Device-specific security challenges and solution in IoT edge computing: a review | The Journal of Supercomputing Skip to main content
Log in

Device-specific security challenges and solution in IoT edge computing: a review

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Rapid growth in IoT technology demands the need for the emergence of new IoT devices. IoT devices vary in terms of shape, size, storage, battery life, and computational power according to the specific purposes for which they are utilized. Also, since IoT devices are geographically dispersed, they are vulnerable to remote/physical attacks. Numerous research works are done to mitigate the challenges using software methods. However, in the last few decades, it is evident that software methods fail to protect IoT devices against hardware threats. The need for preventing hardware attacks drives the researchers to find a solution from a hardware perspective. This paper investigates and examines the security challenges faced by IoT devices by focusing on their hardware aspects. The outcome of the study is presented as a survey, signifying the existing solutions for different challenges. The survey primarily focuses on three major challenges: device authentication, IP protection, and hardware Trojan. Out of the analysis of 111 related schemes, it is clear that 30.6% are PUF-based schemes. A comparative study on the hardware parameter analysis of existing solutions has been performed. From this analysis, a few unresolved issues and directions for future research are identified. We expect this survey to be helpful for the research community working on hardware security challenges faced by IoT devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Moos T, Moradi A, Richter B (2019) Static power side-channel analysis-an investigation of measurement factors. IEEE Trans Very Large Scale Integr (VLSI) Syst 28(2):376–389

    Google Scholar 

  2. Tang M, Luo M, Zhou J, Yang Z, Guo Z, Yan F, Liu L (2018) Side-channel attacks in a real scenario. Tsinghua Sci Technol 23(5):586–598

    Google Scholar 

  3. Mohammadi S, Jadidoleslamy H (2011) A comparison of physical attacks on wireless sensor networks. Int J Peer Peer Netw 2(2):24–42

    Google Scholar 

  4. Lee I, Lee K (2015) The internet of things (IOT): applications, investments, and challenges for enterprises. Bus Horizons 58(4):431–440

    Google Scholar 

  5. Mark Hung GRVP (ed) (2021) Leading the IoT, Gartner insights on how to lead in a connected world. https://www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf last Accessed on 07 July 2021

  6. Ahmed Z, Danish SM, Qureshi HK, Lestas M (2019) Protecting IOTs from mirai botnet attacks using blockchains. In: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1–6. IEEE

  7. Rajendran G, Nivash RR, Parthy PP, Balamurugan S (2019) Modern security threats in the internet of things (iot): Attacks and countermeasures. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1–6. IEEE

  8. Mohammad Z, Qattam TA, Saleh K (2019) Security weaknesses and attacks on the internet of things applications. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 431–436. IEEE

  9. Tudosa I, Picariello F, Balestrieri E, De Vito L, Lamonaca F (2019) Hardware security in iot era: The role of measurements and instrumentation. In: 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4. 0 &IoT), pp. 285–290. IEEE

  10. Latest research by New Delhi-based think tank CyberPeace Foundation (2021) Surge in cyber attacks on india vaccine makers in oct-nov: report. https://www.cyberpeace.org/surge-in-cyber-attacks-on-india-vaccine-makers-in-oct-nov-report Last Accessed on 07 July 2021

  11. Al-Omary A, Othman A, AlSabbagh HM, Al-Rizzo H (2018) Survey of hardware-based security support for iot/cps systems. KnE Engineering, 52–70

  12. Bhatt S, Ragiri PR et al (2021) Security trends in internet of things: a survey. SN Appl Sci 3(1):1–14

    Google Scholar 

  13. Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M et al (2020) Iot privacy and security: challenges and solutions. Appl Sci 10(12):4102

    Google Scholar 

  14. Yu W, Liang F, He X, Hatcher WG, Lu C, Lin J, Yang X (2017) A survey on the edge computing for the internet of things. IEEE Access 6:6900–6919

    Google Scholar 

  15. Alwarafy A, Al-Thelaya KA, Abdallah M, Schneider J, Hamdi M (2020) A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet Things J 8(6):4004–4022

    Google Scholar 

  16. Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IOT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743

