Published May 30, 2022 | Version CC BY-NC-ND 4.0
Journal article Open

Trusted Execution Environments for Internet of Things Devices

  • 1. Research Scholar, Liverpool John Moore University, UK.
  • 2. Senior Engineer, Digital 14.

Contributors

  • 1. Research Scholar, Liverpool John Moore University, UK.

Description

Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential processor that's designed to shield the most touchy information and operations. TEEs are utilized in an expansion of applications, which incorporates cell gadgets, price processing, and statistics safety. The usage of TEEs is becoming increasingly crucial because the amount of touchy records that are processed and stored electronically continues to develop. TEEs can help guard statistics from being accessed or changed with the resource of unauthorised customers, and can also assist ensure that facts aren't always compromised at some stage in transmission. TEEs typically applied the employment of specialized hardware that would offer a better degree of protection than software program-most effective solutions. Hardware-primarily based total TEEs can also offer better overall performance and power efficiency than software-handiest solutions. There are some particular TEE implementations to be had, which incorporates Intel’s TXT, ARM’s TrustZone, and Samsung’s KNOX. Each of those implementations has its very personal strengths and weaknesses, so it's miles more crucial to pick the right TEE on your precise software. reckoning on execution environments are becoming an increasing number of necessities because the amount of touchy facts that's processed and stored electronically continues growing. TEEs can assist shield facts from being accessed or modified by means of way of unauthorized customers, and might also help make sure that records aren't compromised at some point of transmission. TEEs normally implemented the employment of specialized hardware, which will offer a far better degree of protection than software program-only answers. To research how this period has been implemented to the exceptional IoT eventualities, which normally address unique characteristics which incorporate device useful resource constraints, we allotted a scientific literature evaluation.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

F98850511622.pdf

Files (407.5 kB)

Name Size Download all
md5:0d52ce49c1478b2f3853f4b4a5d117d7
407.5 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2278-3075 (ISSN)

References

  • A. Gabbai, Kevin Ashton Describes the Internet of Things, Jan. 2015, [online] Available: https://bit.ly/2PvshSn.
  • K. Ashton, That 'Internet of Things' Thing, Jan. 2009, [online] Available: https://www.rfidjournal.com/articles/view?4986.
  • M. Henze, L. Hermerschmidt, D. Kerpen, R. Häußling, B. Rumpe and K. Wehrle, "A comprehensive approach to privacy in the cloud-based Internet of Things", Future Gener. Comput. Syst., vol. 56, pp. 701-718, Mar. 2016.
  • G. Kortuem, F. Kawsar, V. Sundramoorthy and D. Fitton, "Smart objects as building blocks for the Internet of Things", IEEE Internet Comput., vol. 14, no. 1, pp. 44-51, Jan. 2010.
  • S. Weagle, The Rise of IoT Botnet Threats and DDoS Attacks, Jan. 2019, [online] Available: https://bit.ly/2Qs4bIL.
  • E. Bertino, "Data security and privacy: Concepts approaches and research directions", Proc. IEEE 40th Annu. Comput. Softw. Appl. Conf. (COMPSAC), pp. 400-407, Jun. 2016.
  • R. van der Meulen, Gartner Says 8.4 Billion Connected 'Things' Will Be in Use in 2017 Up 31 Percent From 2016, Jan. 2019, [online] Available: https://gtnr.it/3snbJL9.
  • TruztZone—ARM Developer, Jan. 2021, [online] Available: https://developer.arm.com/technologies/trustzone.
  • Intel Software Guard Extensions (Intel SGX), Jan. 2021, [online] Available: https://software.intel.com/en-us/sgx.
  • S. W. Kim, C. Lee, M. Jeon, H. Y. Kwon, H. W. Lee and C. Yoo, "Secure device access for automotive software", Proc. Int. Conf. Connected Vehicles Expo (ICCVE), pp. 177-181, Dec. 2013.
  • R. Ankele and A. Simpson, "On the performance of a trustworthy remote entity in comparison to secure multi-party computation", Proc. Int. Conf. Trust Secur. Privacy Comput. Commun., pp. 1115-1122, 2017.
  • J. Wang, Z. Hong, Y. Zhang and Y. Jin, "Enabling security-enhanced attestation with intel SGX for remote terminal and IoT", IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 37, no. 1, pp. 88-96, Jan. 2018.
  • L. Zhang, D. Zhu, Z. Yang, L. Sun and M. Yang, "A survey of privacy protection techniques for mobile devices", J. Commun. Inf. Netw., vol. 1, no. 4, pp. 86-92, Dec. 2016.
  • Weiser, S. and Werner, M. (2017). SGXIO: Generic trusted I/O path for Intel SGX. In Proceedings of the 7th Conference on Data and Application Security and Privacy, CODASPY '17, page 261–268, Scottsdale, AZ, USA. ACM.
  • Chen, G., Chen, S., Xiao, Y., Zhang, Y., Lin, Z., and Lai, T. H. (2019b). Stealing Intel secrets from SGX enclaves via speculative execution. In Proc. of the 4th IEEE European Symp. on Security and Privacy. IEEE.
  • Weichbrodt, N., Kurmus, A., Pietzuch, P., and Kapitza, R. (2016). AsyncShock: Exploiting synchronisation bugs in Intel SGX enclaves. In Proceedings of the European Symposium on Research in Computer Security, pages 440–457, Heraklion, Greece. Springer.
  • Beekman, J. G. and Porter, D. E. (2017). Challenges for scaling applications across enclaves. In Proceedings of the 2nd Workshop on System Software for Trusted Execution, New York, NY, USA. ACM.

Subjects

ISSN: 2278-3075 (Online)
https://portal.issn.org/resource/ISSN/2278-3075#
Retrieval Number: 100.1/ijitee.F98850511622
https://www.ijitee.org/portfolio-item/F98850511622/
Journal Website: www.ijitee.org
https://www.ijitee.org
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org