Ankergård Sigurd Frej Joel Jørgensen, Dushku Edlira, Dragoni Nicola
DTU Compute, Technical University of Denmark (DTU), 2800 Kgs. Lyngby, Denmark.
Sensors (Basel). 2021 Feb 25;21(5):1598. doi: 10.3390/s21051598.
The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-connected devices which are revolutionizing many domains, such as healthcare, transportation, smart cities, to mention only a few. Along with the unprecedented new opportunities, the IoT revolution is creating an enormous attack surface for potential sophisticated cyber attacks. In this context, Remote Attestation (RA) has gained wide interest as an important security technique to remotely detect adversarial presence and assure the legitimate state of an IoT device. While many RA approaches proposed in the literature make different assumptions regarding the architecture of IoT devices and adversary capabilities, most typical RA schemes rely on minimal Root of Trust by leveraging hardware that guarantees code and memory isolation. However, the presence of a specialized hardware is not always a realistic assumption, for instance, in the context of legacy IoT devices and resource-constrained IoT devices. In this paper, we survey and analyze existing software-based RA schemes (i.e., RA schemes not relying on specialized hardware components) through the lens of IoT. In particular, we provide a comprehensive overview of their design characteristics and security capabilities, analyzing their advantages and disadvantages. Finally, we discuss the opportunities that these RA schemes bring in attesting legacy and resource-constrained IoT devices, along with open research issues.
物联网(IoT)生态系统由数十亿个异构的联网设备组成,这些设备正在彻底改变许多领域,仅举几例,如医疗保健、交通运输、智慧城市等。伴随着前所未有的新机遇,物联网革命也为潜在的复杂网络攻击创造了巨大的攻击面。在这种背景下,远程证明(RA)作为一种重要的安全技术,用于远程检测对手的存在并确保物联网设备的合法状态,已引起广泛关注。虽然文献中提出的许多RA方法对物联网设备的架构和对手能力做出了不同假设,但大多数典型的RA方案通过利用保证代码和内存隔离的硬件来依赖最小信任根。然而,例如在传统物联网设备和资源受限的物联网设备的情况下,存在专门硬件并不总是一个现实的假设。在本文中,我们从物联网的角度对现有的基于软件的RA方案(即不依赖专门硬件组件的RA方案)进行了调查和分析。特别是,我们全面概述了它们的设计特点和安全能力,分析了它们的优缺点。最后,我们讨论了这些RA方案在证明传统和资源受限的物联网设备方面带来的机遇,以及开放的研究问题。