    Google Scholar 

  17. Shamsoshoara A, Korenda A, Afghah F, Zeadally S (2020) A survey on physical unclonable function (puf)-based security solutions for internet of things. Comput Netw 183:107593

    Google Scholar 

  18. Polychronou N-F, Thevenon P-H, Puys M, Beroulle V (2021) A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in IOT/IIOT devices, and their detection mechanisms. ACM Trans Design Autom Electron Syst (TODAES) 27(1):1–35

    Google Scholar 

  19. Liu K, Yang M, Ling Z, Yan H, Zhang Y, Fu X, Zhao W (2020) On manually reverse engineering communication protocols of Linux-based IOT systems. IEEE Internet Things J 8(8):6815–6827

    Google Scholar 

  20. Smith R, Palin D, Ioulianou PP, Vassilakis VG, Shahandashti SF (2020) Battery draining attacks against edge computing nodes in IOT networks. Cyber-Phys Syst 6(2):96–116

    Google Scholar 

  21. Lim S, Lee J, Han D-G (2020) Improved differential fault attack on lea by algebraic representation of modular addition. IEEE Access 8:212794–212802

    Google Scholar 

  22. Devi M, Majumder A (2021) Side-channel attack in internet of things: a survey. In: Applications of Internet of Things: Proceedings of ICCCIOT 2020, pp. 213–222. Springer

  23. Ramasubramanian N, Kokila J (2021) Study of hardware attacks on smart system design lab. Security of internet of things nodes: challenges, attacks, and countermeasures, 233

  24. Zhang J, Wang Z, Yang Z, Zhang Q (2017) Proximity based IOT device authentication. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9. IEEE

  25. Li D, Peng W, Deng W, Gai F (2018) A blockchain-based authentication and security mechanism for IOT. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6. IEEE

  26. Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IOT. IEEE J Sel Areas in Commun 38(5):942–954

    Google Scholar 

  27. Lohachab A et al (2019) ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. J Inf Security Appl 46:1–12

    Google Scholar 

  28. Kumari S, Karuppiah M, Das AK, Li X, Wu F, Kumar N (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74(12):6428–6453

    Google Scholar 

  29. Hasan A, Qureshi K (2018) Internet of things device authentication scheme using hardware serialization. In: 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pp. 109–114. IEEE

  30. Barbareschi M, De Benedictis A, La Montagna E, Mazzeo A, Mazzocca N (2019) A PUF-based mutual authentication scheme for cloud-edges IoT systems. Futur Gener Comput Syst 101:246–261

    Google Scholar 

  31. Farha F, Ning H, Ali K, Chen L, Nugent C (2020) SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices. IEEE Internet Things J 8(7):5904–5913

    Google Scholar 

  32. Liang W, Xie S, Long J, Li K-C, Zhang D, Li K (2019) A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Inf Sci 503:129–147

    Google Scholar 

  33. Fakroon M, Gebali F, Mamun M (2021) Multifactor authentication scheme using physically unclonable functions. Internet Things 13:100343

    Google Scholar 

  34. Zhang J, Qu G (2019) Physical unclonable function-based key sharing via machine learning for IoT security. IEEE Trans Ind Electron 67(8):7025–7033

    Google Scholar 

  35. Thangam T, Gayathri G, Madhubala T (2017) A novel logic locking technique for hardware security. In: 2017 IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE), pp. 1–7. IEEE

  36. Cui A, Qian X, Qu G, Li H (2017) A new active IC metering technique based on locking scan cells. In: 2017 IEEE 26th Asian Test Symposium (ATS), pp. 40–45. IEEE

  37. Kokila J, Ramasubramanian N, Naganathan N (2019) Resource efficient metering scheme for protecting SOC FPGA device and IPS in IoT applications. IEEE Trans Very Large Scale Integr (VLSI) Syst 27(10):2284–2295

    Google Scholar 

  38. Kolhe G, PD SM, Rafatirad S, Mahmoodi H, Sasan A, Homayoun H (2019) On custom LUT-based obfuscation. In: Proceedings of the 2019 on Great Lakes Symposium on VLSI, pp. 477–482

