Securing cloud-based IoT applications with trustworthy sensing

1Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The omnipresence of resource-constrained sensors connected to the cloud has enabled numerous Internet of Things (IoT) applications. However, the trust in these IoT applications is severely compromised by security concerns. We introduce a lightweight and effective security approach for such applications by protecting the sensors. Our approach leverages Physically Unclonable Functions (PUF) on the sensor platform to ensure non-repudiation of sensed data and integrity of sensor hardware and firmware. We compare the performance of different PUF implementations on Atmel, ARM, and FPGA-based sensing platforms, analyze the security properties of the proposed protocols and determine the overhead in terms of latency, storage and logic area. Our evaluation shows that it only incurs insignificant overhead on low-end sensors.

Cite

CITATION STYLE

APA

Haider, I., & Rinner, B. (2018). Securing cloud-based IoT applications with trustworthy sensing. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 189, pp. 218–227). Springer Verlag. https://doi.org/10.1007/978-3-319-67636-4_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free