Abstract
Internet of things has infiltrated all corners of the world by providing distributed intelligence to all objects making them smart. From small wearables to smart homes to smart cities, IoT has proven to be a substantial part in all facets of life. Safety of the data collected from IoT devices that can make a whole city smarter is of utmost importance. On such a large scale, one malignant intrusion can lead to leakage of thousands of public data, thereby compromising privacy. On an international level, this leads to various complications in military, friendship among nations, suppressing terrorism, etc. Most of the current methods of securing IoT devices deal with the network and application layer. This paper deals with a simple yet very efficient method of securing IoT devices in the physical layer before it hits the market. These devices are called Internet of Secured Things (IoST) devices. It also takes into consideration the importance of variations in timing, power and area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integ (VLSI) Syst 20(1):112–125
Banga M, Hsiao MS (2008) A region based approach for the identification of hardware Trojans. In: 2008 IEEE international workshop on hardware-oriented security and trust, Anaheim, CA, pp 40–47
Xiaoxiao W, Tehranipoor M, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: Challenges and solutions, pp 15–19. https://doi.org/10.1109/hst.2008.4559039
Hayes B (2008) Cloud computing. Commun ACM 51(7):9–11 10.1145/1364782.1364786
Vurukonda Naresh, Rao Dr, Thirumala B (2016) A study on data storage security issues in cloud computing. Procedia Comput Sci 92:128–135. https://doi.org/10.1016/j.procs.2016.07.335
http://www.cse.psu.edu/~kxc104/class/cmpen411/14f/lec/C411L14LowPower2.pdf
Noor MM, Hassan W (2018) Current research on internet of things (IoT) security: a survey. Comput Netw 148. https://doi.org/10.1016/j.comnet.2018.11.025
Reddy DM, Akshay KP, Giridhar R, Karan SD, Mohankumar N (2017) BHARKS: Built-in hardware authentication using random key sequence. In: 2017 4th International conference on signal processing computing and control (ISPCC), Solan, pp 200–204
Atzori L et al (2010) The internet of things: a survey. Comput, Netw
Koneru et al (2018) HAPMAD: Hardware-based authentication platform for malicious activity detection in digital circuits. In: Information systems design and intelligent applications, Springer, pp 608–617. https://doi.org/10.1007/978-981-10-7512-4_60
Chakraborty RS, Narasimhan S, Bhunia S (2009) Hardware trojan: threats and emerging solutions. In: 2009 IEEE international high level design validation and test workshop, San Francisco, CA, pp 166–171
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rohini, B., Nayak, A.R., Mohankumar, N. (2021). Enhancing Security and Trust of IoT Devices–Internet of Secured Things (IoST). In: Kumar, R., Quang, N.H., Kumar Solanki, V., Cardona, M., Pattnaik, P.K. (eds) Research in Intelligent and Computing in Engineering. Advances in Intelligent Systems and Computing, vol 1254. Springer, Singapore. https://doi.org/10.1007/978-981-15-7527-3_2
Download citation
DOI: https://doi.org/10.1007/978-981-15-7527-3_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7526-6
Online ISBN: 978-981-15-7527-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)