of handling and transferring data over the network is proposed in this paper. From our research findings, this would resolve the data security issues in M-IoT and commence the next advancements.
... Therefore, stronger data privacy and security measures must be developed for IoT devices. There are many vulnerabilities in the security of IoT devices in distributed system technology and these devices are vulnerable to cyber attacks [9]. Security issues in IoT devices are due to device constraints such as low power consumption, limited processing capacity, and limited memory Many international organizations and standards organizations are developing security standards for IoT devices. ...
Article
IoT is expressed as a network of physical objects with applications and various technologies that provide data connection and sharing with various devices and systems over the Internet. Security vulnerabilities in IoT devices are one of the biggest security issues in connecting devices to the internet and collecting and processing user data. These vulnerabilities can lead to increased attacks on IoT devices and malicious use of user data. In this article, we discuss these security problems that arise in IoT systems in detail in distributed systems technology. Distributed systems are increasingly used in the modern computing world. These systems are a structure where multiple independent computers communicate with each other for a common purpose. Distributed system technologies have become more common with the development of internet and cloud computing systems. However, the use of distributed systems has brought with it important security challenges such as security vulnerabilities, access controls and data integrity issues. Therefore, the security of distributed system technologies has been an important focus of work in this area. In this study, information about distributed system technologies and security for IoT is given. The all attack types were classified using ANN, developed RF and hybrid model. In RF, all feature vectors created from all datasets (bank and two financial datasets) were also analyzed separately and the classification performance was examined. In addition, a new RF algorithm based on weight values using the Gini algorithm has been proposed. With this algorithm, the traditional RF algorithm has been developed and the success rates have been increased. In addition, a hybrid method was created by classifying the datasets obtained by RF with ANN. With the hybrid method ANN and the enhanced RF method, its accuracy in detecting normal behaviors and attack types was calculated and the success of the methods was presented comparatively. In addition, the working times of the methods were determined.
... Te boot program will frst enter the initialization stage of TEE and start TOS. Te critical codes in each stage of TOS startup are checked step by step to ensure the integrity of TOS and prevent the operation of unauthorized or maliciously tampered software [11]. Ten, running the REE boot program and starting ROS are performed to complete the safe boot process for the entire system. ...
Article
Full-text available
The advent of the Internet and portable devices, including smartphones and watches, has brought unprecedented opportunities for embedded application systems developments. Along with these developments, there is an increasing need for embedded devices to handle important services, such as the ability to pay bills or manage bank accounts remotely via mobile phones. Such applications and developments have also highlighted the issues of cyberattacks and computing network security--these developments have made mobile phones a potential target for malware, trojans, and viruses, so it is critical to design a set of security technologies for embedded devices. In fact, security has become an essential requirement in the process of embedded system design. Thus, ARM has proposed system-level security solutions based on TrustZone technology. TrustZone technology is tightly integrated with Cortex™-A processors and extends the system through the AMBA® AXI bus and specific TrustZone system IP blocks to protect peripherals such as secure memory, encryption blocks, keyboards, and screens from software attacks. It divides the system into TEE (Trusted Execution Environment) and REE (Rich Execution Environment) by hardware and provides intrinsic software security services and interfaces. More precisely, it has built system security by combining hardware and software. It is worth noting that it does not influence performance, power consumption, and area as much as possible. Owing to such characteristics, the technology has gained the wide attention of researchers worldwide. There is lack of systematic documentation of the technology. Therefore, this paper documents the significant progress achieved in the field. In particular, this article mainly analyses the primary mechanism implementation, and how to build the Trusted Execution Environment in different environments. Then, this paper discusses the related research works in the academic field and business applications of the technology. Furthermore, the advantages and weaknesses of the TrustZone technology as well as the proposed possible solutions aiming at the deficiency are outlined. Finally, a comparison of TrustZone technology with another mainstream commercial SGX, and future directions are presented.
... According to the 2021 SonicWall annual threat report, 56.9 million attacks were launched on IoT devices (a 66% increase in IoT malware attacks compared to 2019 [1]). Traditional security techniques such as signature-based and behavior-based anti-virus software cannot be applied to securing IoT devices due to resource constraints such as low computing power and limited energy supply [26,31,32,36,37]. A hardware supported solution can tackle these design challenges, as it can streamline the process of detecting and responding to malware attacks. ...
