A Design Exploration Framework for Secure IoT-Systems

Lukas Alexander Gressl, Christian Steger, Ralph Peter Weissnegger, Andreas Daniel Sinnhofer, Alexander Rech

Publikation: KonferenzbeitragPaper


Cybersecurity is vital for embedded systems, especially for Internet of Things (IoT) systems. IoT systems have become essential in our daily lives, as they are usable for various application areas. They are usually small, connected with other systems, and perform a wide range of tasks. They are subject to multiple constraints in terms of performance, power consumption, chip area, etc. Attackers often target such devices as they are in constant interaction with each other or connected to the internet during private data processing. Cybersecurity, thus, plays a vital role in the design of IoT systems. Hence, designing secure IoT systems is a complex task, particularly for designers with limited security know-how. Security measures increase both computation time and power consumption, creating a conflict between these constraints, which must be solved by the designers. Balancing these constraints is a highly complex task. In this paper, we propose a new approach for considering security constraints in design space exploration, including possible security attacks on embedded systems. The method simplifies the consideration of security requirements at the start of the system design. We introduce a security attack based design space exploration framework, capable of finding the optimal design for an IoT system, based on its architectural, behavioral, and security attack description. The paper shows the feasibility and benefits of the framework, employing a secure sensor use case.

PublikationsstatusVeröffentlicht - Jun 2020
Veranstaltung2020 International Conference on Cyber Security and Protection of Digital Services - Virtuell
Dauer: 15 Jun 202019 Jun 2020


Konferenz2020 International Conference on Cyber Security and Protection of Digital Services
KurztitelCyber Security 2020

ASJC Scopus subject areas

  • !!Information Systems and Management
  • Information systems
  • !!Safety, Risk, Reliability and Quality
  • !!Computer Networks and Communications


Untersuchen Sie die Forschungsthemen von „A Design Exploration Framework for Secure IoT-Systems“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren