Popis: |
This proliferation of smart services and applications caused by IoT and its major role in Industry4.0 revolution will cause the number of connected devices to reach to 20 to 50 billion by 2020.As inany other network, the IoT networks are also susceptible to various cyber security attacks. Theattacks may happen in i) perception layer which comprises of the sensing devices that collect dataii) the network layer through which the data is routed to the application layer or iii) the applicationlayer where the big data is processed to evolve intelligent decisions to constitute for the smartness inthe IoT system. Though currently available significant research outcomes could adapt to counteractthe security issues in the application and network layers, the security concerns in the sensinglayer deserves due interest. This is because the sensing layer has to provide authentication andconfidentiality in order to ensure that the data is received from the authenticated sensors in a securemanner. If the sensed data corresponds to that of individuals, then the concerns of privacy also arise.The existing solutions to provide device authentication and confidentiality rely on extrinsic solutionlike the block chain for device authentication, confidentiality and privacy. This is because thesensing layer comprises mostly of low memory devices on which it is difficult to add software-basedauthentication, data confidentiality and privacy algorithms. Light weight cryptography solutionsare available but again it is not suitable for the miniscule sensors. The heterogeneity of the sensingdevice types and sensors adds momentum to the said device level challenges. Hence, there isneed for the development of device intrinsic hardware based solution(s) to constitute for deviceauthentication, data confidentiality, integrity and privacy preservation of the sensed data using thePhysically Unclonable function(PUF) and Field Programmable Gateway Arrays (FPGA)whichare designed based on Bio-Inspired techniques thereby rendering the perception layer resilient toattacks. The paper is focusing on the meaning of each security goal to the providing solutionfor inbuilt IoT security system. The study finds various IoT security attacks layer by layer andidentifying IoT security goals and their rapport with other layers. Later, we propose a solutionfor hardware inbuilt IoT security and then performed a comprehensive analysis on concerningcost-saving. The results shows that the proposed system reduces cost by 60.16% and and assures61.36% of trust. |