Skip to main content

Enhancing Security and Trust of IoT Devices–Internet of Secured Things (IoST)

  • Conference paper
  • First Online:
Research in Intelligent and Computing in Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1254))

  • 1145 Accesses

Abstract

Internet of things has infiltrated all corners of the world by providing distributed intelligence to all objects making them smart. From small wearables to smart homes to smart cities, IoT has proven to be a substantial part in all facets of life. Safety of the data collected from IoT devices that can make a whole city smarter is of utmost importance. On such a large scale, one malignant intrusion can lead to leakage of thousands of public data, thereby compromising privacy. On an international level, this leads to various complications in military, friendship among nations, suppressing terrorism, etc. Most of the current methods of securing IoT devices deal with the network and application layer. This paper deals with a simple yet very efficient method of securing IoT devices in the physical layer before it hits the market. These devices are called Internet of Secured Things (IoST) devices. It also takes into consideration the importance of variations in timing, power and area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integ (VLSI) Syst 20(1):112–125

    Article  Google Scholar 

  2. Banga M, Hsiao MS (2008) A region based approach for the identification of hardware Trojans. In: 2008 IEEE international workshop on hardware-oriented security and trust, Anaheim, CA, pp 40–47

    Google Scholar 

  3. Xiaoxiao W, Tehranipoor M, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: Challenges and solutions, pp 15–19. https://doi.org/10.1109/hst.2008.4559039

  4. Hayes B (2008) Cloud computing. Commun ACM 51(7):9–11 10.1145/1364782.1364786

    Article  Google Scholar 

  5. Vurukonda Naresh, Rao Dr, Thirumala B (2016) A study on data storage security issues in cloud computing. Procedia Comput Sci 92:128–135. https://doi.org/10.1016/j.procs.2016.07.335

    Article  Google Scholar 

  6. http://www.cse.psu.edu/~kxc104/class/cmpen411/14f/lec/C411L14LowPower2.pdf

  7. Noor MM, Hassan W (2018) Current research on internet of things (IoT) security: a survey. Comput Netw 148. https://doi.org/10.1016/j.comnet.2018.11.025

  8. Reddy DM, Akshay KP, Giridhar R, Karan SD, Mohankumar N (2017) BHARKS: Built-in hardware authentication using random key sequence. In: 2017 4th International conference on signal processing computing and control (ISPCC), Solan, pp 200–204

    Google Scholar 

  9. Atzori L et al (2010) The internet of things: a survey. Comput, Netw

    MATH  Google Scholar 

  10. Koneru et al (2018) HAPMAD: Hardware-based authentication platform for malicious activity detection in digital circuits. In: Information systems design and intelligent applications, Springer, pp 608–617. https://doi.org/10.1007/978-981-10-7512-4_60

  11. Chakraborty RS, Narasimhan S, Bhunia S (2009) Hardware trojan: threats and emerging solutions. In: 2009 IEEE international high level design validation and test workshop, San Francisco, CA, pp 166–171

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Mohankumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rohini, B., Nayak, A.R., Mohankumar, N. (2021). Enhancing Security and Trust of IoT Devices–Internet of Secured Things (IoST). In: Kumar, R., Quang, N.H., Kumar Solanki, V., Cardona, M., Pattnaik, P.K. (eds) Research in Intelligent and Computing in Engineering. Advances in Intelligent Systems and Computing, vol 1254. Springer, Singapore. https://doi.org/10.1007/978-981-15-7527-3_2

Download citation

Publish with us

Policies and ethics