HARDWARE TROJANS IN IOT DEVICES : A SURVEY
Main Article Content
Abstract
Most of the sectors like medical, manufacturing, entertainment, lifestyles are moving towards automation. It means there is an intelligent system which is used to control and automate all operations. These automated systems are controlled by programmed processors, which are capable of taking decisions and equipped with expert algorithms. But on the other hand security of these automated devices is an issue. They can be hacked by a hardware or software Trojan. Software Trojan is easy to identify and remove, but hardware Trojan is not very easy task to be found out. This paper is focused on technology developed to detect hardware Trojan. It also presents different types of Trojan and its effects.
Â
Â
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
“The Internet Of Thingsâ€, ITU Internet Reports, November,2005.
R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, “Trustwor-Thy Hardware: Identifying And Classifying Hardware Trojansâ€, IEEE Computer Society, New York.
Hardware Trojans –Prevention, Detection, Countermeasures By Mark Beaumont, Bradley Hopkins And Tristan Newby ,Defense Science And Technology Organization ,Austria Dsto–Tn–1012
Hardware & Software Security Challenges In Internet Of Things: A Review Sarishka, Neeti kashyap Ijiset - International Journal Of Innovative Science, Engineering & Technology, Vol. 4 Issue 5, May 2017 Issn (Online) 2348 – 7968 | Impact Factor (2016) – 5.264
Security Of The Internet Of Things: Perspectives And Challenges By Qi Jing,Athanasios V. Vasilakos, Jiafu Wan Jingwei Lu, Dechao Qiu . Springer Science + Business Media New York 2014
Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010).Vision And Challenges for Realising the Internet of Things. Cluster Of European Research Projects On The Internet Ofthings—Cerp Iot.
Liu, B., Chen, H., Wang, H. T., & Fu, Y. (2012). Security Analysis And Security Model Research On IOT. Computer & Digital Engineering, 40(11), 21–24.
Xu, X. H. (2013). Study On Security Problems And Key Technologies Of The Internet Of Things. In Proceedings Of The IEEE International Conference On Computing And Information Sciences (Iccis) (Pp. 407–410).
Hamad, F., Smalov, L., & James, A. (2009). Energy-Aware Security In M-Commerce And The Internet Of Things. Iete Techmem Review, 26(5), 357–362.
S. Moein, S. Khan, T. A. Gulliver, F. Gebali And M. W. El-Kharashi, "An Attribute Based Classification Of Hardware Trojans," 2015 Tenth International Conference On Computer Engineering & Systems (Icces), Cairo, 2015, Pp. 351-356.