Abstract
Rapid growth in IoT technology demands the need for the emergence of new IoT devices. IoT devices vary in terms of shape, size, storage, battery life, and computational power according to the specific purposes for which they are utilized. Also, since IoT devices are geographically dispersed, they are vulnerable to remote/physical attacks. Numerous research works are done to mitigate the challenges using software methods. However, in the last few decades, it is evident that software methods fail to protect IoT devices against hardware threats. The need for preventing hardware attacks drives the researchers to find a solution from a hardware perspective. This paper investigates and examines the security challenges faced by IoT devices by focusing on their hardware aspects. The outcome of the study is presented as a survey, signifying the existing solutions for different challenges. The survey primarily focuses on three major challenges: device authentication, IP protection, and hardware Trojan. Out of the analysis of 111 related schemes, it is clear that 30.6% are PUF-based schemes. A comparative study on the hardware parameter analysis of existing solutions has been performed. From this analysis, a few unresolved issues and directions for future research are identified. We expect this survey to be helpful for the research community working on hardware security challenges faced by IoT devices.
Similar content being viewed by others
Data availability
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
References
Moos T, Moradi A, Richter B (2019) Static power side-channel analysis-an investigation of measurement factors. IEEE Trans Very Large Scale Integr (VLSI) Syst 28(2):376–389
Tang M, Luo M, Zhou J, Yang Z, Guo Z, Yan F, Liu L (2018) Side-channel attacks in a real scenario. Tsinghua Sci Technol 23(5):586–598
Mohammadi S, Jadidoleslamy H (2011) A comparison of physical attacks on wireless sensor networks. Int J Peer Peer Netw 2(2):24–42
Lee I, Lee K (2015) The internet of things (IOT): applications, investments, and challenges for enterprises. Bus Horizons 58(4):431–440
Mark Hung GRVP (ed) (2021) Leading the IoT, Gartner insights on how to lead in a connected world. https://www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf last Accessed on 07 July 2021
Ahmed Z, Danish SM, Qureshi HK, Lestas M (2019) Protecting IOTs from mirai botnet attacks using blockchains. In: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1–6. IEEE
Rajendran G, Nivash RR, Parthy PP, Balamurugan S (2019) Modern security threats in the internet of things (iot): Attacks and countermeasures. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1–6. IEEE
Mohammad Z, Qattam TA, Saleh K (2019) Security weaknesses and attacks on the internet of things applications. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 431–436. IEEE
Tudosa I, Picariello F, Balestrieri E, De Vito L, Lamonaca F (2019) Hardware security in iot era: The role of measurements and instrumentation. In: 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4. 0 &IoT), pp. 285–290. IEEE
Latest research by New Delhi-based think tank CyberPeace Foundation (2021) Surge in cyber attacks on india vaccine makers in oct-nov: report. https://www.cyberpeace.org/surge-in-cyber-attacks-on-india-vaccine-makers-in-oct-nov-report Last Accessed on 07 July 2021
Al-Omary A, Othman A, AlSabbagh HM, Al-Rizzo H (2018) Survey of hardware-based security support for iot/cps systems. KnE Engineering, 52–70
Bhatt S, Ragiri PR et al (2021) Security trends in internet of things: a survey. SN Appl Sci 3(1):1–14
Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M et al (2020) Iot privacy and security: challenges and solutions. Appl Sci 10(12):4102
Yu W, Liang F, He X, Hatcher WG, Lu C, Lin J, Yang X (2017) A survey on the edge computing for the internet of things. IEEE Access 6:6900–6919
Alwarafy A, Al-Thelaya KA, Abdallah M, Schneider J, Hamdi M (2020) A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet Things J 8(6):4004–4022
Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IOT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743
Shamsoshoara A, Korenda A, Afghah F, Zeadally S (2020) A survey on physical unclonable function (puf)-based security solutions for internet of things. Comput Netw 183:107593
Polychronou N-F, Thevenon P-H, Puys M, Beroulle V (2021) A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in IOT/IIOT devices, and their detection mechanisms. ACM Trans Design Autom Electron Syst (TODAES) 27(1):1–35
Liu K, Yang M, Ling Z, Yan H, Zhang Y, Fu X, Zhao W (2020) On manually reverse engineering communication protocols of Linux-based IOT systems. IEEE Internet Things J 8(8):6815–6827
Smith R, Palin D, Ioulianou PP, Vassilakis VG, Shahandashti SF (2020) Battery draining attacks against edge computing nodes in IOT networks. Cyber-Phys Syst 6(2):96–116
Lim S, Lee J, Han D-G (2020) Improved differential fault attack on lea by algebraic representation of modular addition. IEEE Access 8:212794–212802
Devi M, Majumder A (2021) Side-channel attack in internet of things: a survey. In: Applications of Internet of Things: Proceedings of ICCCIOT 2020, pp. 213–222. Springer
Ramasubramanian N, Kokila J (2021) Study of hardware attacks on smart system design lab. Security of internet of things nodes: challenges, attacks, and countermeasures, 233
Zhang J, Wang Z, Yang Z, Zhang Q (2017) Proximity based IOT device authentication. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9. IEEE
Li D, Peng W, Deng W, Gai F (2018) A blockchain-based authentication and security mechanism for IOT. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6. IEEE
Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IOT. IEEE J Sel Areas in Commun 38(5):942–954
Lohachab A et al (2019) ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. J Inf Security Appl 46:1–12
Kumari S, Karuppiah M, Das AK, Li X, Wu F, Kumar N (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74(12):6428–6453
Hasan A, Qureshi K (2018) Internet of things device authentication scheme using hardware serialization. In: 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pp. 109–114. IEEE
Barbareschi M, De Benedictis A, La Montagna E, Mazzeo A, Mazzocca N (2019) A PUF-based mutual authentication scheme for cloud-edges IoT systems. Futur Gener Comput Syst 101:246–261
Farha F, Ning H, Ali K, Chen L, Nugent C (2020) SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices. IEEE Internet Things J 8(7):5904–5913
Liang W, Xie S, Long J, Li K-C, Zhang D, Li K (2019) A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Inf Sci 503:129–147
Fakroon M, Gebali F, Mamun M (2021) Multifactor authentication scheme using physically unclonable functions. Internet Things 13:100343
Zhang J, Qu G (2019) Physical unclonable function-based key sharing via machine learning for IoT security. IEEE Trans Ind Electron 67(8):7025–7033
Thangam T, Gayathri G, Madhubala T (2017) A novel logic locking technique for hardware security. In: 2017 IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE), pp. 1–7. IEEE
Cui A, Qian X, Qu G, Li H (2017) A new active IC metering technique based on locking scan cells. In: 2017 IEEE 26th Asian Test Symposium (ATS), pp. 40–45. IEEE
Kokila J, Ramasubramanian N, Naganathan N (2019) Resource efficient metering scheme for protecting SOC FPGA device and IPS in IoT applications. IEEE Trans Very Large Scale Integr (VLSI) Syst 27(10):2284–2295
Kolhe G, PD SM, Rafatirad S, Mahmoodi H, Sasan A, Homayoun H (2019) On custom LUT-based obfuscation. In: Proceedings of the 2019 on Great Lakes Symposium on VLSI, pp. 477–482
Roy DB, Bhasin S, Nikolić I, Mukhopadhyay D (2019) Combining PUF with RLUTS: A two-party pay-per-device IP licensing scheme on FPGAS. ACM Trans Embed Comput Syst (TECS) 18(2):1–22
Mahmod MJ, Guin U (2020) A robust, low-cost and secure authentication scheme for IoT applications. Cryptography 4(1):8
Gope P, Sikdar B (2018) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580–589
Yilmaz Y, Gunn SR, Halak B (2018) Lightweight PUF-based authentication protocol for IoT devices. In: 2018 IEEE 3rd International Verification and Security Workshop (IVSW), pp. 38–43. IEEE
