Visible to the public Remote Attestation based Software Integrity of IoT devices

TitleRemote Attestation based Software Integrity of IoT devices
Publication TypeConference Paper
Year of Publication2019
AuthorsSundar, S., Yellai, P., Sanagapati, S. S. S., Pradhan, P. C., Y, S. K. K. R.
Conference Name2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
Date Publisheddec
Keywordsantivirus, composability, cryptographic operations, cryptographic protocols, cryptography, cyber-physical system security, hashed message authentication code, HMAC, HMAC values, Internet of Things, IoT, IoT devices, message authentication, neural style transfer, Predictive Metrics, pubcrawl, reasonable computational power, Resiliency, Scalability, security issues, software integrity, software trusted platform module, telecommunication security, TPM, Trusted Computing, trusted platform modules, trusted solution
AbstractInternet of Things is the new paradigm towards which the world is moving today. As these devices proliferate, security issues at these scales become more and more intimidating. Traditional approach like an antivirus does not work well with these devices and there is a need to look for a more trusted solution. For a device with reasonable computational power, we use a software trusted platform module for the cryptographic operations. In this paper, we have developed a model to remotely attest to the integrity of the processes running in the device. We have also explored the various features of the TPM (Trusted Platform Module) to gain insight into its working and also to ascertain those which can make this process better. This model depends on the server and the TPM to behave as roots of trust for this model. The client computes the HMAC (Hashed Message Authentication Code) values and appends a nonce and sends these values periodically to the server via asymmetric encryption. The HMAC values are verified by the server by comparing with its known good values (KGV) and the trustworthiness of the process is determined and accordingly an authorization response is sent.
Citation Keysundar_remote_2019