LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

02/17/2021
by   Carlton Shepherd, et al.
0

This paper presents LIRA-V, a lightweight system for performing remote attestation between constrained devices using the RISC-V architecture. We propose using read-only memory and the RISC-V Physical Memory Protection (PMP) primitive to build a trust anchor for remote attestation and secure channel creation. Moreover, we show how LIRA-V can be used for trusted communication between two devices using mutual attestation. We present the design, implementation and evaluation of LIRA-V using an off-the-shelf RISC-V microcontroller and present performance results to demonstrate its suitability. To our knowledge, we present the first remote attestation mechanism suitable for constrained RISC-V devices, with applications to cyber-physical systems and Internet of Things (IoT) devices.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/11/2021

On performance of PBFT for IoT-applications with constrained devices

Cyber-physical systems and the Internet of things (IoT) is becoming an i...
research
04/27/2018

Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs

Trusted Execution Environments (TEEs) are rapidly emerging as the go-to ...
research
12/11/2017

EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

Remote mobile and embedded devices are used to deliver increasingly impa...
research
01/10/2019

Secure and Computationally-Efficient Cryptographic Primitive based on Cellular Automation

Mageto, a random number generator based on one-dimensional cellular auto...
research
04/13/2020

ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things

The resource-constrained nature of the Internet of Things (IoT) devices,...
research
06/28/2019

A DTLS Abstraction Layer for the Recursive Networking Architecture in RIOT

On the Internet of Things (IoT), devices continuously communicate with e...
research
02/15/2023

An Efficient B-tree Implementation for Memory-Constrained Embedded Systems

Embedded devices collect and process significant amounts of data in a va...

Please sign up or login with your details

Forgot password? Click here to reset