Mall P, Bhuiyan MZA, Amin R (2019) A lightweight secure communication protocol for iot devices using physically unclonable function. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 26–35. Springer
Dammak M, Boudia ORM, Messous MA, Senouci SM, Gransart C (2019) Token-based lightweight authentication to secure IoT networks. In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1–4. IEEE
Salman O, Abdallah S, Elhajj IH, Chehab A, Kayssi A (2016) Identity-based authentication scheme for the internet of things. In: 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 1109–1111. IEEE
Pacheco J, Hariri S (2016) IoT security framework for smart cyber infrastructures. In: 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS* W), pp. 242–247. IEEE
Ashibani Y, Kauling D, Mahmoud QH (2017) A context-aware authentication framework for smart homes. In: 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–5. IEEE
Li M, Tang H, Hussein AR, Wang X (2020) A sidechain-based decentralized authentication scheme via optimized two-way peg protocol for smart community. IEEE Open J Commun Soc 1:282–292
Zhaofeng M, Jialin M, Jihui W, Zhiguang S (2020) Blockchain-based decentralized authentication modeling scheme in edge and IoT environment. IEEE Internet Things J 8(4):2116–2123
Zhang Y, Xiang Y, Wu W, Alelaiwi A (2018) A variant of password authenticated key exchange protocol. Futur Gener Comput Syst 78:699–711
AlQahtani AAS, Alamleh H, Al Smadi B (2022) Iot devices proximity authentication in ad hoc network environment. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1–5. IEEE
Mohanty SP, Yanambaka VP, Kougianos E, Puthal D (2020) Pufchain: a hardware-assisted blockchain for sustainable simultaneous device and data security in the internet of everything (IOE). IEEE Consum Electron Mag 9(2):8–16
Wang S, Li H, Chen J, Wang J, Deng Y (2022) Dag blockchain-based lightweight authentication and authorization scheme for IOT devices. J Inf Secur Appl 66:103134
Vivekanandan M, USR (2021) Bidapsca5g: Blockchain based internet of things (iot) device to device authentication protocol for smart city applications using 5g technology. Peer-to-Peer networking and applications 14:403–419
Deebak B, Memon FH, Khowaja SA, Dev K, Wang W, Qureshi NMF, Su C (2022) Lightweight blockchain-based remote mutual authentication for AI-empowered IoT sustainable computing systems. IEEE Internet Things J 10(8):6652–6660
Mukhandi M, Damião F, Granjal J, Vilela JP (2022) Blockchain-based device identity management with consensus authentication for iot devices. In: 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), pp. 433–436. IEEE
Yao H, Yan Q, Fu X, Zhang Z, Lan C (2022) ECC-based lightweight authentication and access control scheme for IOT e-healthcare. Soft Comput 26:4441–4461
Alizai ZA, Tareen NF, Jadoon I (2018) Improved IOT device authentication scheme using device capability and digital signatures. In: 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pp. 1–5. IEEE
Shah T, Venkatesan S (2018) Authentication of IoT device and IoT server using secure vaults. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 819–824. IEEE
Wazid M, Das AK, Shetty S, Rodrigues JPC, Park Y (2019) LDAKM-EIOT: lightweight device authentication and key management mechanism for edge-based IoT deployment. Sensors 19(24):5539
Shahidinejad A, Ghobaei-Arani M, Souri A, Shojafar M, Kumari S (2021) Light-edge: a lightweight authentication protocol for IoT devices in an edge-cloud environment. IEEE Consum Electron Mag 11(2):57–63
Gupta BB, Gaurav A, Chui KT, Hsu C-H (2022) Identity-based authentication technique for iot devices. In: 2022 IEEE International Conference on consumer Electronics (ICCE), pp. 1–4. IEEE
Yazid M, Fahmi F, Sutanto E, Setiawan R, Aziz M et al (2022) Simple authentication method for vehicle monitoring IoT device with verifiable data integrity. IEEE Internet Things J 10(8):7027–7037
Lu Y, Wang D, Obaidat MS, Vijayakumar P (2022) Edge-assisted intelligent device authentication in cyber-physical systems. IEEE Internet Things J 10(4):3057–3070
Chen F, Xiao Z, Xiang T, Fan J, Truong H-L (2022) A full lifecycle authentication scheme for large-scale smart IoT applications. IEEE Trans Depend Secur Comput 20(3):2221–2237
He D, Cai Y, Zhu S, Zhao Z, Chan S, Guizani M (2023) A lightweight authentication and key exchange protocol with anonymity for IoT. IEEE Trans Wirel Commun. https://doi.org/10.1109/TWC.2023.3257028
Souza A, Carlson I, Ramos HS, Loureiro AA, Oliveira LB (2020) Internet of things device authentication via electromagnetic fingerprints. Eng Rep 2(8):12226
Guin U, Singh A, Alam M, Canedo J, Skjellum A (2018) A secure low-cost edge device authentication scheme for the internet of things. In: 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), pp. 85–90. IEEE
Zhao H, Njilla L (2019) Hardware assisted chaos based iot authentication. In: 2019 IEEE 16th International Conference on Networking, Sensing and Control (ICNSC), pp. 169–174. IEEE
Jain A, Joshi AM (2019) Device authentication in IOT using reconfigurable PUF. In: 2019 2nd IEEE Middle East and North Africa Communications Conference (MENACOMM), pp. 1–4. IEEE
Cao Y, Liu CQ, Chang CH (2018) A low power diode-clamped inverter-based strong physical unclonable function for robust and lightweight authentication. IEEE Trans Circuits Syst I: Regul P 65(11):3864–3873
Yanambaka VP, Mohanty SP, Kougianos E, Puthal D (2019) Pmsec: physical unclonable function-based robust and lightweight authentication in the internet of medical things. IEEE Trans Consum Electron 65(3):388–397
Qureshi MA, Munir A (2020) Puf-ipa: A puf-based identity preserving protocol for internet of things authentication. In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), pp. 1–7. IEEE
Shanta AS, Majumder MB, Hasan MS, Rose GS (2020) Physically unclonable and reconfigurable computing system (PURCS) for hardware security applications. IEEE Trans Comput-Aided Des of Integr Circuit Syst 40(3):405–418
Huang Z, Wang Q (2020) A puf-based unified identity verification framework for secure iot hardware via device authentication. World Wide Web 23(2):1057–1088
Bhatttacharya P, Patel K, Zuhair M, Trivedi C (2022) A lightweight authentication via unclonable functions for industrial internet-of-things. In: 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), 2: 657–662. IEEE
Qureshi MA, Munir A (2021) PUF-rake: A PUF-based robust and lightweight authentication and key establishment protocol. IEEE Trans Depend Secur Comput 19(4):2457–2475
Ebrahimabadi M, Younis M, Karimi N (2021) A PUF-based modeling-attack resilient authentication protocol for IOT devices. IEEE Internet Things J 9(5):3684–3703
Kim B, Yoon S, Kang Y (2021) Puf-based iot device authentication scheme on iot open platform. In: 2021 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1873–1875. IEEE
Yu S, Das AK, Park Y, Lorenz P (2022) Slap-IOD: Secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments. IEEE Trans Veh Technol 71(10):10374–10388
Zerrouki F, Ouchani S, Bouarfa H (2022) PUF-based mutual authentication and session key establishment protocol for IOT devices. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-022-04321-x
Chatterjee B, Das D, Maity S, Sen S (2018) RF-PUF: Enhancing IOT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J 6(1):388–398
Zalivaka SS, Ivaniuk AA, Chang C-H (2018) Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response. IEEE Trans Inf Forens Secur 14(4):1109–1123
Ashtari A, Shabani A, Alizadeh B (2019) A new RF-PUF based authentication of internet of things using random forest classification. In: 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 21–26. IEEE
Najafi F, Kaveh M, Martín D, Reza Mosavi M (2021) Deep PUF: A highly reliable dram PUF-based authentication for IOT networks using deep convolutional neural networks. Sensors 21(6):2009
Sadhu PK, Baul A, Yanambaka VP, Abdelgawad A (2022) Machine learning and PUF based authentication framework for internet of medical things. In: 2022 International Conference on Microelectronics (ICM), pp. 160–163. IEEE
Sengupta A, Ashraf M, Nabeel M, Sinanoglu O (2018) Customized locking of IP blocks on a multi-million-gate soc. In: 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1–7. IEEE
