The University of Southampton
University of Southampton Institutional Repository

Recommendations for securing Internet of Things devices using commodity hardware.

Recommendations for securing Internet of Things devices using commodity hardware.
Recommendations for securing Internet of Things devices using commodity hardware.
The Internet of Things (IoT) describes a world where ubiquitous devices such as sensors are all capable of communicating with the Internet. The concept of Internet enabling devices is not new, however the popularity of IoT promises to increase the number of connected devices considerably. Ubiquitous IoT devices have serious security implications as they occur in large numbers, are geographically distributed and can be difficult to physically secure. These devices may contain sensitive or commercially valuable data making them attractive to various forms of attack.
TPM, Secureboot, TrustZone, IoT, cryptoprocessor, signed bootloader, encrypted bootloader
University of Southampton
Scott, Mark
259ec612-6948-4e99-8027-ae2dd2a366cb
Johnston, Steven
6b903ec2-7bae-4a56-9c21-eea0a70bfa2b
Cox, Simon
0e62aaed-24ad-4a74-b996-f606e40e5c55
Scott, Mark
259ec612-6948-4e99-8027-ae2dd2a366cb
Johnston, Steven
6b903ec2-7bae-4a56-9c21-eea0a70bfa2b
Cox, Simon
0e62aaed-24ad-4a74-b996-f606e40e5c55

Scott, Mark, Johnston, Steven and Cox, Simon (2016) Recommendations for securing Internet of Things devices using commodity hardware. University of Southampton doi:10.5258/SOTON/402140 [Dataset]

Record type: Dataset

Abstract

The Internet of Things (IoT) describes a world where ubiquitous devices such as sensors are all capable of communicating with the Internet. The concept of Internet enabling devices is not new, however the popularity of IoT promises to increase the number of connected devices considerably. Ubiquitous IoT devices have serious security implications as they occur in large numbers, are geographically distributed and can be difficult to physically secure. These devices may contain sensitive or commercially valuable data making them attractive to various forms of attack.

Text
WF_IoT_UnderlyingData.pdf - Dataset
Download (60kB)

More information

Published date: 2016
Keywords: TPM, Secureboot, TrustZone, IoT, cryptoprocessor, signed bootloader, encrypted bootloader
Organisations: Computational Engineering & Design Group

Identifiers

Local EPrints ID: 402140
URI: http://eprints.soton.ac.uk/id/eprint/402140
PURE UUID: 682d0e8b-bd03-459b-a3cc-7e9f19183a3d
ORCID for Steven Johnston: ORCID iD orcid.org/0000-0003-3864-7072

Catalogue record

Date deposited: 11 Nov 2016 10:05
Last modified: 04 Nov 2023 18:00

Export record

Altmetrics

Contributors

Creator: Mark Scott
Creator: Steven Johnston ORCID iD
Creator: Simon Cox

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×