Proving IoT Devices Firmware Integrity with Bijective MAC Time Stamped

  • Pascal Urien

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This demonstration presents an innovative bijective MAC Time Stamped algorithm (bMAC_TS), running in an Arduino Nano, whose code is open and published. The goal of bMAC_TS is to detect corrupted software (especially bootloader) in IoT devices. It relies on two pillars: the memory space is finite and the computing time is stable. This algorithm computes a memory fingerprint with a hash function, according to a pseudo random order, fixed by a permutation P. The time required by this operation, following a normal distribution, is exored with the fingerprint.

Original languageEnglish
Title of host publicationIEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728155036
DOIs
Publication statusPublished - 1 Jun 2020
Event6th IEEE World Forum on Internet of Things, WF-IoT 2020 - New Orleans, United States
Duration: 2 Jun 202016 Jun 2020

Publication series

NameIEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings

Conference

Conference6th IEEE World Forum on Internet of Things, WF-IoT 2020
Country/TerritoryUnited States
CityNew Orleans
Period2/06/2016/06/20

Keywords

  • IoT
  • Security
  • Software Integrity

Fingerprint

Dive into the research topics of 'Proving IoT Devices Firmware Integrity with Bijective MAC Time Stamped'. Together they form a unique fingerprint.

Cite this