Next Article in Journal
A Real-Time Vehicle Detection System under Various Bad Weather Conditions Based on a Deep Learning Model without Retraining
Previous Article in Journal
Deep Learning-Based Violin Bowing Action Recognition
Previous Article in Special Issue
RELIABLE: Resource Allocation Mechanism for 5G Network using Mobile Edge Computing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Hardware Security of Fog End-Devices for the Internet of Things

by
Ismail Butun
1,2,*,†,
Alparslan Sari
3,*,† and
Patrik Österberg
4
1
Department of Computer Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden
2
Department of Computer Engineering, Konya Food and Agriculture University, 42080 Konya, Turkey
3
Department of Electrical and Computer Engineering, University of Delaware, Newark, DE 19716, USA
4
Department of Information Systems and Technology, Mid Sweden University, 851 70 Sundsvall, Sweden
*
Authors to whom correspondence should be addressed.
These authors have contributed equally to this work.
Sensors 2020, 20(20), 5729; https://doi.org/10.3390/s20205729
Submission received: 1 August 2020 / Revised: 2 October 2020 / Accepted: 3 October 2020 / Published: 9 October 2020

Abstract

:
The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.

1. Introduction

The Internet of Things (IoT) is having its boom phase now, as the Internet had two decades ago. The IoT market is growing and expected to increase from more than 15 billion devices in 2016 to more than 75 billion by 2025 [1]. Following this trend, the number of deployed IoT devices has already passed the total population of Earth. Furthermore, in the last decade, the proliferation of mobile computing has expanded exponentially. It is expected to continue its pace this way to result in each person on Earth having an average of six connected devices [2]. In order to keep this rapid growth and the huge consumer market it possesses, IoT needs a rigid technological foundation supported by the scientific community. Fog computing is a very strong candidate to provide this foundation (in parts or totally) for IoT, by providing several advantages, in terms of computational, architectural, and networking point of view [3].
Emerging from recent trends and needs, cloud computing and IoT will serve as complementary technologies of the Internet in the near future, by forming the concept called Cloud of Things (CoT). CoT will be leveraged as Things as a Service (TaaS) for cloud based IoT applications, for offloading high energy consuming tasks and operations to the cloud. TaaS will support innovative scenarios and use cases, breath-taking services along with ubiquitous and value added applications to enable CoT to be accessible by the users. In the meantime, fog computing and all virtual/real services associated with it can be thought of an intermediate layer to rapidly process the data at the edge of the network, serving the fast response need of the agile applications [2,4].
The fog layer can also leveraged as the security layer to provide necessary privacy and security functions to protect the data before it is offloaded to the cloud through insecure and vulnerable channel [2].

1.1. Why Security Is Crucial for IoT and Fog?

As being a centralized resource out of users’ reach and control, the cloud computing environment represents every possible opportunity to violate user privacy. Undoubtedly, privacy is becoming a desired luxury today, a situation that will be exacerbated with the proliferation of the IoT devices everywhere surrounding us [5]. We have started to observe more IoT security related news than ever. For instance, Mirai and its’ variant botnet attacks have shown that IoT botnets can be very effective with large-scale deployments to execute Distributed Denial of Service (DDoS) attacks. Recently, Japan announced that 200 million deployed IoT devices were going to be investigated by white-hat hackers. These detectives will try to log into devices which are accessible through the Internet by using publicly known default credentials. In order to foresee and identify unexpected cyber-security threats towards IoT, this security trial is scheduled to happen in March 2020, just before the Summer Olympics in Tokyo [6].
As discussed in this text, fog computing is also becoming an integrated part of the IoT networks. Hence, the privacy issues are not solved with it but maybe multiplied—in terms of complexity—the ownership of the data that is being produced, transferred, and processed. Therefore, this article investigates the remedy that is needed to address the privacy and security concerns of the users in fog computing supported IoT networks.

1.2. Which One Should Be Preferred for IoT: Cloud, Mobile-Edge, or Fog?

In recent years, due to the usage of IoT and other sensors, the data generated by end-devices increased massively. The question is where, when, and how should these data be analyzed.
In cloud-centric design, the cloud server operates as a central server. IoT devices generate the data and send them to the cloud for storage and analysis. Large-scale IoT deployments create situations which cloud computing could not handle efficiently and effectively.
However, in fog computing, the data are to be analyzed on the edge stations and just necessary results (summaries) are being sent to the cloud server for further analysis and storage. For instance, applications which require low latency while processing the data on the edge of the network might benefit from this technology. The data analysis could be done on site by running the software at local stations. The cloud would still be used as storing the analysis result for historical and audit purposes. The data aggregation will reduce the bandwidth and also bandwidth related cost.
The fog computing concept was introduced by CISCO [7] and was a vision that enabled IoT devices to run on the edge of the network. According to Bonomi et al. [8], fog computing is not an alternative for cloud computing; instead, fog extends and complements the cloud computing with the concept of smart devices which can work on the edge of the network.
In IoT, with different types of data generated by various heterogeneous nodes, inseparability issues arise as an important problem. Fog computing can provide remedies to this problem by handling trans-coding related specific tasks at the edge of the network [2].
As shown in Figure 1, fog computing can be thought of a gateway between cloud computing and IoT, for the sake of enhancing the Quality of Service (QoS) in some specific applications such as Industrial Internet of Things (IIoT), where rapid and agile response is of prime importance. Fog computing also projected to provide remedies to long known problems and challenges of the cloud, namely: data aggregation and processing from heterogeneous devices along with interoperability issues of those devices; data protection and security of the sensitive user data; context-aware and location-aware service provisioning especially for the location-based services (LBS).
The use of the cloud paradigm is where data need to be collected first and transmitted to a central location to store and analyze later due to hardware constraints on edge. The Fog/Mobile-Edge paradigm is preferred when data are collected on the edge and needs to be processed immediately to eliminate latency or preserve availability. For instance, in avionics concepts, the cloud paradigm is preferred with space crafts and orbital satellites since, due to hardware limitations, data are collected on the edge and transmitted to earth for storage and further data analysis. In the case of commercial airlines, fog/mobile-edge would be advantageous since various analog sensors were deployed to the plane and need to be digitized to feed mission computer and inform pilots for decision. Therefore, data need to be consumed on edge rather than transmitting to a central location to get decisions.

1.3. Why Hardware Assisted Security for Fog?

The proliferation of IoT devices such as sensors has resulted in high data bandwidth demand from the IoT network to the cloud due to the vast amount of data being produced and transferred. Fog computing is proposed to provide a remedy to this challenging and growing problem: Instead of transferring all of the IoT data to the cloud, fog computing will process the data at the edge. Fog computing brings most of the advantages and benefits that cloud computing offers down to the edge of the network that will be available to IoT end-devices and users. However, this integration will bring many new challenges for the researchers, especially while building cyber-security related solutions. Therefore, this integration needs to be supported from the cyber-security point of view. One way of doing is leveraging commodity hardware security platforms such as Hardware Security Module (HSM) and Physically Unclonable Functions (PUF). This article investigates efficient and seamless implementations of this kind.

1.4. Demystifying Fog Computing

In an earlier publication [9], we have mentioned the security implications of fog computing for IoT networks. Here, in this manuscript, we focus on the fog computing devices and, to enhance the security of those, we stress more about the hardware platforms that can be leveraged.
As shown in Figure 1, from a conceptual point of view, fog computing might be expected to serve as an intermediate level of service for flawlessly handshaking the protocols of cloud computing and IoT. Sometimes, this service is referred to as Fog as a Service (FaaS) in the literature. FaaS will bring many benefits to IoT and its users: (1) Servers of the cloud computing are super fast when compared to the IoT end-devices. Fog Computing Gateways (FCGs) would provide an interface between the two far sets of those devices. (2) This intermediate layer of fog computing would allow necessary fixes (such as patch management, etc.) to be done easier and remotely. Instead of making the configurations on IoT end-devices by plugging-in physically, software updates can be pushed on to the fog gateways which then deliver the patches to intended end-devices. (3) Fog computing will bring all the advantages of edge-computing to the IoT, such as the agility, scalability, decentralization, etc. (4) Fog will expand clouds to provide additional assets to the underlying nodes and networks by taking advantage of virtualization concept by creating virtual sensors and networks to be used by other various services. (5) Finally, fog enables and creates an environment for proliferation of distributed IoT applications.

1.5. Content and Scope

In this article, our aim is to find, identify, and discuss available COTS and/or conceptual hardware solutions for securing low-end devices of fog-based IoT networks. To facilitate this, we first presented the fog computing concept and the advantages it would bring to IoT networks. Cyber threats against IoT networks are presented in Section 2.4, and the hardware attacks are in Section 4.1. Implications of using fog-computing based IoT networks are presented. This is followed by the remedies that would be offered by hardware assisted security techniques such as TRM, PUF, HSM, etc. This is followed by practical real-life scenarios in which fog based IoT networks can be supported by hardware-based cyber-security solutions.

1.6. Organization

The rest of the manuscript is provided as follows: Section 2 presents the concepts of fog, mobile-edge and cloud computing in a comparative way. Section 3 discusses the implications of using fog computing for IoT in terms of systems integration, cost, QoS, consumer needs, and security. Hardware assisted security solutions for fog computing devices are discussed in Section 4. Some practical application scenarios of fog computing supported IoT network are presented in Section 5. Finally, Section 6 concludes the paper along with future remarks.

2. Fog vs. Cloud/Mobile-Edge Computing

Major distinctions between cloud, fog and mobile-edge computing are provided in Munir et al.’s work [10], Stallings’ work [11], and Luan et al.’s work [12]. We extended all these as discussed below and tabulated them as shown in Table 1.

2.1. Fog vs. Cloud Computing

Fog and cloud computing are different paradigms; they are not rivals but complimentary to each other to build up a stronger and agile network. The basic trade-offs between fog and cloud are provided in Aazam et al. [2] as follows:
  • communication efficiency
  • total power consumption for a service
  • round-trip response time for a query or task.
Here, we extend this list as follows:
  • Place of data processing: Fog computing implements the idea of bringing the functionalities of cloud computing to the data source. This is an analogy to meteorology, as fog is simply a type of cloud that is closer to earth. Henceforth, fog computing extends the services of the cloud computing downward towards the edge of the network.
  • Proximity to the users: FCGs are very close to the IoT users and end-devices, whereas cloud computing is executed over servers located at far side from the IoT users.
  • Network delay: The cloud computing servers are most generally at least several hops away from the IoT users and end-devices. Therefore, in some cases, a round trip of communication (bi-directional) may last in the neighborhood of seconds. On the contrary, owing to the off loaded server architecture, fog computing may receive and respond the queries from the IoT network in milliseconds. Henceforth, they are very promising for agile applications such as IIoT and CPS.
  • Location-Based Services (LBS): One of the major benefits of fog computing over the cloud is that the support for location awareness which might be very useful for the applications that are employing LBS.
  • Mobility Support: Mobility is fully supported in fog computing by leveraging virtual machine (VM) technologies. However, for cloud computing, mobility of the users is supported in a very limited way.

2.2. Fog vs. Mobile-Edge Computing

Due to a misconception, fog computing and mobile-edge computing are sometimes being used interchangeably in the literature. However, they differ in the following ways:
  • Decentralization: Fog computing provides more decentralized and distributed architecture when compared to mobile-edge computing in which generally cellular base stations are the main point of centralization.
  • Supplier diversity: In mobile-edge computing, the hardware/software components are supplier specific and there is no standardization in the market. For fog computing, this is not acceptable. System cost, quality, innovation, market adoption and proliferation of fog computing are all dependent on standardization.
  • Diverse Radio Access: Most of the mobile-edge computing applications are for mobile and/or cellular networks, whereas fog computing will include WiFi, LPWAN, and WiMax additional to the cellular network.
Connectivity of large number of IoT devices and various latency requirements of them will be seamlessly supported by the massive Machine Type Communication (MTC). Non-Orthogonal Multiple Access (NOMA) technology, and, more specifically, Mobile Edge Computing (MEC) has the advantages of improving network capacity, reducing MTC devices’ latency, and enhancing Quality of Service (QoS) [14].

2.3. Advantages of Using Fog Computing for IoT

Table 1 presented fog, mobile-edge, and cloud computing concepts in a comparative way. As can be seen, fog computing presents a more agile and rapid response when compared to mobile-edge and cloud computing, thereby represents a strong candidate as a technological solution for future IoT and IIoT based implementations.
As mentioned earlier, fog computing can be considered as an extension of the cloud computing towards the edge of the IoT network with an increased agility. Thereby, fog computing offers the following advantages when used for IoT (and IIoT) networks:
  • Cost efficiency: The data will be processed on edge rather than cloud which will eventually decrease transportation of huge amount of data to the cloud along with the associated cost.
  • Support for interoperability: Fog devices can help with trans-coding related tasks to relieve the problem of the interoperability of the heterogeneous IoT end-devices [2].
  • Reduced delay: The cloud computing is not suitable to serve for time-critical applications such as for IIoT, as overall end-to-end delay is in the neighborhood of 100 ms (which is critically high, especially for factory automation that require isochronous response in the low milliseconds [15]). As being located at the edge of the network, fog computing is a strong candidate to provide faster communication and thereby reduced delay for the communication packets.
  • Agile response: Real-time applications, such as IIoT, may benefit from the fog computing concept to gain agility during analysis and decision-making phases of their overall process automation cycle.
  • Increased security: With fog computing, service providers can easily filter out sensitive personally identifiable information (PII) and process them locally. Instead of sending all the information, only the non-sensitive information is sent to the cloud for further processing [16].

2.4. Cyber-Attacks and Ways of Protecting the Networks from Them

In the literature, many attacks have been identified in IoT networks such as Mirai and Torii botnet attacks [9], and various attacks against industrial networks (IIoT, etc.) such as Stealthy attacks [17]. Henceforth, in order to have solid and operable systems and to cope with cyber-attacks, cyber-security measures need to be taken. As mentioned in Butun et al. [18], cyber-security of any computer system consists of three layers: Prevention, Detection, and Mitigation.
On the intrusion detection side, anomaly detection is a very commonly used technique. Anomaly detection based on device or event logs and process model (cyber threats and faults) is another important aspect to prevent possible attack vectors crafted for the targeted systems. For instance, Audi investigated the intruder detection and monitoring approaches to secure the Industrial Control Systems based on anomaly detection [19]. In a similar work on industrial networks, Myers proposed a method to detect cyber attacks on industrial control systems using process mining [20]. However, MITM, hardware hijacking, etc. attacks are omitted in this study. In another work, Aydogan et al. [21] investigated intrusion detection systems under Hello flood and Version number attacks for RPL-based IIoT.
In Greenberg et al. [22], the following statement is really disconcerting: “A new proof-of-concept hardware implant shows how easy it may be to hide malicious chips inside IT equipment.” This is a very good proof showing that, not only the software systems, but also commodity hardware platforms are vulnerable to attacks. These are sometimes also referred to as ‘hardware-hacks’ and remind system developers to include hardware level authenticity validations right after factory production line, followed by before and after installment validation procedures.
This work focuses on the Prevention mechanisms to thwart attackers in the first place before any attack can happen. On the cyber-prevention side, trusted hardware components might be utilized: Smart Environment Monitoring (SEN) systems are on the rise and many various applications are being developed to monitor sensed environment data via IoT [23]. Hence, the reliability of these data is important and supports our standing point here, as trusted hardware platforms can fulfill the necessity of ‘reliable data’.

2.5. Why Is Security in Fog Computing Needed?

Fog computing is actually a tool for Cloud-Based Services (CBS) that can be imagined as an interface between the real end-devices of the IoT and the rest of the CBS. As discussed in Butun et al. [24], CBS offers three major service components, namely Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). We are projecting that fog computing paradigm will extend this presentation by including Fog as a Service (FaaS) as the 4th component to the service model as shown in Figure 2.
The Security Plane for CBS proposed by Butun et al. [24] was devised to be used at the front-end IoT devices and to provide an interface to the cloud. After the proposal of fog computing, this Security Plane solution is more diverse and layered compared to an earlier version (see Figure 2). Therefore, we think of fog computing to provide extra services such as security to the edge of the cloud for the CBS. For example, the usage of fog computing would bring benefits to the Intrusion Detection Systems (IDS) that are devised for IoT. Hence, early detection is important to stop the ill effects of intrusions, fog computing would bring early detection opportunities to IDS algorithms working on IoT. It is worthwhile to mention that the security plane of Figure 2 will be incomplete, unless all necessary security and privacy functionalities are implemented accordingly.

3. Implications of Fog Computing Usage in IoT

According to the scientific projections, fog computing is expected to be one of the main backbone pillars of the IoT in the near future transforming the cloud computing based IoTs to a more distributed architecture [1,16,25]. Inevitably, there will be some implications of this transformation as follows:

3.1. Related to Systems and/or Subsystems Integration

Systems and/or subsystems integration is an important task for the systems engineers as their duty is to provide all components of a newly built system to work seamlessly. As such, the introduced system (the IoT security components, etc. in our case) should be both compatible with cloud computing servers from the high-end, and also with the IoT end-devices (sensors and actuators) from the low-end. It should not create an extra burden for network managers in setting up and configuring the fog computing devices.

3.2. Related to Telecommunications

Table 2 shows the IoT related telecommunication (RF) technologies in a comprehensive manner. The selection of the RF technologies can be based on the intended functionality and on the hardware requirements such as bandwidth, cost, energy efficiency, latency, and network type, etc. As discussed in Figure 3, these RF technologies establish the foundation for the IoT networking technologies. The details of these communication and networking technologies are beyond the scope of this article (Interested audience may refer to [13] for further reading).
Besides the great benefits of having a diverse spectrum of RF technologies, orchestration of these technologies and making them work in harmony require tremendous effort, especially from the cyber-security point of view. Hence, one of the goals of this paper is shedding light on the cyber-security related dark spots of the fog-computing associated technologies.

3.3. Related to Cost

Recently, United Parcel Service (UPS) deployed IoT sensors to collect data for data analysis and optimization to reduce the cost and to improve the efficiency in their postal distribution system [27]. According to Jalali et al. [28], fog computing may help to reduce the energy cost in cloud computing systems. Therefore, we foresee that fog computing will help cloud computing-supported IoT systems to decrease their overall system costs. As the data will be processed on edge rather than the cloud, fog would reduce cost overheads of transmitting data to the cloud. This will have two benefits: (1) Bandwidth usage of the transmission will decrease drastically. (2) The size of the data storage at the cloud (along with the processing) will decrease.

3.4. Related to QoS

QoS is an important service criteria that eventually affects the satisfaction of the users while using the provided service. For IoT, the temporary unavailability of the sensors or actuators within IoT applications will directly impact the physical world and hence drastically decrease the QoS for the network users [5]. Many existing wireless applications have diverse and mandated quality of service (QoS) requirements, which complicates the burden on the integration of IoT and cloud. In the meantime, emerging fog based middle-ware solutions might be useful and handy in that sense to offer handling of urgent tasks at the edge of the network and offloading data from energy scarce nodes [2].
As mentioned in Lai et al. [29] and Yi et al. [30], fog computing can drastically improve the QoS of IoT networks by decreasing the ‘packet latency’ and ‘network congestion’ while increasing the ‘failure detection’ and ‘loss recovery’.

3.5. Related to Security

The real-life environment practically differs from ideal settings. Extra features and components sometimes create single point of failures or put toil (e.g., processing, memory storage, power consumption, etc.) on the existing system. In well designed and planned implementations, single point of failures and the toil on the system can be eliminated to improve overall system performance as desired. This is valid for both hardware, software and security features associated with the inclusion of an extra component.
Several key security considerations for cloud-based IoT networks were addressed by Singh et al. [31], which focused on security-related to IoT and cloud integration such as auditing, software issues, policy, protocols, trust, etc. However, they did not touch any of the security problems from the hardware perspective.
Security implications of using fog computing for IoT systems are described below. There are 6 features that we considered in case of a capture of the FCG device:
  • Access Control: FCG connects IoT/IIoT networks and cloud with a bidirectional communication channel. The data are collected and streamed from IoT devices to cloud, and decision and command messages sent from cloud to IoT networks. An FCG device can manage all connect IoT devices in an efficient manner. However, FCG devices can not directly access to databases and other computational resources without a designated cloud service.
  • Authentication: An FCG device may have some implications based on the selected authentication algorithm. If the authentication is designed to operate by just FCG devices, it increases the risk of getting all the IoT network being compromised once the FCG device is hacked. Usually two-factor authentication and multi-layered authentication (one at FCG, one at the cloud, etc.) mitigates the risk of an FCG is being compromised. In case of an incident, only a subset of connected IoT devices would be effected.
  • Availability: Cloud resources are more resistant to single point of failures. Data are replicated on multiple nodes on cloud and a fail over event can be achieved seamlessly. However, IoT devices are more susceptible to disruptions such as if any communications are blocked for IoT resources, it may cause a significant impact on availability based on the critical location of the FCG.
  • Confidentiality: Compared to cloud, the data confidentiality on FCG has a moderate impact. The devices connected to FCG has impacted directly, but the rest of the IoT devices and cloud should not be impacted by it.
  • Integrity: Based on the selected communications scheme, the minor effect of a FCG capture on the integrity of the messages is expected if end-to-end encryption is not employed, to no effect if encryption is employed.
  • Privacy: Any data leak and privacy violation of users in IoT networks via an FCG device is a serious problem not limited to reputation, financial loss, or other implications to organizations. Any user which is using an IoT device or stored data on IoT device would get exposed via a hacked FCG device. However, the private data on cloud would not get impacted with this.
All the communication between the cloud and IoT is flowing through FCGs. Therefore, an adequate amount of computers need to be installed to prevent a single point of failures and handle self-heals and fail-over events seamlessly. Since all the data flow would be blocked in case of any damage or a physical attack, we suggest several FCGs to be installed in the fog computing supported IoT network architectures with the capability of self-healing and seamless fail-over.
A compromised FCG affects both the IoT network and cloud layer at low to critical levels depending on the situation and security mechanisms implemented which are explained above. The security of FCG is important and should not be negligent to leave unprotected. As the next section summarizes (see Section 4), hardware assisted security should be leveraged to add on FCG as an additional defence layer on top of software oriented solutions.
Firewall and/or IDS components should be integrated into the fog layer to implement a preemptive security mechanism. A well configured firewall can prevent most of the attacks and an IDS can detect anomalies in the network to detect intrusion attempts. IDS can also be utilized with different technologies like Markov model, virtual honeypot device, etc. [32]. Moreover, the anomaly detection concept using various components such as autoencoders and neural networks to apply deep learning algorithms to identify new trends on edge could be another defense layer variation for the IoT network [33]. Therefore, leveraging security service prevents a propagation of attacks further to the cloud.
The practice of just sending the minimal amount of data to the cloud and keeping data on the edge would mitigate data privacy and security related issues.

4. Hardware Assisted Security of Fog Computing Devices

Arias et al. [34] introduced a case study that concluded that a non-secure hardware platform would lead to a non-secure software stack, hence highlighting the importance of hardware security. Kaur et al. [35] also mentioned that “Hardware Security” is not well studied in the literature when compared to software-related cyber-security problems and solutions. Recently, there are emerging studies on hardware assisted security on IoT related devices such as: building a unified identity verification framework based on PUFs [36], FPGA hardware security for data centers [37], and re-configurable hardware-based isolation and protection mechanism (IPM) for IoT devices using cloud [38]. All these support our effort in introducing hardware security measures for FCGs. This section summarizes all possible hardware security measures that can be considered for the FCGs, while deciding security provisioning for the overall IoT network:

4.1. Threat Model and Security Risk Analysis

As discussed in Skorobogatov et al. [39], cyber-security attacks against hardware platforms can be investigated under three groups: invasive, non-invasive, and semi-invasive. Among these, the most severe one is the invasive one as it directly intervenes with the operational structure of the circuits on the hardware. Figure 4 shows further details and classifications of these attacks.
The reverse engineering method is used to uncover the hardware’s physical properties and functionalities to reproduce the technology or exploit possible vulnerabilities. Power analysis and eavesdropping techniques can be correlated with RE to learn more about target hardware’s properties. These attacks are mostly used in industrial espionage to steal competitors technology. Microprobing and chip modifications are also used for monitoring and manipulating the hardware unit while interfering with the integrated circuit directly. Software attacks target code level vulnerabilities or weaknesses including business logic and code implementations, etc. Fault injection or generation can be used to violate the CIA (confidentiality, integrity, availability) principle such as making a device to malfunction to gain access, stop functioning, or perform other critical tasks. Glitch attacks like clock or power glitches can be used create a possible vulnerability window to perform a specially crafted attack. Data remanence is the concept of deciphering information bits in physical devices like memory (SRAM, DRAM, EPROM, etc.) and storage units to retrieve security keys or other critical information bits.
The focus of hardware security should be at least addressing C (Confidentiality) and I (Integrity). Hidden information about the device or data should not be exposed and tampering should be prevented. In the industry, secret information (property, data) is commonly attached to a physical object and hardware must protect it. As an example, smart cards are used for multiple tasks such as accessing a facility or keeping monetary information, etc. and a simple cloning attack may have an immediate impact [9]. In the case of cloning being successful for bank cards, the financial loss would be devastating.
Generally, the following techniques can be considered to prevent or slow down hardware related attacks as the first layer of the defense; obfuscation: data (deletion or nulling out, encryption, masking, substitution, shuffling and other complex techniques, etc.), layout (by using 3D stacking and complex architectural design to protect chip integrity) and metal mesh (to prevent probing attacks). Finally, using physical shields to protect hardware from outside noises to prevent fault injection attacks. Table 3 shows security risk analysis for hardware cyber-threats vs. common security properties for fog-computing based IoT end-devices including attack vector classification [40]. For instance, a security risk analysis of rogue end-device (i.e., a captured end-device by the adversaries) with respect to common security properties is as follows: C has moderate, I has moderate, A has moderate, and Auth* has significant impact. The associated attack vector is In or S.
It has been observed in this subsection that there are several obstacles to be tackled in order to accommodate cyber-security for fog-based IoT devices via hardware-assisted solutions due to inherent problems of the IoT and the end-devices themselves: Physical access vs. remote access (hardware solutions would require physical access to the real device which sometimes might bring a real burden on the field teams/technicians), flexibility (hardware systems are not very much flexible as software systems; although some hardware platforms are re-configurable such as FPGAs, they are very costly in that form), scalability (due to hardware limitations, cost, and other production constraints’ hardware solutions are hard to scale), agility (time required to install hardware fixes might be significant).

4.2. Resistance against Reverse Engineering (RE)

‘Tamper resistance’ means that taking measures to make Reverse Engineering (RE) harder for attackers or to prevent them from modifying a product against the producer’s will. This can be achieved in three ways:

4.2.1. By-Software

Software solution for tamper resistance would contain ways of shuffling the executable code on the memory so that it would not reveal specific information regarding any confidential and meaningful material to the attackers. One commonly used method for doing this is code obfuscation [41]. Historically, white box implementation [42], dynamic program monitoring [43], self-hashing [44], and check-summing [45] are provided as methods for tamper resistance. Finally, blockchain technology is a viable option to satisfy data integrity in the IoT network using consensus [46] strategy between nodes. As a proof of concept, a scheme of blockchain integrated PUFs in IoT is proposed in [47], using a unique consensus algorithm called “Proof of PUF-Enabled Authentication”.