Preprint
Full-text available
With the rapid proliferation of IoT devices and its growing usage in safety-critical systems, securing these devices from malicious attacks has become increasingly challenging. Due to the resource-constrained nature of IoT devices, real-time software-based malware detection is difficult or infeasible. Alternatively, a promising approach is utilizing hardware malware detection techniques. In this paper, we introduce a novel Hardware Immune System (HWIS), a stand-alone, hardware-supported malware detection approach for microprocessors that leverages Artificial Immune Systems for detecting botnet activity. This technique is suitable for low-power, resource constrained and network facing embedded devices. The proposed model is capable of detecting botnet behavior with an accuracy of 96.7%, false negative rate of 6.5%, and F1-score of 0.96. We implemented and simulated the proposed architecture using 32nm low power PTM SPICE models and the Synopsys 32nm EDK and found the power and area overhead to be 2.57% and 5.25%, respectively, with no impact on delay, using a 28nm RISC-V CPU as a baseline.
... In recent years, with exponential growth in the number of smartphone and internet of things (IoT) devices [20], the security analysis of the ARM processors used in these devices have become an everlasting concern for security specialists [21]. Moreover, with Intel processors being in the highest demand for desktop PCs, servers, cloud computing, and network infrastructures, up-to-date evaluation of their security is utterly critical to maintaining the reliability of computer systems. ...
Preprint
Performance-enhancing mechanisms such as branch prediction, out-of-order execution, and return stack buffer (RSB) have been widely employed in today's modern processing units. Although successful in increasing the CPU performance, exploiting the design flaws and security bugs in these components have set the background for various types of microarchitectural attacks such as Spectre and Meltdown. While many attacks such as Meltdown and Spectre have been numerously implemented and analyzed on Intel processors, few researches have been carried out to evaluate their impact on ARM processors. Moreover, SpectreRSB vulnerability, the newer variant of spectre attack based on RSB, has been neglected in recent studies. In this work, we first evaluate the SpectreRSB vulnerability by implementing this attack on ARM processors, which, to the best of our knowledge, has not been implemented and analyzed on ARM processors. We further present a security evaluation of ARM processors by implementing different variants of Spectre-family attacks. By analyzing the results obtained from various experiments, we evaluate ARM processors security regarding their diverse microarchitectural designs. We also introduce a high throughput and noise-free covert channel, based on the RSB structure. Based on our experiments, the throughput of the covert channel is 94.19KB/s with negligible error.
... For instance, in Naoui et al. [7], the authors propose a secure communication protocol that relies on ECC and OTP algorithms to guarantee security to promote a lightweight security solution. On the other hand, Trusted Execution Environments (TEEs) provide additional protection and isolation guarantees for the software running on the platform, which can be used by gateways to improve the security and reliability of critical components such as temporary clear-text data handling and authentication management [8][9][10]. ...
... Ukil et al. [9] present an overview of the security of Embedded Systems in IIoT. The authors discussed the current solutions and pointed to TEEs as a solution to counter many physical and execution attacks by providing hardware isolation for the IIoT devices. ...
Article
Full-text available
Industrial Internet of Things (IIoT) gateways are affected by many cybersecurity threats, compromising their security and dependability. These gateways usually represent single points of failure on the IIoT infrastructure. When compromised, they can disrupt the entire system, including the security of the IIoT devices and the confidentiality and privacy of the data. This paper introduces a Secure IIoT Gateway Architecture that encompasses Trusted Execution Environment concepts and consolidated security algorithms to achieve a secure IIoT environment. Sensitive procedures of the IIoT, like device admission, bootstrapping, key management, authentication, and data exchange among operational technology (OT) and information technology (IT) are handled by the gateway inside the secure execution domain. The bootstrapping does not require devices to have any pre-stored secret or a pre-established secure channel to any trusted third party. Moreover, our architecture includes mechanisms for IIoT devices to safely interact with the Cloud without assuming the integrity of the gateways between them, enabling continuous verification of gateway integrity. A formal proof of the proposed solution security is provided. Finally, the security of the proposed architecture is discussed according to the specified requirements.
... The EV sensors themselves may be secured against vulnerabilities, cyber-attacks, tempering, breakage, and damage in a number of ways. Firstly, it is recommended to make temper-protected hardware for sensors integrated inside and outside the vehicles [153]. Secondly, EV manufacturers may remove the possibility of integrating fake sensors, which auto repairers sometimes do in the market with the aim of data spoofing into embedded circuits associated with EVs or charging stations or to spoof sensory data. ...
