Next Article in Journal
mHealth: Indoor Environmental Quality Measuring System for Enhanced Health and Well-Being Based on Internet of Things
Previous Article in Journal
Subsurface MIMO: A Beamforming Design in Internet of Underground Things for Digital Agriculture Applications
Open AccessReview

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

1
Fordham Center for Cybersecurity, Fordham University, New York, NY 10023, USA
2
Department of Computer Engineering, Hashemite University, Zarqa 13115, Jordan
*
Author to whom correspondence should be addressed.
J. Sens. Actuator Netw. 2019, 8(3), 42; https://doi.org/10.3390/jsan8030042
Received: 30 June 2019 / Revised: 26 July 2019 / Accepted: 1 August 2019 / Published: 10 August 2019
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough. These devices must be protected against sophisticated attacks, especially if the groundwork for the attacks is already laid in devices during design or manufacturing process, such as with HTs. This paper will discuss the stealthy nature of these HT, highlight HT taxonomy and insertion methods, and provide countermeasures. View Full-Text
Keywords: hardware security; security of IoT devices; hardware Trojans; Trojan detection techniques; side-channel analysis; hardware Trojan-based side-channel attacks; hardware Trojan countermeasures hardware security; security of IoT devices; hardware Trojans; Trojan detection techniques; side-channel analysis; hardware Trojan-based side-channel attacks; hardware Trojan countermeasures
Show Figures

Figure 1

MDPI and ACS Style

Sidhu, S.; Mohd, B.J.; Hayajneh, T. Hardware Security in IoT Devices with Emphasis on Hardware Trojans. J. Sens. Actuator Netw. 2019, 8, 42.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop