Presentation + Paper
3 May 2018 Lightweight hardware monitoring of IoT devices
Andrew Toth, Dan Rapczynski, Jason A. Wampler
Author Affiliations +
Abstract
IoT devices are systematically vulnerable to vendor introduced bugs, network as well as supply chain attacks. Further, unprotected and unmonitored physical access is common while single board computer based IoT devices have limited or no ability to detect and mitigate most types of attacks. Various methods have been described that use software based analysis, execution monitoring, and other cryptographic functions but these methods are not practical for small devices and often require modifications or additions to a simple sensor board that uses more power and is itself vulnerable to software bugs. Also, additional software space for non-mission code is difficult or not possible to add. This paper describes a novel light weight method to detect a compromise or abnormal behavior through the monitoring of readable and writable hardware elements on the device. An example prototype is described using an Arduino class device, common for many commercial sensing applications.
Conference Presentation
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Andrew Toth, Dan Rapczynski, and Jason A. Wampler "Lightweight hardware monitoring of IoT devices", Proc. SPIE 10630, Cyber Sensing 2018, 106300H (3 May 2018); https://doi.org/10.1117/12.2305254
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Error control coding

Sensors

Algorithm development

Commercial off the shelf technology

Computer intrusion detection

Network security

Sensor networks

Back to Top