当前位置: X-MOL 学术ACM J. Emerg. Technol. Comput. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems
ACM Journal on Emerging Technologies in Computing Systems ( IF 2.1 ) Pub Date : 2021-06-30 , DOI: 10.1145/3458824
Nico Mexis 1 , Nikolaos Athanasios Anagnostopoulos 2 , Shuai Chen 3 , Jan Bambach 4 , Tolga Arul 2 , Stefan Katzenbeisser 1
Affiliation  

In recent years, a new generation of the Internet of Things (IoT 2.0) is emerging, based on artificial intelligence, the blockchain technology, machine learning, and the constant consolidation of pre-existing systems and subsystems into larger systems. In this work, we construct and examine a proof-of-concept prototype of such a system of systems, which consists of heterogeneous commercial off-the-shelf components, and utilises diverse communication protocols. We recognise the inherent need for lightweight security in this context, and address it by employing a low-cost state-of-the-art security solution. Our solution is based on a novel hardware and software co-engineering paradigm, utilising well-known software-based cryptographic algorithms, in order to maximise the security potential of the hardware security primitive (a Physical Unclonable Function) that is used as a security anchor. The performance of the proposed security solution is evaluated, proving its suitability even for real-time applications. Additionally, the Dolev-Yao attacker model is considered in order to assess the resilience of our solution towards attacks against the confidentiality, integrity, and availability of the examined system of systems. In this way, it is confirmed that the proposed solution is able to address the emerging security challenges of the oncoming era of systems of systems.

中文翻译:

系统系统新兴时代基于硬件安全的轻量级架构

近年来,新一代物联网(IoT 2.0)正在兴起,它基于人工智能、区块链技术、机器学习,并不断将已有的系统和子系统整合到更大的系统中。在这项工作中,我们构建并检查了这种系统系统的概念验证原型,该系统由异构的商业现成组件组成,并利用不同的通信协议。我们认识到在这种情况下对轻量级安全的内在需求,并通过采用低成本、最先进的安全解决方案来解决它。我们的解决方案基于新颖的硬件和软件协同工程范例,利用众所周知的基于软件的密码算法,为了最大化用作安全锚的硬件安全原语(物理不可克隆函数)的安全潜力。对提议的安全解决方案的性能进行了评估,证明了它甚至适用于实时应用程序。此外,考虑 Dolev-Yao 攻击者模型是为了评估我们的解决方案对针对所检查系统的机密性、完整性和可用性的攻击的弹性。通过这种方式,可以确认所提出的解决方案能够应对即将到来的系统系统时代新出现的安全挑战。考虑 Dolev-Yao 攻击者模型是为了评估我们的解决方案对针对所检查系统的机密性、完整性和可用性的攻击的弹性。通过这种方式,可以确认所提出的解决方案能够应对即将到来的系统系统时代新出现的安全挑战。考虑 Dolev-Yao 攻击者模型是为了评估我们的解决方案对针对所检查系统的机密性、完整性和可用性的攻击的弹性。通过这种方式,可以确认所提出的解决方案能够应对即将到来的系统系统时代新出现的安全挑战。
更新日期:2021-06-30
down
wechat
bug