Next Article in Journal
mHealth: Indoor Environmental Quality Measuring System for Enhanced Health and Well-Being Based on Internet of Things
Previous Article in Journal
Subsurface MIMO: A Beamforming Design in Internet of Underground Things for Digital Agriculture Applications
Article Menu

Export Article

Open AccessReview

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

1
Fordham Center for Cybersecurity, Fordham University, New York, NY 10023, USA
2
Department of Computer Engineering, Hashemite University, Zarqa 13115, Jordan
*
Author to whom correspondence should be addressed.
J. Sens. Actuator Netw. 2019, 8(3), 42; https://doi.org/10.3390/jsan8030042
Received: 30 June 2019 / Revised: 26 July 2019 / Accepted: 1 August 2019 / Published: 10 August 2019
  |  
PDF [2087 KB, uploaded 10 August 2019]
  |  

Abstract

Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough. These devices must be protected against sophisticated attacks, especially if the groundwork for the attacks is already laid in devices during design or manufacturing process, such as with HTs. This paper will discuss the stealthy nature of these HT, highlight HT taxonomy and insertion methods, and provide countermeasures. View Full-Text
Keywords: hardware security; security of IoT devices; hardware Trojans; Trojan detection techniques; side-channel analysis; hardware Trojan-based side-channel attacks; hardware Trojan countermeasures hardware security; security of IoT devices; hardware Trojans; Trojan detection techniques; side-channel analysis; hardware Trojan-based side-channel attacks; hardware Trojan countermeasures
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Sidhu, S.; Mohd, B.J.; Hayajneh, T. Hardware Security in IoT Devices with Emphasis on Hardware Trojans. J. Sens. Actuator Netw. 2019, 8, 42.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
J. Sens. Actuator Netw. EISSN 2224-2708 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top