HARDWARE TROJANS IN IOT DEVICES : A SURVEY

Main Article Content

Rishabh Mishra
Kavita Agarwal
Preetam Suman

Abstract

Most of the sectors like medical, manufacturing, entertainment, lifestyles are moving towards automation. It means there is an intelligent system which is used to control and automate all operations.  These automated systems are controlled by programmed processors, which are capable of taking decisions and equipped with expert algorithms. But on the other hand security of these automated devices is an issue. They can be hacked by a hardware or software Trojan. Software Trojan is easy to identify and remove, but hardware Trojan is not very easy task to be found out. This paper is focused on technology developed to detect hardware Trojan. It also presents different types of Trojan and its effects.

 

 

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

“The Internet Of Thingsâ€, ITU Internet Reports, November,2005.

R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, “Trustwor-Thy Hardware: Identifying And Classifying Hardware Trojansâ€, IEEE Computer Society, New York.

Hardware Trojans –Prevention, Detection, Countermeasures By Mark Beaumont, Bradley Hopkins And Tristan Newby ,Defense Science And Technology Organization ,Austria Dsto–Tn–1012

Hardware & Software Security Challenges In Internet Of Things: A Review Sarishka, Neeti kashyap Ijiset - International Journal Of Innovative Science, Engineering & Technology, Vol. 4 Issue 5, May 2017 Issn (Online) 2348 – 7968 | Impact Factor (2016) – 5.264

Security Of The Internet Of Things: Perspectives And Challenges By Qi Jing,Athanasios V. Vasilakos, Jiafu Wan Jingwei Lu, Dechao Qiu . Springer Science + Business Media New York 2014

Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010).Vision And Challenges for Realising the Internet of Things. Cluster Of European Research Projects On The Internet Ofthings—Cerp Iot.

Liu, B., Chen, H., Wang, H. T., & Fu, Y. (2012). Security Analysis And Security Model Research On IOT. Computer & Digital Engineering, 40(11), 21–24.

Xu, X. H. (2013). Study On Security Problems And Key Technologies Of The Internet Of Things. In Proceedings Of The IEEE International Conference On Computing And Information Sciences (Iccis) (Pp. 407–410).

Hamad, F., Smalov, L., & James, A. (2009). Energy-Aware Security In M-Commerce And The Internet Of Things. Iete Techmem Review, 26(5), 357–362.

S. Moein, S. Khan, T. A. Gulliver, F. Gebali And M. W. El-Kharashi, "An Attribute Based Classification Of Hardware Trojans," 2015 Tenth International Conference On Computer Engineering & Systems (Icces), Cairo, 2015, Pp. 351-356.