Article
Full-text available
With the global energy crisis, increasing demand, and a national-level emphasis on electric vehicles (EVs), numerous innovations are being witnessed throughout the EV industry. EVs are equipped with sensors that maintain a sustainable environment for the betterment of society and enhance human sustainability. However, at the same time, as is the case for any new digital technology, they are susceptible to threats to security and privacy. Recent incidents demonstrate that these sensors have been misused for car and energy theft, financial fraud, data compromise, and have caused severe health and safety problems, amongst other things. To the best of our knowledge, this paper provides a first systematic analysis of EV sustainability, digital technologies that enhance sustainability, their potential cybersecurity threats, and corresponding defense. Firstly, three robust taxonomies have been presented to identify the dangers that can affect long-term sustainability domains, including (1) life and well-being, (2) safe environment, and (3) innovation and development. Second, this research measures the impact of cybersecurity threats on EVs and correspondingly to their sustainability goals. Third, it details the extent to which specific security controls can mitigate these threats, thereby allowing for a smooth transition toward secure and sustainable future smart cities.
... The first SEE building block is of course a secure processor; either a dedicated processor or one capable of supporting a secure mode. This secure processor is hardware compartmentalized from the non-secure mode [23]. A number of recent developments have taken place in embedded platform security. ...
... Normally, the Android protects applications and data through a combination of two enforcement mechanisms, one at the system level and the other at the ICC (Inter-component communication) level. ICC mediation defines the core security framework built on guaranties provided by the underlying Linux system [23]. ...
Preprint
Full-text available
The current article presents a BC (block-chain) algorithm proposed for developing IoT (internet of things) applications. The TM (trust management) scheme is also embedded for improving secure protection. In the BC stage, specified parameters are extracted first according to the estimated trust value before the control information comes from the TM. A merit referred to as QoI (quality of information) judges the IoT technology parameter dependent on the trust value. The simulation results from experiments show that the security has more reliability after the proposed fusion schemes. The BC embedding scheme has always provided a higher QoI level. Furthermore, the outcomes are such that the jointed algorithm can enhance secure protection efficiency and solve the application tier security problem. Alternatively, reducing the QoI degree, such as the packet capacity and data rate, is the penalty factors. Eventually, the results from the proposed methods have significant delivery ratio outperform a relevant work, and there has a real implemented project is demonstrated by providing the mentioned assessment for a toxic chemical trade.
... A comparison study between Diffie-Hellman (DH) and elliptic curve Diffie-Hellman (ECDH) is given in [25], and in this, ECDH is concluded to be better in terms of power consumption and robustness. However, still, there are many challenges existing in this domain [26], [27]. Some of these include identity and access management, access control, and secret information exchange between the participating nodes. ...
Article
Full-text available
p> Internet of things (IoT) gained wide popularity in recent years, and this is proved by tremendous increase in use of IoT applications worldwide. Distributed IoT applications can be implemented securely with the support of blockchain. By default, blockchain will ensure authentication of involved entities as well as integrity of data. Due to storage restrictions, use of hybrid system is preferred, and this involves cloud server for storage and blockchain for other functionalities. Data kept in cloud has to be encrypted by a strong encryption algorithm. Even though core security objectives are achieved, it is necessary to provide a secure method to exchange the key. Since, the key is the backbone of a security algorithm, protection of the key has to be ensured. In this work, an algorithm is proposed to provide a no-share key exchange between two communicating parties in a resource constrained environment. The same was implemented and compared with conventional key sharing algorithms. Security analysis was formally conducted by using widely accepted automated validation of internet security protocols and applications (AVISPA) tool and the proposed method proved to be secure. </p
... And it also functions on iOs plus Android. More Arduino compatible shields plus boards (this listing will be up-to-date as we check the compatibility)Is actually not that in the particular task in order to consider [14] Arduino away from your house network, so we have built a Blynk server. It grips all of the particular authentication and conversation, and also retains a watch on your own board as the particular smartphone is off-line. ...
Article
IOT offers systems that combine more than one disparate additive towards their synergistic use. Most of the world's population today lives in cities. By 2030, the population of the cities around the arena is predicted to grow from three.Three billion to five billion people. Due to aid constraints, there may be a hassle inside the destiny to provide all the offerings to the residents. To serve and improve the standard of dwelling of the developing population, it's essential to expand clever towns. The Smart City ambitions to make the most fulfilling and sustainable use of all sources, even as retaining the correct stability among social, environmental and financial expenses. The wireless sensors are connected to road lamps, water tanks, parking areas, dustbins and site visitors lights. Sensors are then connected to an arduino microcontroller board in which every and each essential parameters for the city are monitored and updated to cloud by way of a PC. The cloud is connected with the app server in turn that's connected to the integrated Blynk software of the consumer's Android cellphone. Here we are developing a project based on IOT. IOT is generally a sensor to sensor communication which communicates with the help of the internet.The sensors are connected together to a microcontroller over the internet to focus on five parameters of the city. Emphasis is given on how sensing and communication technologies of IOT can effectively be utilized in clever metropolis monitoring. The project aims at developing a device which facilitates the gathering of information with the assistance of interconnected modules inclusive of a couple of sensors beneficial to the city