Cui A, Yang Y, Qu G, Li H (2019) A secure and low-overhead active IC metering scheme. In: 2019 IEEE 37th VLSI Test Symposium (VTS), pp. 1–6. IEEE
Williams G, Aizprua J, Alhaddad M, Yang D, BouSaba N, Saqib F (2021) A SOC design of trustzone based key provisioning for FPGA IP protection. In: 2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 874–877. IEEE
Darjani A, Kavand N, Rai S, Wijtvliet M, Kumar A (2022) Entangle: an enhanced logic-locking technique for thwarting sat and structural attacks. In: Proceedings of the Great Lakes Symposium on VLSI 2022, pp. 147–151
Naveenkumar R, Sivamangai N, Napolean A, Puviarasu A, Saranya G (2022) Preventive measure of sat attack by integrating anti-sat on locked circuit for improving hardware security. In: 2022 7th International Conference on Communication and Electronics Systems (ICCES), pp. 756–760. IEEE
Huang X, Cui A, Chang C-H (2017) A new watermarking scheme on scan chain ordering for hard ip protection. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–4. IEEE
Sengupta A, Roy D, Mohanty SP (2017) Triple-phase watermarking for reusable IP core protection during architecture synthesis. IEEE Trans Comput-Aided Des Integr Circuits Syst 37(4):742–755
Sengupta A, Roy D (2018) Reusable intellectual property core protection for both buyer and seller. In: 2018 IEEE International Conference on Consumer Electronics (ICCE), pp. 1–3. IEEE
Shayan M, Basu K, Karri R (2019) Hardware trojans inspired IP watermarks. IEEE Des Test 36(6):72–79
Sengupta A, Rathor M (2020) HLS based IP protection of reusable cores using biometric fingerprint. IEEE Lett Comput Soc 3(2):42–45
Karmakar R, Jana SS, Chattopadhyay S (2020) A cellular automata guided finite-state-machine watermarking strategy for IP protection of sequential circuits. IEEE Trans Emerg Top Comput 10(2):806–823
Chaurasia R, Sengupta A (2022) Symmetrical protection of ownership right’s for ip buyer and ip vendor using facial biometric pairing. In: 2022 IEEE International Symposium on Smart Electronic Systems (iSES), pp. 272–277. IEEE
Jia J, Wu Y, Li A, Ma S, Liu Y (2022) Subnetwork-lossless robust watermarking for hostile theft attacks in deep transfer learning models. IEEE transactions on dependable and secure computing
Biswas AK, Sikdar B (2022) Protecting network-on-chip intellectual property using timing channel fingerprinting. ACM Trans Embed Comput Syst (TECS) 21(2):1–21
Dofe J, Zhang Y, Yu Q (2016) Dsd: a dynamic state-deflection method for gate-level netlist obfuscation. In: 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 565–570. IEEE
Hu B, Tian J, Shihab M, Reddy GR, Swartz W, Makris Y, Schaefer BC, Sechen C (2019) Functional obfuscation of hardware accelerators through selective partial design extraction onto an embedded FPGA. In: proceedings of the 2019 on Great Lakes Symposium on VLSI, pp. 171–176
Olney B, Karam R (2020) Watermarch: IP protection through authenticated obfuscation in FPGA bitstreams. IEEE Embed Syst Lett 13(3):81–84
Sivamangai N, Nissi GA (2022) Hardware obfuscation for IP protection of DSP applications. J Electron Test 38(1):9–20
Alaql A, Chattopadhyay S, Chakraborty P, Hoque T, Bhunia S (2021) Lego: a learning-guided obfuscation framework for hardware IP protection. IEEE Trans Comput-Aided Des Integr Circuits Syst 41(4):854–867
Grailoo M, Reinsalu U, Leier M, Nikoubin T (2022) Hardware-assisted neural network ip protection using non-malicious backdoor and selective weight obfuscation. In: 2022 IEEE 15th Dallas Circuit and System Conference (DCAS), pp. 1–6. IEEE
Rahman MS, Guo R, Kamali HM, Rahman F, Farahmandi F, Abdel-Moneum M, Tehranipoor M (2022) O’clock: lock the clock via clock-gating for SOC IP protection. In: Proceedings of the 59th ACM/IEEE Design Automation Conference, pp. 775–780
Shi Q, Xiao K, Forte D, Tehranipoor MM (2017) Securing split manufactured ICS with wire lifting obfuscated built-in self-authentication. In: Proceedings of the on Great Lakes Symposium on VLSI 2017, pp. 339–344
Patnaik S, Ashraf M, Li H, Knechtel J, Sinanoglu O (2021) Concerted wire lifting: Enabling secure and cost-effective split manufacturing. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Zhang D, Wang X, Rahman MT, Tehranipoor M (2018) An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies. IEEE Trans Very Large Scale Integr (VLSI) Syst 26(11):2456–2469
Sun P, Cui A (2019) A new pay-per-use scheme for the protection of FPGA IP. In: 2019 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–5. IEEE
Yanambaka VP, Mohanty SP, Kougianos E (2018) Making use of manufacturing process variations: a dopingless transistor based-PUF for hardware-assisted security. IEEE Trans Semicond Manuf 31(2):285–294
Hazari NA, Alsulami F, Niamat M (2018) Fpga ip obfuscation using ring oscillator physical unclonable function. In: NAECON 2018-IEEE National Aerospace and Electronics Conference, pp. 105–108. IEEE
Zhang Y, Li Y, Chen X, Yang J, Hua Y, Yao J (2022) Puf-based secure test wrapper design for network-on-chip. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 181–184. IEEE
Zhang Y, Wang J, Wang P, Xue X, Zeng X (2021) Orthogonal obfuscation based key management for multiple IP protection. Integration 77:139–150
Li D, Liu D, Guo Y, Ren Y, Su J, Liu J (2023) Defending against model extraction attacks with physical unclonable function. Inf Sci 628:196–207
Bhunia S, Tehranipoor M (2018) Hardware Security: a Hands-on Learning Approach. Morgan Kaufmann Publishers Inc., Burlington, p 526
Xue M, Gu C, Liu W, Yu S, O’Neill M (2020) Ten years of hardware trojans: a survey from the attacker’s perspective. IET Comput Digit Techn 14(6):231–246
Zhang J, Yuan F, Wei L, Liu Y, Xu Q (2015) Veritrust: verification for hardware trust. IEEE Trans Comput-Aided Des Integr Circuits Syst 34(7):1148–1161
Chen F, Liu Q (2017) Single-triggered hardware trojan identification based on gate-level circuit structural characteristics. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–4. IEEE
Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–4. IEEE
Surabhi VR, Krishnamurthy P, Amrouch H, Basu K, Henkel J, Karri R, Khorrami F (2020) Hardware trojan detection using controlled circuit aging. IEEE Access 8:77415–77434
Yasaei R, Chen L, Yu S-Y, Al Faruque MA (2022) Hardware trojan detection using graph neural networks. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Wu L, Zhang X, Wang S, Hu W (2022) Hardware trojan detection at lut: Where structural features meet behavioral characteristics. In: 2022 IEEE international symposium on hardware oriented security and trust (HOST), pp. 121–124. IEEE
Bao C, Forte D, Srivastava A (2015) On reverse engineering-based hardware trojan detection. IEEE Trans Comput-Aided Des Integr Circuits Syst 35(1):49–57
Rajendran S, Regeena ML (2022) A novel algorithm for hardware trojan detection through reverse engineering. IEEE Trans Comput-Aided Des Integr Circuits Syst 41(4):1154–1166. https://doi.org/10.1109/TCAD.2021.3073855
Khalid F, Hasan SR, Zia S, Hasan O, Awwad F, Shafique M (2020) Macler: Machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices. IEEE Trans Comput-Aided Des Integr Circuits Syst 39(11):3748–3761
He J, Guo X, Ma H, Liu Y, Zhao Y, Jin Y (2020) Runtime trust evaluation and hardware trojan detection using on-chip em sensors. In: 2020 57th ACM/IEEE Design Automation Conference (DAC), pp. 1–6. IEEE
Cheng J, Feng Q, Li C, Yang W (2023) Securing FPGAS in IoT: a new run-time monitoring technique against hardware trojan. Wireless Networks, 1–9
Bazzazi A, Shalmani MTM, Hemmatyar AMA (2017) Hardware trojan detection based on logical testing. J Electron Test 33(4):381–395
Cruz J, Farahmandi F, Ahmed A, Mishra P (2018) Hardware trojan detection using atpg and model checking. In: 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), pp. 91–96. IEEE
Chen H, Zhang X, Huang K, Koushanfar F (2023) Adatest: reinforcement learning and adaptive sampling for on-chip hardware trojan detection. ACM Trans Embed Comput Syst 22(2):1–23
He J, Zhao Y, Guo X, Jin Y (2017) Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Trans Very Large Scale Integr (VLSI) Syst 25(10):2939–2948
Amelian A, Borujeni SE (2018) A side-channel analysis for hardware trojan detection based on path delay measurement. J Circuits, Syst Comput 27(09):1850138
Mohammed H, Odetola TA, Hasan SR, Stissi S, Garlin I, Awwad F (2019) (hiadiot): Hardware intrinsic attack detection in internet of things; leveraging power profiling. In: 2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 852–855. IEEE
Guo S, Wang J, Chen Z, Li Y, Lu Z (2020) Securing IoT space via hardware trojan detection. IEEE Internet Things J 7(11):11115–11122
Deepthi S et al (2021) Hardware trojan detection using ring oscillator. In: 2021 6th International Conference on Communication and Electronics Systems (ICCES), pp. 362–368. IEEE
Faezi S, Yasaei R, Barua A, Faruque MAA (2021) Brain-inspired golden chip free hardware trojan detection. IEEE Trans Inf Forens Secur 16:2697–2708. https://doi.org/10.1109/TIFS.2021.3062989
He C, Lei D, Wu H, Cheng L, Huang Q, Yan G (2022) A novel hardware trojan detection method based on sweep-frequency test. Electron Lett 58(23):887–889
Liu P, Wu L, Zhang Z, Xiao D, Zhang X, Wang L (2022) A pca based svm hardware trojan detection approach. In: 2022 IEEE 16th International Conference on Anti-Counterfeiting, Security, and Identification (ASID), pp. 1–5. IEEE
Dong C, He G, Liu X, Yang Y, Guo W (2019) A multi-layer hardware trojan protection framework for IoT chips. IEEE Access 7:23628–23639
Supon TM, Seyedbarhagh M, Rashidzadeh R, Muscedere R (2019) Hardware trojan prevention through limiting access to the active region. In: 2019 14th International Conference on Design & Technology of Integrated Systems in Nanoscale era (DTIS), pp. 1–6. IEEE
Brar NK, Dhindsa A, Agrawal S (2019) Prevention of hardware trojan by reducing unused pins and aes in fpga. In: Recent Findings in Intelligent Computing Techniques: proceedings of the 5th ICACNI 2017. 1: 105–113. Springer
Mobaraki S, Amirkhani A, Atani RE (2018) A novel puf based logic encryption technique to prevent sat attacks and trojan insertion. In: 2018 9th International Symposium on Telecommunications (IST), pp. 507–513. IEEE
Chen L, Wang J, Yin B, Yu K, Han J (2023) A provably secure and PUF-based authentication key agreement scheme for cloud-edge IoT. China Communications
Long J, Liang W, Li K-C, Zhang D, Tang M, Luo H (2019) PUF-based anonymous authentication scheme for hardware devices and IPS in edge computing environment. IEEE Access 7:124785–124796
Abdussami M, Amin R, Vollala S (2022) Lassi: a lightweight authenticated key agreement protocol for fog-enabled IOT deployment. Intl J Inf Secur 21(6):1373–1387
Chatterjee U, Govindan V, Sadhukhan R, Mukhopadhyay D, Chakraborty RS, Mahata D, Prabhu MM (2018) Building PUF based authentication and key exchange protocol for IOT without explicit CRPS in verifier database. IEEE Trans Depend Secur Comput 16(3):424–437
Barbareschi M, De Benedictis A, Mazzocca N (2018) A PUF-based hardware mutual authentication protocol. J Parallel Distrib Comput 119:107–120
Aung PP, Mashiko K, Ismail NB, Yee OC (2019) Evaluation of sram puf characteristics and generation of stable bits for iot security. In: International Conference of Reliable Information and Communication Technology, pp. 441–450. Springer
Sidhu S, Mohd BJ, Hayajneh T (2019) Hardware security in IOT devices with emphasis on hardware trojans. J Sens Actuator Netw 8(3):42
Author information
Authors and Affiliations
Contributions
Aditi Roy wrote the main manuscript text. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors whose names are listed certify that they have no affiliations with or involvement in any organization or entity with any financial interest (such as honoraria; educational grants; participation in speakers’ bureaus; membership, employment, consultancies, stock ownership, or other equity interest; and expert testimony or patent-licensing arrangements), or non-financial interest (such as personal or professional relationships, affiliations, knowledge or beliefs) in the subject matter or materials discussed in this manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Roy, A., Kokila, J., Ramasubramanian, N. et al. Device-specific security challenges and solution in IoT edge computing: a review. J Supercomput 79, 20790–20825 (2023). https://doi.org/10.1007/s11227-023-05450-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05450-6