4.2.2. By-Hardware

The discussion on attack vectors against cryptographic hardware (smart cards and micro-controllers) and the need of tamper proof systems dates back to the 1990s [48]. Chip-based protection is also designed to protect intellectual property. Game console, phone, or other device hacks to run illegal copies of the software the designated device is another motivation for tamper proof systems [49]. A subset of known attack vectors to hardware are differential fault analysis, chip rewriting, memory remanence, and protocol failures [50]. Logic locking of Boolean circuits can be used as a preventative method [51].
Tamper Resistant Memory (TRM) chips may be designed to delete their sensitive data including cryptographic keys, if they can detect an intrusion towards their security encapsulation. The working mechanism behind this is continuously updating the memory cells to prevent static data imprint on them. TRM is mostly used to store sensitive information like private keys, electronic payment information, etc.
Another approach would be implementation of a hardware-based System on a Chip (SoC) concept. For instance, Da Silva et al. [52] proposed an SoC to protect low-end embedded processors from control flow attacks, especially from the Code Reuse Attacks (CRAs). The proposed concept provides an end-to-end protection combination of detection, response, recovery, and tamper evident techniques against control flow violation (caused by CRAs), especially in the presence of interrupts, real-time operating systems, and exceptional functions.

4.2.3. By-Design

IoT frameworks are dependent on underlying hardware and smart electronics as gateway devices such as sensors and micro-controllers. These may be subjected to malicious Hardware Trojan (HT) inserted by the untrusted chip manufacturers. An HT is strategically inserted into normal looking hardware by using RE skills and acts as time-bomb: It is suddenly activated during a normal operation mode of the hardware, and may cause abnormal and unintended operation. Defense against this kind of attack can be one of the popular techniques such as ‘functional and structural obfuscation’ which is executed by the authentic device manufacturers before the fabrication phase of the chips. HT also can inject faults to create DoS attacks to starve the target network [53]. HT detection is quite challenging due to involvement of many third party intellectual property related to manufacturing business [54].

4.3. Physically Unclonable Functions (PUF)

PUF is a physical object which provides a digital fingerprint for hardware like microprocessors based on various inputs and challenges. Silicon circuits manufacturing results with unique characteristics of the products which can not be physically cloned [55]. Each PUF circuit should have a unique Challenge Response Pair (CRP) which can be used for identification and authentication purposes [56,57]. Fabrication and architectural details of weak (has small number of CRPs) [58,59] and strong (has lots of CRPs) [59] PUFs are also important. Strong PUFs are resistant to brute force attacks. The main characteristics of PUFs are reliability (it should always provide same CRPs), unpredictability (PUF CRPs should not be predicted based on other CRPs), unclonability (CRP mappings should be physically unclonable), and physical unbreakability (physical PUF modification should result of malfunction or permanent damage to chip as protection of chip integrity) [60]. Advantages of the PUFs are resistant to invasive attacks and have no need for extra programming, testing, and processing power [61].
SRAM cells are resistant to circuit degradation and can be used to build reliable SRAM based PUFs which can be used for authentication and secret key generation [62,63,64]. Huang and Wang [36] have shown that PUF can be utilized for identity verification in order to secure IoT hardware via device authentication. This is achieved by improving a configurable ring oscillator (CRO) PUFs with the latch structure. A unique sub-digital signature of each chip can be generated by performing the challenge-response strategy via CRO-based PUF.
The analysis of PUFs revealed that an exponential improvement will happen soon in the chip area and energy efficiency due to the research efforts [65].
It has been shown in Huth et al. [66] that PUFs can be leveraged by IoT devices to ensure IP protection during software update procedures. Accordingly, an IoT end-device has to prove the erasure of its memory within a time constraint and a PUF binds the newly downloaded software IP to the target platform. Usage of PUFs promises an increase in the security level of the IoT, by enabling low-level security implementations on the things and also by devising cryptography algorithms to perform special tasks (e.g., verification, etc.) [67]. In a similar fashion, fog computing can leverage PUFs that are embedded to the fog gateways and/or IoT end-devices, in order to ensure IP protection during patch updates.
PUF based vulnerabilities in IoT have been studied in many publications [55,68]. Man In The Middle (MITM) attacks are presented in [69], and side-channel attacks in [70,71]. Moreover, improper PUF implementations can result with a backdoor as discussed in [72,73]. All of these attacks mentioned above are crafted for authentication and key generation phases.

4.4. Hardware Security Module (HSM)

HSM is a physical computing hardware that safeguards and coordinates digital keys for strong authentication and provides foundations for crypto-processing. These modules are either presented in the form of a plug-in card or an external portable device that can be attached directly to a computer or network server. HSM units can be implemented at FCG’s of the fog computing based IoT network to orchestrate not only the key distribution, but also cryptography related operations such as authentication, encryption/decryption, etc.
There are various hardware configurations for IoT end-devices depending on the application they are used for and also the wireless communication technology they are using. For instance, Bluetooth LE, Sigfox, LoRa, WiFi, WiMAX, and NB-IoT are well known wireless communication technologies for the IoT with the radio chip-sets available on the market. Therefore, hardware security solutions will not be generic as they need to consider all the components that are being used in the system. As shown in Figure 5, we project that the above-mentioned hardware security commodity solutions available on the market can be a remedy in providing cyber security for the fog computing enabled IoT networks. TRMs and PUFs are comparably cheaper hardware security solutions and can be used for end-devices of the fog computing enabled IoT networks. However, HSMs are quite expensive devices and to be preferably installed at the FCG’s of the IoT network.

4.5. Cost-Analysis of the Hardware Assisted Security

The famous quote by Benjamin Franklin says: “An ounce of prevention is worth a pound of cure.” History has proven this to us many times; if a hardware-based security defense is forgotten and then patched via software, this might not only be costly, but also would cause irreversible performance degradation, or even worse side-effects such as partial or full burn-out of the mentioned hardware if the software fix does not work. As in the case of Intel, a cyber-attack towards a hardware vulnerability (so famed ‘Spectre’ and ‘Meltdown’ vulnerabilities) not only cost Intel millions of dollars (in fixing the old processors via software patches and devising hardware/software prevention mechanism in the newly designed processors) but also a performance degradation up to 15–20% in the software-patched processors that are being used today [82].
In this paper, we do not present hardware-based cyber-security solutions as a replacement-for or competitor to the software-based solutions; on the contrary, we offer hardware assisted security principles along with the software ones. Therefore, they should not be considered as a competing solution, but a complementary one. For instance, storing a password of a software based security solution to a tamper-resistant memory chip. Moreover, one should also consider that hardware-based cyber-security attacks are mostly (maybe completely) thwarted by hardware-based cyber-security solutions not by the software-based ones.

4.6. Summary and Recommendations

As mentioned in this section, the PUF-based cyber-defense mechanism does not require intense hardware resources when compared to other solutions such as hardware accelerated encryption, etc. Henceforth, usage of PUF-base based cyber-defense mechanisms is preferably a good option for IoT (FCGs and end-devices) security [68]. TRM chips should be used when trusted hardware needed to ensure that security keys are not tampered with. TRM chips can give strong protection for cloud data centers, mobile-edge, and Fog devices. However, counting on the cost-related benefits, software solutions should be considered for large scale IoT deployments. HSM also can be used as an expensive on-demand defense layer and to be preferably installed at the FCG’s of the IoT network.

