Previous Article in Journal
Personality and Reputation: A Complex Relationship in Virtual Environments
Previous Article in Special Issue
Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices
Article Menu

Export Article

Open AccessReview
Future Internet 2018, 10(12), 121; https://doi.org/10.3390/fi10120121

Exploiting JTAG and Its Mitigation in IOT: A Survey

Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX 78249, USA
*
Author to whom correspondence should be addressed.
Received: 30 October 2018 / Revised: 29 November 2018 / Accepted: 30 November 2018 / Published: 3 December 2018
(This article belongs to the Special Issue IoT Security and Privacy)
Full-Text   |   PDF [1139 KB, uploaded 5 December 2018]   |  

Abstract

Nowadays, companies are heavily investing in the development of “Internet of Things(IoT)” products. These companies usually and obviously hunt for lucrative business models. Currently, each person owns at least 3–4 devices (such as mobiles, personal computers, Google Assistant, Alexa, etc.) that are connected to the Internet 24/7. However, in the future, there might be hundreds of devices that will be constantly online behind each person, keeping track of body health, banking transactions, status of personal devices, etc. to make one’s life more efficient and streamlined. Thus, it is very crucial that each device should be highly secure since one’s life will become dependent on these devices. However, the current security of IoT devices is mainly focused on resiliency of device. In addition, less complex node devices are easily accessible to the public resulting in higher vulnerability. JTAG is an IEEE standard that has been defined to test proper mounting of components on PCBs (printed circuit boards) and has been extensively used by PCB manufacturers to date. This JTAG interface can be used as a backdoor entry to access and exploit devices, also defined as a physical attack. This attack can be used to make products malfunction, modify data, or, in the worst case, stop working. This paper reviews previous successful JTAG exploitations of well-known devices operating online and also reviews some proposed possible solutions to see how they can affect IoT products in a broader sense. View Full-Text
Keywords: Internet of Things; JTAG; exploitation; mitigation; IOT; a survey Internet of Things; JTAG; exploitation; mitigation; IOT; a survey
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Vishwakarma, G.; Lee, W. Exploiting JTAG and Its Mitigation in IOT: A Survey. Future Internet 2018, 10, 121.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top