  39. Roy DB, Bhasin S, Nikolić I, Mukhopadhyay D (2019) Combining PUF with RLUTS: A two-party pay-per-device IP licensing scheme on FPGAS. ACM Trans Embed Comput Syst (TECS) 18(2):1–22

    Google Scholar 

  40. Mahmod MJ, Guin U (2020) A robust, low-cost and secure authentication scheme for IoT applications. Cryptography 4(1):8

    Google Scholar 

  41. Gope P, Sikdar B (2018) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580–589

    Google Scholar 

  42. Yilmaz Y, Gunn SR, Halak B (2018) Lightweight PUF-based authentication protocol for IoT devices. In: 2018 IEEE 3rd International Verification and Security Workshop (IVSW), pp. 38–43. IEEE

  43. Mall P, Bhuiyan MZA, Amin R (2019) A lightweight secure communication protocol for iot devices using physically unclonable function. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 26–35. Springer

  44. Dammak M, Boudia ORM, Messous MA, Senouci SM, Gransart C (2019) Token-based lightweight authentication to secure IoT networks. In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1–4. IEEE

  45. Salman O, Abdallah S, Elhajj IH, Chehab A, Kayssi A (2016) Identity-based authentication scheme for the internet of things. In: 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 1109–1111. IEEE

  46. Pacheco J, Hariri S (2016) IoT security framework for smart cyber infrastructures. In: 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS* W), pp. 242–247. IEEE

  47. Ashibani Y, Kauling D, Mahmoud QH (2017) A context-aware authentication framework for smart homes. In: 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–5. IEEE

  48. Li M, Tang H, Hussein AR, Wang X (2020) A sidechain-based decentralized authentication scheme via optimized two-way peg protocol for smart community. IEEE Open J Commun Soc 1:282–292

    Google Scholar 

  49. Zhaofeng M, Jialin M, Jihui W, Zhiguang S (2020) Blockchain-based decentralized authentication modeling scheme in edge and IoT environment. IEEE Internet Things J 8(4):2116–2123

    Google Scholar 

  50. Zhang Y, Xiang Y, Wu W, Alelaiwi A (2018) A variant of password authenticated key exchange protocol. Futur Gener Comput Syst 78:699–711

    Google Scholar 

  51. AlQahtani AAS, Alamleh H, Al Smadi B (2022) Iot devices proximity authentication in ad hoc network environment. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1–5. IEEE

  52. Mohanty SP, Yanambaka VP, Kougianos E, Puthal D (2020) Pufchain: a hardware-assisted blockchain for sustainable simultaneous device and data security in the internet of everything (IOE). IEEE Consum Electron Mag 9(2):8–16

    Google Scholar 

  53. Wang S, Li H, Chen J, Wang J, Deng Y (2022) Dag blockchain-based lightweight authentication and authorization scheme for IOT devices. J Inf Secur Appl 66:103134

    Google Scholar 

  54. Vivekanandan M, USR (2021) Bidapsca5g: Blockchain based internet of things (iot) device to device authentication protocol for smart city applications using 5g technology. Peer-to-Peer networking and applications 14:403–419

  55. Deebak B, Memon FH, Khowaja SA, Dev K, Wang W, Qureshi NMF, Su C (2022) Lightweight blockchain-based remote mutual authentication for AI-empowered IoT sustainable computing systems. IEEE Internet Things J 10(8):6652–6660

    Google Scholar 

  56. Mukhandi M, Damião F, Granjal J, Vilela JP (2022) Blockchain-based device identity management with consensus authentication for iot devices. In: 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), pp. 433–436. IEEE

  57. Yao H, Yan Q, Fu X, Zhang Z, Lan C (2022) ECC-based lightweight authentication and access control scheme for IOT e-healthcare. Soft Comput 26:4441–4461

    Google Scholar 

  58. Alizai ZA, Tareen NF, Jadoon I (2018) Improved IOT device authentication scheme using device capability and digital signatures. In: 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pp. 1–5. IEEE

  59. Shah T, Venkatesan S (2018) Authentication of IoT device and IoT server using secure vaults. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 819–824. IEEE

  60. Wazid M, Das AK, Shetty S, Rodrigues JPC, Park Y (2019) LDAKM-EIOT: lightweight device authentication and key management mechanism for edge-based IoT deployment. Sensors 19(24):5539

    Google Scholar 

  61. Shahidinejad A, Ghobaei-Arani M, Souri A, Shojafar M, Kumari S (2021) Light-edge: a lightweight authentication protocol for IoT devices in an edge-cloud environment. IEEE Consum Electron Mag 11(2):57–63

    Google Scholar 

  62. Gupta BB, Gaurav A, Chui KT, Hsu C-H (2022) Identity-based authentication technique for iot devices. In: 2022 IEEE International Conference on consumer Electronics (ICCE), pp. 1–4. IEEE

  63. Yazid M, Fahmi F, Sutanto E, Setiawan R, Aziz M et al (2022) Simple authentication method for vehicle monitoring IoT device with verifiable data integrity. IEEE Internet Things J 10(8):7027–7037

    Google Scholar 

  64. Lu Y, Wang D, Obaidat MS, Vijayakumar P (2022) Edge-assisted intelligent device authentication in cyber-physical systems. IEEE Internet Things J 10(4):3057–3070

    Google Scholar 

  65. Chen F, Xiao Z, Xiang T, Fan J, Truong H-L (2022) A full lifecycle authentication scheme for large-scale smart IoT applications. IEEE Trans Depend Secur Comput 20(3):2221–2237

    Google Scholar 

  66. He D, Cai Y, Zhu S, Zhao Z, Chan S, Guizani M (2023) A lightweight authentication and key exchange protocol with anonymity for IoT. IEEE Trans Wirel Commun. https://doi.org/10.1109/TWC.2023.3257028

    Article  Google Scholar 

  67. Souza A, Carlson I, Ramos HS, Loureiro AA, Oliveira LB (2020) Internet of things device authentication via electromagnetic fingerprints. Eng Rep 2(8):12226

    Google Scholar 

  68. Guin U, Singh A, Alam M, Canedo J, Skjellum A (2018) A secure low-cost edge device authentication scheme for the internet of things. In: 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), pp. 85–90. IEEE

  69. Zhao H, Njilla L (2019) Hardware assisted chaos based iot authentication. In: 2019 IEEE 16th International Conference on Networking, Sensing and Control (ICNSC), pp. 169–174. IEEE

  70. Jain A, Joshi AM (2019) Device authentication in IOT using reconfigurable PUF. In: 2019 2nd IEEE Middle East and North Africa Communications Conference (MENACOMM), pp. 1–4. IEEE

  71. Cao Y, Liu CQ, Chang CH (2018) A low power diode-clamped inverter-based strong physical unclonable function for robust and lightweight authentication. IEEE Trans Circuits Syst I: Regul P 65(11):3864–3873

    Google Scholar 

  72. Yanambaka VP, Mohanty SP, Kougianos E, Puthal D (2019) Pmsec: physical unclonable function-based robust and lightweight authentication in the internet of medical things. IEEE Trans Consum Electron 65(3):388–397

    Google Scholar 

  73. Qureshi MA, Munir A (2020) Puf-ipa: A puf-based identity preserving protocol for internet of things authentication. In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), pp. 1–7. IEEE

  74. Shanta AS, Majumder MB, Hasan MS, Rose GS (2020) Physically unclonable and reconfigurable computing system (PURCS) for hardware security applications. IEEE Trans Comput-Aided Des of Integr Circuit Syst 40(3):405–418

    Google Scholar 

  75. Huang Z, Wang Q (2020) A puf-based unified identity verification framework for secure iot hardware via device authentication. World Wide Web 23(2):1057–1088

    Google Scholar 

  76. Bhatttacharya P, Patel K, Zuhair M, Trivedi C (2022) A lightweight authentication via unclonable functions for industrial internet-of-things. In: 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), 2: 657–662. IEEE

  77. Qureshi MA, Munir A (2021) PUF-rake: A PUF-based robust and lightweight authentication and key establishment protocol. IEEE Trans Depend Secur Comput 19(4):2457–2475

    Google Scholar 

  78. Ebrahimabadi M, Younis M, Karimi N (2021) A PUF-based modeling-attack resilient authentication protocol for IOT devices. IEEE Internet Things J 9(5):3684–3703

    Google Scholar 

  79. Kim B, Yoon S, Kang Y (2021) Puf-based iot device authentication scheme on iot open platform. In: 2021 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1873–1875. IEEE

  80. Yu S, Das AK, Park Y, Lorenz P (2022) Slap-IOD: Secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments. IEEE Trans Veh Technol 71(10):10374–10388

    Google Scholar 

  81. Zerrouki F, Ouchani S, Bouarfa H (2022) PUF-based mutual authentication and session key establishment protocol for IOT devices. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-022-04321-x

    Article  Google Scholar 

  82. Chatterjee B, Das D, Maity S, Sen S (2018) RF-PUF: Enhancing IOT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J 6(1):388–398

    Google Scholar 

  83. Zalivaka SS, Ivaniuk AA, Chang C-H (2018) Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response. IEEE Trans Inf Forens Secur 14(4):1109–1123

    Google Scholar 

  84. Ashtari A, Shabani A, Alizadeh B (2019) A new RF-PUF based authentication of internet of things using random forest classification. In: 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 21–26. IEEE

  85. Najafi F, Kaveh M, Martín D, Reza Mosavi M (2021) Deep PUF: A highly reliable dram PUF-based authentication for IOT networks using deep convolutional neural networks. Sensors 21(6):2009

    Google Scholar 

  86. Sadhu PK, Baul A, Yanambaka VP, Abdelgawad A (2022) Machine learning and PUF based authentication framework for internet of medical things. In: 2022 International Conference on Microelectronics (ICM), pp. 160–163. IEEE

  87. Sengupta A, Ashraf M, Nabeel M, Sinanoglu O (2018) Customized locking of IP blocks on a multi-million-gate soc. In: 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1–7. IEEE

  88. Cui A, Yang Y, Qu G, Li H (2019) A secure and low-overhead active IC metering scheme. In: 2019 IEEE 37th VLSI Test Symposium (VTS), pp. 1–6. IEEE

  89. Williams G, Aizprua J, Alhaddad M, Yang D, BouSaba N, Saqib F (2021) A SOC design of trustzone based key provisioning for FPGA IP protection. In: 2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 874–877. IEEE

  90. Darjani A, Kavand N, Rai S, Wijtvliet M, Kumar A (2022) Entangle: an enhanced logic-locking technique for thwarting sat and structural attacks. In: Proceedings of the Great Lakes Symposium on VLSI 2022, pp. 147–151

  91. Naveenkumar R, Sivamangai N, Napolean A, Puviarasu A, Saranya G (2022) Preventive measure of sat attack by integrating anti-sat on locked circuit for improving hardware security. In: 2022 7th International Conference on Communication and Electronics Systems (ICCES), pp. 756–760. IEEE

  92. Huang X, Cui A, Chang C-H (2017) A new watermarking scheme on scan chain ordering for hard ip protection. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–4. IEEE

  93. Sengupta A, Roy D, Mohanty SP (2017) Triple-phase watermarking for reusable IP core protection during architecture synthesis. IEEE Trans Comput-Aided Des Integr Circuits Syst 37(4):742–755

    Google Scholar 

  94. Sengupta A, Roy D (2018) Reusable intellectual property core protection for both buyer and seller. In: 2018 IEEE International Conference on Consumer Electronics (ICCE), pp. 1–3. IEEE

  95. Shayan M, Basu K, Karri R (2019) Hardware trojans inspired IP watermarks. IEEE Des Test 36(6):72–79

    Google Scholar 

  96. Sengupta A, Rathor M (2020) HLS based IP protection of reusable cores using biometric fingerprint. IEEE Lett Comput Soc 3(2):42–45

    Google Scholar 

  97. Karmakar R, Jana SS, Chattopadhyay S (2020) A cellular automata guided finite-state-machine watermarking strategy for IP protection of sequential circuits. IEEE Trans Emerg Top Comput 10(2):806–823

    Google Scholar 

  98. Chaurasia R, Sengupta A (2022) Symmetrical protection of ownership right’s for ip buyer and ip vendor using facial biometric pairing. In: 2022 IEEE International Symposium on Smart Electronic Systems (iSES), pp. 272–277. IEEE

  99. Jia J, Wu Y, Li A, Ma S, Liu Y (2022) Subnetwork-lossless robust watermarking for hostile theft attacks in deep transfer learning models. IEEE transactions on dependable and secure computing

  100. Biswas AK, Sikdar B (2022) Protecting network-on-chip intellectual property using timing channel fingerprinting. ACM Trans Embed Comput Syst (TECS) 21(2):1–21

    Google Scholar 

  101. Dofe J, Zhang Y, Yu Q (2016) Dsd: a dynamic state-deflection method for gate-level netlist obfuscation. In: 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 565–570. IEEE

  102. Hu B, Tian J, Shihab M, Reddy GR, Swartz W, Makris Y, Schaefer BC, Sechen C (2019) Functional obfuscation of hardware accelerators through selective partial design extraction onto an embedded FPGA. In: proceedings of the 2019 on Great Lakes Symposium on VLSI, pp. 171–176

  103. Olney B, Karam R (2020) Watermarch: IP protection through authenticated obfuscation in FPGA bitstreams. IEEE Embed Syst Lett 13(3):81–84

    Google Scholar 

  104. Sivamangai N, Nissi GA (2022) Hardware obfuscation for IP protection of DSP applications. J Electron Test 38(1):9–20

    Google Scholar 

  105. Alaql A, Chattopadhyay S, Chakraborty P, Hoque T, Bhunia S (2021) Lego: a learning-guided obfuscation framework for hardware IP protection. IEEE Trans Comput-Aided Des Integr Circuits Syst 41(4):854–867

    Google Scholar 

  106. Grailoo M, Reinsalu U, Leier M, Nikoubin T (2022) Hardware-assisted neural network ip protection using non-malicious backdoor and selective weight obfuscation. In: 2022 IEEE 15th Dallas Circuit and System Conference (DCAS), pp. 1–6. IEEE

  107. Rahman MS, Guo R, Kamali HM, Rahman F, Farahmandi F, Abdel-Moneum M, Tehranipoor M (2022) O’clock: lock the clock via clock-gating for SOC IP protection. In: Proceedings of the 59th ACM/IEEE Design Automation Conference, pp. 775–780

  108. Shi Q, Xiao K, Forte D, Tehranipoor MM (2017) Securing split manufactured ICS with wire lifting obfuscated built-in self-authentication. In: Proceedings of the on Great Lakes Symposium on VLSI 2017, pp. 339–344

  109. Patnaik S, Ashraf M, Li H, Knechtel J, Sinanoglu O (2021) Concerted wire lifting: Enabling secure and cost-effective split manufacturing. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

  110. Zhang D, Wang X, Rahman MT, Tehranipoor M (2018) An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies. IEEE Trans Very Large Scale Integr (VLSI) Syst 26(11):2456–2469

    Google Scholar 

  111. Sun P, Cui A (2019) A new pay-per-use scheme for the protection of FPGA IP. In: 2019 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–5. IEEE

  112. Yanambaka VP, Mohanty SP, Kougianos E (2018) Making use of manufacturing process variations: a dopingless transistor based-PUF for hardware-assisted security. IEEE Trans Semicond Manuf 31(2):285–294

    Google Scholar 

  113. Hazari NA, Alsulami F, Niamat M (2018) Fpga ip obfuscation using ring oscillator physical unclonable function. In: NAECON 2018-IEEE National Aerospace and Electronics Conference, pp. 105–108. IEEE

  114. Zhang Y, Li Y, Chen X, Yang J, Hua Y, Yao J (2022) Puf-based secure test wrapper design for network-on-chip. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 181–184. IEEE

  115. Zhang Y, Wang J, Wang P, Xue X, Zeng X (2021) Orthogonal obfuscation based key management for multiple IP protection. Integration 77:139–150

    Google Scholar 

  116. Li D, Liu D, Guo Y, Ren Y, Su J, Liu J (2023) Defending against model extraction attacks with physical unclonable function. Inf Sci 628:196–207

    Google Scholar 

  117. Bhunia S, Tehranipoor M (2018) Hardware Security: a Hands-on Learning Approach. Morgan Kaufmann Publishers Inc., Burlington, p 526