5. Practical Application Scenarios of Fog Computing in IoT

During the past decade, reduced hardware cost has triggered a rapid increase and an enormous improvement in consumer electronics. Low price microcontrollers and ARM processors are used to design low cost single board computers. ARM is an RISC (reduced instruction set computer) ISA (instruction set architecture) microprocessor widely used in mobile phones and IoT devices. The PIC16(L)F184xx Products (8-bit microcontroller family from Microchip Technology Inc.) price is between $0.53 and $1.04 when ordered bulk [83]. As an example, ARM Microcontroller MCU 32B CORTEX-M3 32KB FL/8KB SRAM is sold on mouser.com for $3.20. Owing to the high demand on IoT concept and its applications, single board computers such as Ardunio (Uno Rev3 is starting from $22 on the martket), Raspberry Pi (Pi Zero starts at $5 on the market and Pi 3 Model B+ is available for $35) or Pine64 (A64-LTS is $32.00 on the market) not only are being used by professionals for commercial use, but are also being adopted by hobbyists for any kind of independent studies including elementary-middle-high school projects. Table 4 shows a subset of well known COTS IoT hardware options in a comprehensive manner.
Because of introducing agile response nearby the edge components, we are expecting fast implementation and business growth of fog computing for future IoT applications such as Intelligent Transportation Systems (ITS), smart-factories, smart-cities, etc. Figure 6 presents various possible application fields of fog computing, which are enlisted as follows:
  • Smart Homes/Offices: The smart home concept was introduced in 1975 once X10 technology is developed in Scotland [84]. Currently, Zigbee or Z-wave are mostly used for home automation applications. They are basically wireless mesh protocols. The latest Zigbee 3.0 enhances the IEEE 802.15.4 standard by adding security layers. Z-Wave (800–900 MHz frequency) has lower bandwidth than the other standards so it supports a longer distance than the other standards/protocols (up to 100 m). Zigbee has 2.4 GHz frequency and a standard Wifi may have 2.4 GHz or 5 GHz. The higher frequency means a shorter distance for communication. Security-wise, they all support encryption. A Z-Wave network can support a maximum of 232 nodes. (http://www.openzwave.com/dev/) and Z-Wave is limited to 232 devices. Zigbee supports maximum 65,000 nodes connected in a network. Wifi varies based on the router used in a network. To secure smart homes, a security framework utilizing network monitoring and anomaly detection, etc. to address physical, network, and software attacks [85] should be considered.
  • Smart Cities: Smart cities can incorporate with the ITS concept through the support of IoT and fog computing to help a sustainable economic development of our world (energy/utility distribution, etc.), safety, transportation (scheduling traffic, signalling systems, etc.), by contributing decision-making with a localization concept. Collecting data from sensors city wide can result in improvement in the efficiency of city services. A redundant task can be found and eliminated (possible financial saving). The end result would be high-quality services at a lower cost. As discussed in Butun et al. [86], smart cities will be vulnerable to many cyber attacks and will need a robust security architecture, for which hardware security assisted fog computing can be employed to help with.
  • Smart Factories and Industrial IoT: Automation processes can be improved via data collection with IoT sensors and analyzing these data on the fog environment. Work-flow audit and data collection tasks can be easily accomplished via this methodology. This may result in possible optimization opportunities in IIoT contexts as shown in Forsström et al. [87], in which maintenance prediction or energy efficiency problems can be efficiently solved via the assistance of fog. As also mentioned in Forsström et al. [87], security issues related to IIoT are also on arise and fog-computing based agile cyber-security solutions might be a remedy to this. In addition, to address small and medium sized enterprise needs, a hybrid (hardware-FPGA based middleware security layer, etc., software) security solution should be considered [88].
  • Smart Healthcare: IoT and fog can help with improving tools and frameworks in the health industry. Financial improvement, security-surveillance, data collection, and critical medical device-data coordination can benefit. Hardware security assisted fog computing can improve the security of smart healthcare systems. For instance, digital patient records in the hospitals are vulnerable to manipulation attacks. Currently, several vulnerabilities are reported related to the networks and equipment used to transmit and store MRI and CT scan images, which are then sent to radiology workstations through Picture Archiving and Communication System (PACS). The reason of the vulnerabilities is due to the absence of digital signatures and encryption on images when they are stored on the PACS networks. Digital signatures can be attached to the captured images right away at the scanning machines with the help of the fog computing devices mentioned [89].
  • Intelligent Transportation Systems (ITS): ITS can be thought as a parent acronym for vehicular networks and vehicular IoT networks. Fog computing is expected to enhance the coverage and decrease the response time of ITS. As mentioned in Munir et al. [10], fog computing can enhance the overall network performance by increasing the response time along with extended coverage. Overall, ITS can benefit from fog computing to increase service quality in the following example scenarios: rapid re-routing of the traffic, fast towing service, emergency services in case of accidents, and, finally, providing necessary evacuation routes in extreme weather events such as hurricanes.
In all of these different scenarios, the common idea is that the end-devices generate a massive amount of data and may need to collaborate with each other to take critical decisions reducing the delay. Hence, an agile response is important and the philosophy of fog computing may help to overcome bandwidth and latency related problems in this manner.

6. Conclusions and Future Directions

6.1. Lessons Learnt

The proliferation of consumer electronics yielded IoT devices and sensors to approach our close proximity. This is an indispensable development and fog computing will make it further possible due to the inherent advantages it possesses. Throughout this article, we have stressed the implications of using fog computing as a backbone architecture for IoT, especially related to the cyber-security.
Centralized cloud data centers may fail while storing or processing requests from millions of distributed IoT end-devices due to a congested network, high latency in the service, congestion in limited bandwidth, etc. Therefore, as a remedy to this problem, the fog computing concept is projected to be very useful, especially for delay-sensitive applications, such as industrial automation in IIoT. Mobility support, geo-distribution, location awareness, and low latency concepts are important while deploying IoT devices, and fog computing is a strong candidate to help in all of these topics.
This research also has taught us that hardware components of any system, especially fog-computing related IoT systems, are not prone-to/free-from cyber-attacks/hacks/intrusions/ manipulations. Several cyber-attacks against hardware platforms are classified in this work along with defense mechanisms in a summarized manner. As also mentioned by Alioto [65], stronger interaction between chip designers and protocol developers will be indispensable for the next-generation IoT devices to assure a desired level of security at a minimum energy/area cost while at the same time enabling flexibility for future hardware patching.

6.2. Future Work

In this article, we discussed integration of fog computing to cloud-based IoT systems. In addition, we elaborated that these IoT systems can leverage commodity hardware such as HSMs and PUFs, or custom tailored SoC hardware, in order to enhance their defense mechanisms against cyber threats, especially in protecting the PII of the users from RE attacks of the ill mannered adversaries.
We foresee that hardware-based cyber attacks will increase in the near future, especially against embedded low-end devices. Thereby, hardware-based cyber-security solutions will be a very useful tool defending against those attacks, more importantly for fog-computing infused IoT networks, especially towards increasing the security abilities of low-end devices which do not have sufficient software/hardware resources to defend themselves against cyber-threats.

Author Contributions

The study conceptualization is done by all three authors. Other contribution details are as follows: Writing—original draft preparation is done by I.B. and A.S.; writing—review and editing, I.B. and A.S.; supervision, P.Ö.; project administration, I.B.; funding acquisition, I.B. and P.Ö. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded in parts by: the Knowledge foundation (KKS) under grant research profile NIIT, the Swedish Civil Contingencies Agency (MSB) through the projects RICS, the EU Horizon 2020 Framework Program under Grant No. 773717, and the Swedish Foundation for International Cooperation in Research and Higher Education (STINT) Initiation Grants program under Grant No. IB2019- 8185.

Acknowledgments

The authors would like to thank anonymous reviewers who helped with improvement of this manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
BSBase Station
CBSCloud-Based Services
CIAConfidentiality, Integrity, Availability
CoTCloud of Things
CRACode Reuse Attack
CROConfigurable Ring Oscillator
CRPChallenge Response Pair
DoSDenial of Service
DDoSDistributed Denial of Service
FaaSFog as a Service
FCGFog Computing Gateway
HSMHardware Security Module
IaaSInfrastructure as a Service
IDSIntrusion Detection System
IoTInternet of Things
IIoTIndustrial Internet of Things
ISAInstruction Set Architecture
ITSIntelligent Transportation Systems
LBSLocation-Based Services
MECMobile Edge Computing
PaaSPlatform as a Service
PACSPicture Archiving and Communication System
PIIPersonally Identifiable Information
PUFPhysically Unclonable Functions
QoSQuality of Service
REReverse Engineering
RISCReduced Instruction Set Computer
SaaSSoftware as a Service
SoCSystem on a Chip
TaaSThings as a Service
TRMTamper Resistant Memory
VMVirtual Machine

References

  1. Friedman, V. On The Edge: Solving The Challenges Of Edge Computing In The Era Of IoT. 2018. Available online: https://data-economy.com/on-the-edge-solving-the-challenges-of-edge-computing-in-the-era-of-iot/ (accessed on 13 September 2018).
  2. Aazam, M.; Zeadally, S.; Harras, K.A. Fog computing architecture, evaluation, and future research directions. IEEE Commun. Mag. 2018, 56, 46–52. [Google Scholar] [CrossRef]
  3. Kocakulak, M.; Butun, I. An overview of Wireless Sensor Networks towards internet of things. In Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 9–11 January 2017; pp. 1–6. [Google Scholar]
  4. Naha, R.K.; Garg, S.; Georgakopoulos, D.; Jayaraman, P.P.; Gao, L.; Xiang, Y.; Ranjan, R. Fog Computing: Survey of trends, architectures, requirements, and research directions. IEEE Access 2018, 6, 47980–48009. [Google Scholar] [CrossRef]
  5. Zhang, B.; Mor, N.; Kolb, J.; Chan, D.S.; Lutz, K.; Allman, E.; Wawrzynek, J.; Lee, E.A.; Kubiatowicz, J. The Cloud Is Not Enough: Saving IoT from the Cloud. HotStorage. 2015. Available online: https://www.usenix.org/conference/hotcloud15/workshop-program/presentation/zhang (accessed on 17 September 2020).
  6. Seals, T. Japan to Hunt Down Citizens’ Insecure IoT Devices. 2019. Available online: https://threatpost.com/japan-insecure-iot-devices/141304/ (accessed on 30 January 2019).
  7. Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. Cisco White Paper 2015. Available online: https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf (accessed on 17 September 2020).
  8. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog Computing and Its Role in the Internet of Things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, New York, NY, USA, 13–17 August 2012; pp. 13–16. [Google Scholar] [CrossRef]
  9. Butun, I.; Sari, A.; Österberg, P. Security Implications of Fog Computing on the Internet of Things. In Proceedings of the IEEE 37th International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 11–13 January 2019; pp. 1–6. [Google Scholar]
  10. Munir, A.; Kansakar, P.; Khan, S.U. IFCIoT: Integrated Fog Cloud IoT: A novel architectural paradigm for the future Internet of Things. IEEE Consum. Electron. Mag. 2017, 6, 74–82. [Google Scholar] [CrossRef]
  11. Stallings, W.; Brown, L. Computer Security: Principles and Practice; Pearson Education: London, UK, 2018; pp. 1–800. [Google Scholar]
  12. Luan, T.H.; Gao, L.; Li, Z.; Xiang, Y.; Sun, L. Fog Computing: Focusing on Mobile Users at the Edge. arXiv 2015, arXiv:1502.01815. [Google Scholar]
  13. Sari, A.; Lekidis, A.; Butun, I. Industrial Networks and IIoT: Now and Future Trends. In Industrial IoT: Challenges, Design Principles, Applications, and Security; Butun, I., Ed.; Springer: Cham, Switzerland, 2020; pp. 3–55. [Google Scholar] [CrossRef]
  14. Han, S.; Xu, X.; Fang, S.; Sun, Y.; Cao, Y.; Tao, X.; Zhang, P. Energy Efficient Secure Computation Offloading in NOMA-Based mMTC Networks for IoT. IEEE Internet Things J. 2019, 6, 5674–5690. [Google Scholar] [CrossRef] [Green Version]
  15. Frotzscher, A.; Wetzker, U.; Bauer, M.; Rentschler, M.; Beyer, M.; Elspass, S.; Klessig, H. Requirements and current solutions of wireless communication in industrial automation. In Proceedings of the 2014 IEEE International Conference on Communications (ICC) Workshops, Sydney, Australia, 10–14 June 2014; pp. 67–72. [Google Scholar]
  16. Cooper, P. Five Ways Edge Computing Will Transform Business. 2017. Available online: https://blogs.microsoft.com/iot/2017/09/19/five-ways-edge-computing-will-transform-business/ (accessed on 13 September 2018).
  17. Butun, I.; Almgren, M.; Gulisano, V.; Papatriantafilou, M. Intrusion Detection in Industrial Networks via Data Streaming. In Industrial IoT: Challenges, Design Principles, Applications, and Security; Springer: Berlin, Germany, 2020; pp. 213–238. [Google Scholar]
  18. Butun, I. Prevention and Detection of Intrusions in Wireless Sensor Networks. Ph.D. Thesis, University of South Florida, Tampa, FL, USA, 2013. [Google Scholar]
  19. Aoudi, W. Departure-Based Intrusion Detection. Licentiate Thesis, Chalmers University of Technology, Göteborg, Sweden, 2019. Available online: https://research.chalmers.se/publication/509626/file/509626_Fulltext.pdf (accessed on 17 September 2020).
  20. Myers, D. Detecting Cyber Attacks on Industrial Control Systems Using Process Mining. Ph.D. Thesis, Queensland University of Technology, Brisbane City, Australia, 2019. [Google Scholar] [CrossRef]
  21. Aydogan, E.; Yilmaz, S.; Sen, S.; Butun, I.; Forsström, S.; Gidlund, M. A Central Intrusion Detection System for RPL-Based Industrial Internet of Things. In Proceedings of the 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, Sweden, 27–29 May 2019; pp. 1–5. [Google Scholar]
  22. Greenberg, A. Planting Tiny Spy Chips in Hardware Can Cost as Little as $200. Available online: https://www.wired.com/story/plant-spy-chips-hardware-supermicro-cheap-proof-of-concept/ (accessed on 10 October 2019).
  23. Ullo, S.L.; Sinha, G. Advances in Smart Environment Monitoring Systems Using IoT and Sensors. Sensors 2020, 20, 3113. [Google Scholar] [CrossRef] [PubMed]
  24. Butun, I.; Kantarci, B.; Erol-Kantarci, M. Anomaly detection and privacy preservation in cloud-centric Internet of Things. In Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015; pp. 2610–2615. [Google Scholar]
  25. OpenFog-Consortium. What We Do? Available online: https://www.openfogconsortium.org/what-we-do/ (accessed on 13 September 2018).
  26. Postscapes and Harbor Research. Available online: http://postscapes.com/what-exactly-is-the-internet-of-things-infographic/ (accessed on 20 June 2020).
  27. Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
  28. Jalali, F.; Hinton, K.; Ayre, R.; Alpcan, T.; Tucker, R.S. Fog Computing May Help to Save Energy in Cloud Computing. IEEE J. Sel. Areas Commun. 2016, 34, 1728–1739. [Google Scholar] [CrossRef]
  29. Lai, C.F.; Song, D.Y.; Hwang, R.H.; Lai, Y.X. A QoS-aware streaming service over fog computing infrastructures. In Proceedings of the IEEE Digital Media Industry &Academic Forum (DMIAF), Santorini, Greece, 4–6 July 2016; pp. 94–98. [Google Scholar]
  30. Yi, S.; Li, C.; Li, Q. A Survey of Fog Computing: Concepts, Applications and Issues. In Proceedings of the 2015 ACM Workshop on Mobile Big Data, Hangzhou, China, 21 June 2015; pp. 37–42. [Google Scholar] [CrossRef]
  31. Singh, J.; Pasquier, T.; Bacon, J.; Ko, H.; Eyers, D. Twenty Security Considerations for Cloud-Supported Internet of Things. IEEE Internet Things J. 2016, 3, 269–284. [Google Scholar] [CrossRef] [Green Version]
  32. Sohal, A.S.; Sandhu, R.; Sood, S.K.; Chang, V. A Cybersecurity Framework to Identify Malicious Edge Device in Fog Computing and Cloud-of-Things Environments. Comput. Secur. 2018, 74, 340–354. [Google Scholar] [CrossRef]
  33. Schneible, J.; Lu, A. Anomaly detection on the edge. In Proceedings of the 2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA, 23–25 October 2017; pp. 678–682. [Google Scholar]
  34. Arias, O.; Wurm, J.; Hoang, K.; Jin, Y. Privacy and Security in Internet of Things and Wearable Devices. IEEE Trans. Multi-Scale Comput. Sys. 2015, 1, 99–109. [Google Scholar] [CrossRef]
  35. Kaur, J.; Agrawal, A.; Khan, R.A. Security Issues in Fog Environment: A Systematic Literature Review. Int. J. Wirel. Inf. Netw. 2020, 27, 467–483. [Google Scholar] [CrossRef]
  36. Huang, Z.; Wang, Q. A PUF-based unified identity verification framework for secure IoT hardware via device authentication. World Wide Web 2020, 23, 1057–1088. [Google Scholar] [CrossRef]
  37. Matas, K.; La, T.; Grunchevski, N.; Pham, K.; Koch, D. Invited Tutorial: FPGA Hardware Security for Datacenters and Beyond. In Proceedings of the 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGS), Seaside, CA, USA, 23–25 February 2020; pp. 11–20. [Google Scholar] [CrossRef] [Green Version]
  38. Hategekimana, F.; Whitaker, T.J.; Hossain Pantho, M.J.; Bobda, C. IoT Device security through dynamic hardware isolation with cloud-Based update. J. Syst. Archit. 2020, 109, 101827. [Google Scholar] [CrossRef]
  39. Skorobogatov, S.P. Semi-Invasive Attacks—A New Approach to Hardware Security. Available online: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.pdf (accessed on 17 September 2020).
  40. Butun, I.; Pereira, N.; Gidlund, M. Security risk analysis of LoRaWAN and future directions. Future Internet 2019, 11, 3. [Google Scholar] [CrossRef] [Green Version]
