Content area

Abstract

Internet of Things (IoT) devices has connected millions of houses around the globe via the internet. Running Artificial Intelligence (AI) on IoT devices is popular nowadays. Sending the data to the cloud for classification or decision making, introduce some problems like delay, power consumption, bandwidth occupation, privacy issue among others. To avoid these problems, the classification or decision-making has been pushed toward the edge of the network or to the IoT devices. This lead to edge intelligence or IoT device with AI. In the recent past, threats due to hardware Trojan in the integrated circuits (IC) have become a serious concern that affects IoT devices. In this dissertation, we discuss the possibility of the IoT device with embedded hardware Trojan that can cause serious security, privacy, and availability problems to the IoT-based Network. Conventional network attack detection techniques work at the network protocol layers. Whereas, IoT devices with hardware Trojan can lead to the peculiar manifestation of attack at the physical and/or firmware level. On the other hand, in the IC design, most of the hardware Trojan-based attack detection techniques require design time intervention, which is expensive for many of the IoT and cannot guarantee 100\% immunity. In this dissertation, we argue that the health of modern IoT devices requires a final line of defense against possible hardware Trojan-based attacks that go undetected during IC design and test. One of our approaches is to utilize power profiling (PP) data and network traffic (NT) data without intervening in the IC design to detect malicious activity in an IoT-based network. The technique is effective to identify multiple attacks concurrently and also able to differentiate between different types of attacks. Data fusion has been leveraged by combining the PP data and NT data and able to detect, without design time intervention, each of the five attacks individually with high accuracy. Another approach is to utilize the PP data of IoT devices for machine learning (ML) to detect untrusted IoT devices with the data `only' from the trusted IoT device. The ML algorithm efficiently detected the untrusted IoT device from the PP data collected from the trusted IoT device. On the other hand, Utilizing Convolutional Neural Networks (CNN) in IoT devices may be vulnerable to malicious users at hardware and firmware levels. Since most CNN cannot achieve the required throughput on a single IoT device due to the heavy computation and memory requirement, therefore, we propose a pipeline-based technique to distribute the CNN among multiple IoT devices, i.e., Distributed CNN (DCNN). The DCNN improves the throughput of the inference process. Verifying the integrity of the IoT device that is participating in the DCNN is a challenging task. Next, we explore the security of IoT devices in the DCNN. Then several kinds of attacks on CNN's layers have been examined Two novel stealthy attacks have been implemented.

Details

1010268
Title
Hardware Intrinsic Attacks on IoT Based Network: A Secure Edge Intelligence Perspective
Number of pages
176
Publication year
2021
Degree date
2021
School code
0390
Source
DAI-B 83/6(E), Dissertation Abstracts International
ISBN
9798759999096
Committee member
Eberle, William; Bruce, J. W.; Radman, Ghadir; Fidan, Ismail
University/institution
Tennessee Technological University
Department
Electrical Engineering
University location
United States -- Tennessee
Degree
Ph.D.
Source type
Dissertation or Thesis
Language
English
Document type
Dissertation/Thesis
Dissertation/thesis number
28715695
ProQuest document ID
2620835821
Document URL
https://www.proquest.com/dissertations-theses/hardware-intrinsic-attacks-on-iot-based-network/docview/2620835821/se-2?accountid=208611
Copyright
Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works.
Database
2 databases
  • ProQuest One Academic
  • ProQuest One Academic