    Google Scholar 

  118. Xue M, Gu C, Liu W, Yu S, O’Neill M (2020) Ten years of hardware trojans: a survey from the attacker’s perspective. IET Comput Digit Techn 14(6):231–246

    Google Scholar 

  119. Zhang J, Yuan F, Wei L, Liu Y, Xu Q (2015) Veritrust: verification for hardware trust. IEEE Trans Comput-Aided Des Integr Circuits Syst 34(7):1148–1161

    Google Scholar 

  120. Chen F, Liu Q (2017) Single-triggered hardware trojan identification based on gate-level circuit structural characteristics. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–4. IEEE

  121. Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–4. IEEE

  122. Surabhi VR, Krishnamurthy P, Amrouch H, Basu K, Henkel J, Karri R, Khorrami F (2020) Hardware trojan detection using controlled circuit aging. IEEE Access 8:77415–77434

    Google Scholar 

  123. Yasaei R, Chen L, Yu S-Y, Al Faruque MA (2022) Hardware trojan detection using graph neural networks. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

  124. Wu L, Zhang X, Wang S, Hu W (2022) Hardware trojan detection at lut: Where structural features meet behavioral characteristics. In: 2022 IEEE international symposium on hardware oriented security and trust (HOST), pp. 121–124. IEEE

  125. Bao C, Forte D, Srivastava A (2015) On reverse engineering-based hardware trojan detection. IEEE Trans Comput-Aided Des Integr Circuits Syst 35(1):49–57

    Google Scholar 

  126. Rajendran S, Regeena ML (2022) A novel algorithm for hardware trojan detection through reverse engineering. IEEE Trans Comput-Aided Des Integr Circuits Syst 41(4):1154–1166. https://doi.org/10.1109/TCAD.2021.3073855

    Article  Google Scholar 

  127. Khalid F, Hasan SR, Zia S, Hasan O, Awwad F, Shafique M (2020) Macler: Machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices. IEEE Trans Comput-Aided Des Integr Circuits Syst 39(11):3748–3761

    Google Scholar 

  128. He J, Guo X, Ma H, Liu Y, Zhao Y, Jin Y (2020) Runtime trust evaluation and hardware trojan detection using on-chip em sensors. In: 2020 57th ACM/IEEE Design Automation Conference (DAC), pp. 1–6. IEEE

  129. Cheng J, Feng Q, Li C, Yang W (2023) Securing FPGAS in IoT: a new run-time monitoring technique against hardware trojan. Wireless Networks, 1–9

  130. Bazzazi A, Shalmani MTM, Hemmatyar AMA (2017) Hardware trojan detection based on logical testing. J Electron Test 33(4):381–395

    Google Scholar 

  131. Cruz J, Farahmandi F, Ahmed A, Mishra P (2018) Hardware trojan detection using atpg and model checking. In: 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), pp. 91–96. IEEE

  132. Chen H, Zhang X, Huang K, Koushanfar F (2023) Adatest: reinforcement learning and adaptive sampling for on-chip hardware trojan detection. ACM Trans Embed Comput Syst 22(2):1–23

    Google Scholar 

  133. He J, Zhao Y, Guo X, Jin Y (2017) Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Trans Very Large Scale Integr (VLSI) Syst 25(10):2939–2948

    Google Scholar 

  134. Amelian A, Borujeni SE (2018) A side-channel analysis for hardware trojan detection based on path delay measurement. J Circuits, Syst Comput 27(09):1850138

    Google Scholar 

  135. Mohammed H, Odetola TA, Hasan SR, Stissi S, Garlin I, Awwad F (2019) (hiadiot): Hardware intrinsic attack detection in internet of things; leveraging power profiling. In: 2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 852–855. IEEE

  136. Guo S, Wang J, Chen Z, Li Y, Lu Z (2020) Securing IoT space via hardware trojan detection. IEEE Internet Things J 7(11):11115–11122

    Google Scholar 

  137. Deepthi S et al (2021) Hardware trojan detection using ring oscillator. In: 2021 6th International Conference on Communication and Electronics Systems (ICCES), pp. 362–368. IEEE

  138. Faezi S, Yasaei R, Barua A, Faruque MAA (2021) Brain-inspired golden chip free hardware trojan detection. IEEE Trans Inf Forens Secur 16:2697–2708. https://doi.org/10.1109/TIFS.2021.3062989

    Article  Google Scholar 

  139. He C, Lei D, Wu H, Cheng L, Huang Q, Yan G (2022) A novel hardware trojan detection method based on sweep-frequency test. Electron Lett 58(23):887–889

    Google Scholar 

  140. Liu P, Wu L, Zhang Z, Xiao D, Zhang X, Wang L (2022) A pca based svm hardware trojan detection approach. In: 2022 IEEE 16th International Conference on Anti-Counterfeiting, Security, and Identification (ASID), pp. 1–5. IEEE

  141. Dong C, He G, Liu X, Yang Y, Guo W (2019) A multi-layer hardware trojan protection framework for IoT chips. IEEE Access 7:23628–23639

    Google Scholar 

  142. Supon TM, Seyedbarhagh M, Rashidzadeh R, Muscedere R (2019) Hardware trojan prevention through limiting access to the active region. In: 2019 14th International Conference on Design & Technology of Integrated Systems in Nanoscale era (DTIS), pp. 1–6. IEEE

  143. Brar NK, Dhindsa A, Agrawal S (2019) Prevention of hardware trojan by reducing unused pins and aes in fpga. In: Recent Findings in Intelligent Computing Techniques: proceedings of the 5th ICACNI 2017. 1: 105–113. Springer

  144. Mobaraki S, Amirkhani A, Atani RE (2018) A novel puf based logic encryption technique to prevent sat attacks and trojan insertion. In: 2018 9th International Symposium on Telecommunications (IST), pp. 507–513. IEEE

  145. Chen L, Wang J, Yin B, Yu K, Han J (2023) A provably secure and PUF-based authentication key agreement scheme for cloud-edge IoT. China Communications

  146. Long J, Liang W, Li K-C, Zhang D, Tang M, Luo H (2019) PUF-based anonymous authentication scheme for hardware devices and IPS in edge computing environment. IEEE Access 7:124785–124796

    Google Scholar 

  147. Abdussami M, Amin R, Vollala S (2022) Lassi: a lightweight authenticated key agreement protocol for fog-enabled IOT deployment. Intl J Inf Secur 21(6):1373–1387

    Google Scholar 

  148. Chatterjee U, Govindan V, Sadhukhan R, Mukhopadhyay D, Chakraborty RS, Mahata D, Prabhu MM (2018) Building PUF based authentication and key exchange protocol for IOT without explicit CRPS in verifier database. IEEE Trans Depend Secur Comput 16(3):424–437

    Google Scholar 

  149. Barbareschi M, De Benedictis A, Mazzocca N (2018) A PUF-based hardware mutual authentication protocol. J Parallel Distrib Comput 119:107–120

    Google Scholar 

  150. Aung PP, Mashiko K, Ismail NB, Yee OC (2019) Evaluation of sram puf characteristics and generation of stable bits for iot security. In: International Conference of Reliable Information and Communication Technology, pp. 441–450. Springer

  151. Sidhu S, Mohd BJ, Hayajneh T (2019) Hardware security in IOT devices with emphasis on hardware trojans. J Sens Actuator Netw 8(3):42

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Aditi Roy wrote the main manuscript text. All authors reviewed the manuscript.

Corresponding author

Correspondence to Aditi Roy.

Ethics declarations

Conflict of interest

The authors whose names are listed certify that they have no affiliations with or involvement in any organization or entity with any financial interest (such as honoraria; educational grants; participation in speakers’ bureaus; membership, employment, consultancies, stock ownership, or other equity interest; and expert testimony or patent-licensing arrangements), or non-financial interest (such as personal or professional relationships, affiliations, knowledge or beliefs) in the subject matter or materials discussed in this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Roy, A., Kokila, J., Ramasubramanian, N. et al. Device-specific security challenges and solution in IoT edge computing: a review. J Supercomput 79, 20790–20825 (2023). https://doi.org/10.1007/s11227-023-05450-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05450-6

Keywords

Navigation