  41. Wang, C.; Hill, J.; Knight, J.; Davidson, J. Software Tamper Resistance: Obstructing Static Analysis of Programs. Technical Report. 2000. Available online: http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/wang00software.pdf (accessed on 17 September 2020).
  42. Michiels, W.; Gorissen, P. Mechanism for Software Tamper Resistance: An Application of White-Box Cryptography. In Proceedings of the 2007 ACM Workshop on Digital Rights Management, New York, NY, USA, 29 October–2 November 2007; pp. 82–89. [Google Scholar] [CrossRef]
  43. Blietz, B.; Tyagi, A. Software Tamper Resistance Through Dynamic Program Monitoring. In Digital Rights Management. Technologies, Issues, Challenges and Systems; Safavi-Naini, R., Yung, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2006; pp. 146–163. [Google Scholar]
  44. van Oorschot, P.C.; Somayaji, A.; Wurster, G. Hardware-assisted circumvention of self-hashing software tamper resistance. IEEE Trans. Dependable Secure Comput. 2005, 2, 82–92. [Google Scholar] [CrossRef]
  45. Wurster, G.; van Oorschot, P.C.; Somayaji, A. A generic attack on checksumming-based software tamper resistance. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (S P’05), Oakland, CA, USA, 8–11 May 2005; pp. 127–138. [Google Scholar]
  46. Bugday, A.; Ozsoy, A.; Öztaner, S.M.; Sever, H. Creating consensus group using online learning based reputation in blockchain networks. Pervasive Mob. Comput. 2019, 59, 101056. [Google Scholar] [CrossRef]
  47. Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E.; Puthal, D. PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). IEEE Consum. Electron. Mag. 2020, 9, 8–16. [Google Scholar] [CrossRef] [Green Version]
  48. Anderson, R.; Kuhn, M. Tamper resistance-a cautionary note. In Proceedings of the second Usenix Workshop on Electronic Commerce, Oakland, CA, USA, 18–21 November 1996; pp. 1–11. [Google Scholar]
  49. Skorobogatov, S. Physical Attacks and Tamper Resistance. In Introduction to Hardware Security and Trust; Tehranipoor, M., Wang, C., Eds.; Springer: New York, NY, USA, 2012; pp. 143–173. [Google Scholar] [CrossRef]
  50. Anderson, R.; Kuhn, M. Low cost attacks on tamper resistant devices. In Security Protocols; Christianson, B., Crispo, B., Lomas, M., Roe, M., Eds.; Springer: Berlin/Heidelberg, Germany, 1998; pp. 125–136. [Google Scholar]
  51. Yasin, M. Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory. In Proceedings of the 12th International Conference on Innovative Security Solutions for Information Technology and Communications (SecITC), Bucharest, Romania, 14–15 November 2019; p. 172. [Google Scholar]
  52. DaSilva, P.R.; Fortier, P.J. Hardware Based Detection, Recovery, and Tamper Evident Concept to Protect from Control Flow Violations in Embedded Processing. In Proceedings of the 2019 IEEE International Symposium on Technologies for Homeland Security (HST), Woburn, MA, USA, 5–6 November 2019; pp. 1–6. [Google Scholar]
  53. Boraten, T.; Kodi, A. Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs. J. Parallel Distrib. Comput. 2018, 111, 24–38. [Google Scholar] [CrossRef]
  54. Boraten, T.H. Hardware Security Threat and Mitigation Techniques for Network-on-Chips. Ph.D. Thesis, Ohio University, Athens, OH, USA, 2020. [Google Scholar]
  55. Gao, Y.; Al-Sarawi, S.F.; Abbott, D. Physical unclonable functions. Nat. Electron. 2020, 3, 81–91. [Google Scholar] [CrossRef]
  56. Suh, G.E.; Devadas, S. Physical Unclonable Functions for Device Authentication and Secret Key Generation. In Proceedings of the 44th ACM/IEEE Design Automation Conference, San Diego, CA, USA, 4–8 June 2007; pp. 9–14. [Google Scholar]
  57. Maes, R. Physically Unclonable Functions: Constructions, Properties and Applications, 1st ed.; Springer: Berlin, Germany, 2016; pp. 1–193. [Google Scholar]
  58. Lee, J.; Lee, D.; Lee, Y.; Lee, Y. A 445F2 leakage-based physically unclonable Function with Lossless Stabilization through Remapping for IoT Security. In Proceedings of the 2018 IEEE International Solid–State Circuits Conference (ISSCC), San Francisco, CA, USA, 11–15 February 2018; pp. 132–134. [Google Scholar]
  59. Wu, M.; Yang, T.; Chen, L.; Lin, C.; Hu, H.; Su, F.; Wang, C.; Huang, J.P.; Chen, H.; Lu, C.C.; et al. A PUF scheme using competing oxide rupture with bit error rate approaching zero. In Proceedings of the 2018 IEEE International Solid–State Circuits Conference (ISSCC), San Francisco, CA, USA, 11–15 February 2018; pp. 130–132. [Google Scholar]
  60. Carboni, R.; Ielmini, D. Applications of Resistive Switching Memory as Hardware Security Primitive. In Applications of Emerging Memory Technology: Beyond Storage; Suri, M., Ed.; Springer: Singapore, 2020; pp. 93–131. [Google Scholar] [CrossRef] [Green Version]
  61. Shanta, A.S.; Majumder, M.B.; Hasan, M.S.; Rose, G.S. Physically Unclonable and Reconfigurable Computing System (PURCS) for Hardware Security Applications. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst 2020. [Google Scholar] [CrossRef]
  62. Saraza-Canflanca, P.; Carrasco-Lopez, H.; Brox, P.; Castro-Lopez, R.; Roca, E.; Fernandez, F.V. Improving the reliability of SRAM-based PUFs in the presence of aging. In Proceedings of the 15th International Conference on Design Technology of Integrated Systems in Nanoscale Era (DTIS), Marrakesh, Morroco, 1–3 April 2020; pp. 1–6. [Google Scholar]
  63. Shifman, Y.; Miller, A.; Weizman, Y.; Fish, A.; Shor, J. An SRAM PUF with 2 Independent Bits/Cell in 65nm. In Proceedings of the 2019 IEEE International Symposium on Circuits and Systems (ISCAS), Sapporo, Japan, 26–29 May 2019; pp. 1–5. [Google Scholar]
  64. Cherupally, S.K.; Yin, S.; Kadetotad, D.; Bae, C.; Kim, S.J.; Seo, J. A Smart Hardware Security Engine Combining Entropy Sources of ECG, HRV, and SRAM PUF for Authentication and Secret Key Generation. IEEE J. Solid-State Circuits 2020, 55, 2680–2690. [Google Scholar] [CrossRef]
  65. Alioto, M. Trends in Hardware Security: From basics to ASICs. IEEE Solid-State Circuits Mag. 2019, 11, 56–74. [Google Scholar] [CrossRef]
  66. Huth, C.; Duplys, P.; Güneysu, T. Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions. In Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Sydney, NSW, Australia, 14–18 March 2016; pp. 1–6. [Google Scholar]
  67. Butun, I.; Österberg, P.; Song, H. Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 2019, 22, 616–644. [Google Scholar] [CrossRef] [Green Version]
  68. Babaei, A.; Schiele, G. Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges. Sensors 2019, 19, 3208. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  69. Halak, B.; Zwolinski, M.; Mispan, M.S. Overview of PUF-based hardware security solutions for the Internet of Things. In Proceedings of the 59th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Abu Dhabi, UAE, 16–19 October 2016; pp. 1–4. [Google Scholar]
  70. Standaert, F.X. Introduction to Side-Channel Attacks. In Secure Integrated Circuits and Systems; Verbauwhede, I.M.R., Ed.; Springer: Boston, MA, USA, 2010; pp. 27–42. [Google Scholar]
  71. Merli, D.; Schuster, D.; Stumpf, F.; Sigl, G. Side-Channel Analysis of PUFs and Fuzzy Extractors. In Trust and Trustworthy Computing; McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.R., Sasse, A., Beres, Y., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 33–47. [Google Scholar]
  72. Rührmair, U.; van Dijk, M. PUFs in Security Protocols: Attack Models and Security Evaluations. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 19–22 May 2013; pp. 286–300. [Google Scholar]
  73. Katzenbeisser, S.; Kocabaş, Ü.; Rožić, V.; Sadeghi, A.R.; Verbauwhede, I.; Wachsmann, C. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. In Cryptographic Hardware and Embedded Systems—CHES 2012; Prouff, E., Schaumont, P., Eds.; Springer: Berlin, Germany, 2012; pp. 283–301. [Google Scholar]
  74. Bluetooth. Available online: https://www.bluetooth.com/ (accessed on 7 October 2020).
  75. Sigfox. Available online: https://www.sigfox.com/en (accessed on 7 October 2020).
  76. LoRa. Available online: https://lora-alliance.org/ (accessed on 7 October 2020).
  77. Wi-Fi. Available online: https://www.wi-fi.org/ (accessed on 7 October 2020).
  78. WiMAX. Available online: http://www.wimaxforum.org (accessed on 7 October 2020).
  79. NB-IoT. Available online: https://www.3gpp.org/ (accessed on 7 October 2020).
  80. Libelium. Available online: https://www.libelium.com/ (accessed on 7 October 2020).
  81. Raspberry Pi 4. Available online: https://www.raspberrypi.org/ (accessed on 7 October 2020).
  82. Intel‘s New Core and Xeon W-3175X Processors: Spectre and Meltdown Security Update. Available online: https://www.anandtech.com/show/13450/intels-new-core-and-xeon-w-processors-fixes-for-spectre-meltdown (accessed on 15 September 2020).
  83. Microchip. 8-bit PIC and AVR Microcontrollers. Available online: https://www.microchip.com/design-centers/8-bit (accessed on 3 February 2019).
  84. Stojkoska, B.L.R.; Trivodaliev, K.V. A review of Internet of Things for smart home: Challenges and solutions. J. Clean. Prod. 2017, 140, 1454–1464. [Google Scholar] [CrossRef]
  85. Augusto-Gonzalez, J.; Collen, A.; Evangelatos, S.; Anagnostopoulos, M.; Spathoulas, G.; Giannoutakis, K.M.; Votis, K.; Tzovaras, D.; Genge, B.; Gelenbe, E.; et al. From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes. In Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 11–13 September 2019; pp. 1–6. [Google Scholar]
  86. Butun, I.; Österberg, P. Detecting Intrusions in Cyber-Physical Systems of Smart Cities: Challenges and Directions. In Secure Cyber-Physical Systems for Smart Cities; IGI Global: Hershey, PA, USA, 2019; pp. 74–102. [Google Scholar]
  87. Forsström, S.; Butun, I.; Eldefrawy, M.; Jennehag, U.; Gidlund, M. Challenges of Securing the Industrial Internet of Things Value Chain. In Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, Brescia, Italy, 16–18 April 2018; pp. 218–223. [Google Scholar]
  88. Markakis, E.; Nikoloudakis, Y.; Mastorakis, G.; Mavromoustakis, C.X.; Pallis, E.; Sideris, A.; Zotos, N.; Antic, J.; Cernivec, A.; Fejzic, D.; et al. Acceleration at the Edge for Supporting SMEs Security: The FORTIKA Paradigm. IEEE Commun. Mag. 2019, 57, 41–47. [Google Scholar] [CrossRef]
  89. Waqas. Call It Killer Malware? Available online: https://www.hackread.com/new-malware-can-modify-ct-mri-scan-results/ (accessed on 13 May 2019).
Figure 1. Fog computing as a gateway in between cloud computing and IoT.
Figure 1. Fog computing as a gateway in between cloud computing and IoT.
Sensors 20 05729 g001
Figure 2. Representation of “Fog as a Service” model.
Figure 2. Representation of “Fog as a Service” model.
Sensors 20 05729 g002
Figure 3. IoT connectivity diagram [26].
Figure 3. IoT connectivity diagram [26].
Sensors 20 05729 g003
Figure 4. A subset of hardware related attack vectors and their relations [39].
Figure 4. A subset of hardware related attack vectors and their relations [39].
Sensors 20 05729 g004
Figure 5. Representation of “Hardware Assisted Security” for fog computing based IoT networks. Logos/images are taken from: Bluetooth [74], Sigfox [75], LoRa [76], Wi-Fi [77], WiMAX [78], NB-IoT [79], Libelium [80], and PI [81].
Figure 5. Representation of “Hardware Assisted Security” for fog computing based IoT networks. Logos/images are taken from: Bluetooth [74], Sigfox [75], LoRa [76], Wi-Fi [77], WiMAX [78], NB-IoT [79], Libelium [80], and PI [81].
Sensors 20 05729 g005
Figure 6. An illustration of four different possible fog computing applications with IoT networks: Smart Office, Smart Factory, Smart Home, and Intelligent Traffic System.
Figure 6. An illustration of four different possible fog computing applications with IoT networks: Smart Office, Smart Factory, Smart Home, and Intelligent Traffic System.
Sensors 20 05729 g006
Table 1. Comparison of cloud and fog and mobile-edge computing concepts [13].
Table 1. Comparison of cloud and fog and mobile-edge computing concepts [13].
FeatureCloudMobile-EdgeFog
Access to the network viaWired (mostly fiber) or wirelessWireless (mostly cellular)Wireless (cellular, WiMAX, IEEE802.15, LPWAN, etc.)
Access to the serviceThrough serverThrough BS *At the FCG *
AgilitySlowFastFastest
AvailabilityMostly availableMostly availableMostly volatile
Bandwidth usageHighMediumLow
Capacity—ComputingHighMediumLow
Capacity—StorageHighMediumLow
ConnectivityInternetMany protocols (Figure 3)Many protocols (Figure 3)
Content distributed toEdge deviceRestricted to BS coverageAnywhere
Content generatorMan madeMixedSensor made
Content generation atCentral serverBSFCG
ControlCentralizedDistributed till BSsDistributed
Data analysisLong termInstant/Short termInstant/Short term
LatencyHighModerateLow
Processing/storage atCenter (Server)Mobile-Edge (BS)Edge (FCG)
Scalability (Horizontal +)HighMediumLow
Scalability (Vertical ±)HighMediumLow
SecurityWeakerStrongerStronger
MobilityNot supportedSupportedSupported
Number of usersBillionsMillions/BillionsMillions/Billions
Virtual infrastructure atEnterprise serverMain serverUser devices
* BS: Base Station, FCG: Fog Computing Gateway. + By adding more machine. ± By adding more hardware (CPU, RAM, Storage, etc.).
Table 2. Various RF communication technologies for IoT.
Table 2. Various RF communication technologies for IoT.
TechnologyStandardFrequencyPenetrationRangeMax Data RateChannel BandwidthChipset Cost
NFC/RFIDISO/ICE 1809213.56 MHzHigh<20 cm424 kbps106–424 Mbps$0.1+
BluetoothIEEE 802.152.4/2.5 GHzLow50–100 m2 Mbps2 MHz$5+
Wi-FiIEEE 802.112.4/5.0 GHzLow100 m54 Mbps22 MHz$1.5-30+
ZigbeeIEEE 802.15.4868/915 MHz, 2.4 GHzLow/High<1 km250 kbps2 MHz$2-20+
DASH7ISO/IEC 18000-7433/868/915 MHzHigh0–5 km167 kbpsup to 1.75 MHz$3.00+
WeightlessWeightless P/N/WMultipleLow/High5 km100 kbps200 Hz–12.5 KHz$2.00
LoRaVarious868/915 MHzLow25 km50 kbps125/250/500 kHz$2.00
Ingenu-RPMAIngenu-RPMA2.4 GHzLow15 km20 kbps1 MHzrental
SigFoxSigFox915–928 MHzLow/High40 km100 bps100 Hz$0.25+
3GUMTS/W-CDMA0.4–3 GHzLow/High5–35 km0.38–21.6 Mbps3.6–21 Mbpsvaries
4G/LTE3GPP-LTE0.6–6 GHzLow/High5–100 km100–300 Mbps100 Mbps+$6.5+
5G5GTF/5G-SIG0.6–4/100 GHzLow/High5–150 km10 Gbps500 Mbps+$70+
Table 3. Security risk analysis for hardware cyber-threats vs. common security properties for fog-computing based IoT end-devices including attack vector classification. Legend: C: Confidentiality, I: Integrity, A: Availability, Auth*: Authentication & Access Control, In: Invasive, NI: Non-Invasive, S: Semi-Invasive.
Table 3. Security risk analysis for hardware cyber-threats vs. common security properties for fog-computing based IoT end-devices including attack vector classification. Legend: C: Confidentiality, I: Integrity, A: Availability, Auth*: Authentication & Access Control, In: Invasive, NI: Non-Invasive, S: Semi-Invasive.
Threat CategorySeverity of the RiskVector
CIAAuth *
Destroy, remove or steal end-deviceNoneNoneModerateNoneNI
Device cloningModerateModerateMinimalSignificantIn
Firmware replacementModerateModerateMinimalSignificantIn
Security parameter extraction by phy. accessModerateMinimalMinimalSignificantIn
JammingMinimalMinimalSignificantMinimalNI
Rogue end-deviceModerateModerateModerateSignificantIn/S
Bit-flippingMinimalModerateMinimalMinimalIn
Table 4. Comparison of the specs for the subset of the available COTS IoT hardware devices.
Table 4. Comparison of the specs for the subset of the available COTS IoT hardware devices.
PriceSizeConnectivityComputationPowerCPU SpecsMemoryGraphicsStorage
MCU$0.1–20VariuosN/ALimited0.29 WVariousN/AN/AN/A
Pi Zero$10–3066 × 30.5 × 5Bluetooth/LAN/WifiLow0.4–1.2 W*BCM2835 1 GHz512 MBVideocore IVmicroSD
1 × microUSB
mini-HDMI
Pi 3$30–6085 × 56 × 17Bluetooth/LAN/WifiMedium1–2 W1.2 GHz quad-core1 GBVideocore IVmicroSD
4 × USB, HDMI  ARM Cortex-A53
Pine$15–29133 × 80 × 1910/100/1000 MbpsMedium1.5–4.1 W1.2 GHz quad-core0.5–2 GBDual Core MalimicroSD
A64 Ethernet Port, ARM Cortex-A53 400 MP2
2 × USB 2.0 64bit
Rock64$25–4585 × 56 × 18.810/100/1000 MbpsMedium1.5–4.1 WRK3328 Quad-Core1/2/4 GBARM MalimicroSD
1 USB3.0 ARM Cortex A53 450MP2
2 USB2.0 64bit Dual-core
Jetson$60017 × 17 × 5.1Bluetooth/LAN/WifiHigh7.5–15 WDual-Core Denver 28 GB 128-bit256-core GPUeMMC 5.1
TX2 64-BitLPDDR4NVIDIA Pascal
Libelium$13073.5 × 51 × 13Mini USBLow< 15 WATmega1281N/AN/ASD Card
Arduino$11–77VariousMicro/Mini/RegularLow≥ 0.29 W8MHz to 400MhzKB < 64 MBN/AEEPROM
USB
TelosB$9981.9 × 32.5 × 6.55USBLow≥ 0.075 W8 MHz TI MSP430KB < 1 MB10 KBExt Flash

Share and Cite

MDPI and ACS Style

Butun, I.; Sari, A.; Österberg, P. Hardware Security of Fog End-Devices for the Internet of Things. Sensors 2020, 20, 5729. https://doi.org/10.3390/s20205729

AMA Style

Butun I, Sari A, Österberg P. Hardware Security of Fog End-Devices for the Internet of Things. Sensors. 2020; 20(20):5729. https://doi.org/10.3390/s20205729

Chicago/Turabian Style

Butun, Ismail, Alparslan Sari, and Patrik Österberg. 2020. "Hardware Security of Fog End-Devices for the Internet of Things" Sensors 20, no. 20: 5729. https://doi.org/10.3390/s20205729

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop