About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Secure Edge Computing with Lightweight Control-Flow Property-based Attestation

In Proceedings of 1st International Workshop on Cyber-security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures — 2019, pp. 84-92
From

University of Piraeus1

Ubitech Ltd.2

University of Surrey3

Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark4

Department of Applied Mathematics and Computer Science, Technical University of Denmark5

The Internet of Things (IoT) is rapidly evolving, while introducing several new challenges regarding security, resilience and operational assurance. In the face of an increasing attack landscape, it is necessary to cater for the provision of efficient mechanisms to collectively verify software- and deviceintegrity in order to detect run-time modifications.

Towards this direction, remote attestation has been proposed as a promising defense mechanism. It allows a third party, the verifier, to ensure the integrity of a remote device, the prover. However, this family of solutions do not capture the real-time requirements of industrial IoT applications and suffer from scalability and efficiency issues.

In this paper, we present a lightweight dynamic control-flow property-based attestation architecture (CFPA) that can be applied on both resource-constrained edge and cloud devices and services. It is a first step towards a new line of security mechanisms that enables the provision of control-flow attestation of only those specific, critical software components that are comparatively small, simple and limited in function, thus, allowing for a much more efficient verication.

Our goal is to enhance run-time software integrity and trustworthiness with a scalable and decentralized solution eliminating the need for federated infrastructure trust. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them, so that security do not hinder the deployment of intelligent edge computing systems.

Language: English
Publisher: IEEE
Year: 2019
Pages: 84-92
Proceedings: 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures
ISBN: 1538693763 , 1538693771 , 9781538693766 and 9781538693773
Types: Conference paper
DOI: 10.1109/NETSOFT.2019.8806658

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis