I2Map: IoT Device Attestation Using Integrity Map

Publisher:
Institute of Electrical and Electronics Engineers (IEEE)
Publication Type:
Conference Proceeding
Citation:
Proceedings - 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom/BigDataSE/CSE/EUC/iSCI 2023, 2024, 00, pp. 1900-1907
Issue Date:
2024-05-29
Filename Description Size
1731176.pdfPublished version1.94 MB
Adobe PDF
Full metadata record
The reliability of any IoT system's operation depends upon the accuracy of sensor data. Numerous sensing devices are also embedded in autonomous systems. The adversary can manipulate the output of an IoT device, such as a speed sensor or a temperature sensor, by altering its hardware, software modules, network parameters, or device configuration. These unauthorized changes may affect the legitimate operation of the autonomous system and cause a malfunction or a safety hazard. In addition, the corrupt sensor data may also affect the machine learning models by introducing false training data or biasing the model towards certain decisions to cause the autonomous system to make incorrect decisions. The existing techniques mostly perform memory attestation or ensure the secure execution of an application. In addition, current approaches have unrealistic assumptions about adversaries' capabilities and rely on trusted parties to initiate and run the attestation protocol. No existing technique provides all the required security features, including protection against return-oriented programming and network attacks, including interference, rainbow, and physical compromise. Hence, this research presents a secure and efficient version of a unique hybrid attestation scheme "I2Map"that detects a malicious or malfunctioning IoT device based on an integrity map. The performance analysis infers that I2Map performs better in transaction commit time and transaction costs with more device parameters than its predecessor.
Please use this identifier to cite or link to this item: