Chrome Extension
WeChat Mini Program
Use on ChatGLM

I2Map: IoT Device Attestation Using Integrity Map.

International Conference on Trust, Security and Privacy in Computing and Communications(2023)

Cited 0|Views3
No score
Abstract
The reliability of any IoT system's operation depends upon the accuracy of sensor data. Numerous sensing devices are also embedded in autonomous systems. The adversary can manipulate the output of an IoT device, such as a speed sensor or a temperature sensor, by altering its hardware, software modules, network parameters, or device configuration. These unauthorized changes may affect the legitimate operation of the autonomous system and cause a malfunction or a safety hazard. In addition, the corrupt sensor data may also affect the machine learning models by introducing false training data or biasing the model towards certain decisions to cause the autonomous system to make incorrect decisions. The existing techniques mostly perform memory attestation or ensure the secure execution of an application. In addition, current approaches have unrealistic assumptions about adversaries’ capabilities and rely on trusted parties to initiate and run the attestation protocol. No existing technique provides all the required security features, including protection against return-oriented programming and network attacks, including interference, rainbow, and physical compromise. Hence, this research presents a secure and efficient version of a unique hybrid attestation scheme "I2Map" that detects a malicious or malfunctioning IoT device based on an integrity map. The performance analysis infers that I2Map performs better in transaction commit time and transaction costs with more device parameters than its predecessor.
More
Translated text
Key words
Internet of Things,device integrity,device attestation,digital DNA
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined