Proceedings of the 2024 2nd International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2024)

Enhancing IoT Security Through Trusted Execution Environments

Authors
Zheng Zhang1, *
1College of Big Data and Information Engineering, Guizhou University, Guiyang, 550025, China
*Corresponding author. Email: cse.zzhang21@gzu.edu.cn
Corresponding Author
Zheng Zhang
Available Online 16 October 2024.
DOI
10.2991/978-94-6463-540-9_58How to use a DOI?
Keywords
IoT Security; Trusted Execution Environments; Hardware Support; Security principles
Abstract

As the Internet of Things (IoT) proliferates, securing these interconnected devices has become a critical concern. Trusted Execution Environments (TEEs) offer a crucial mechanism for bolstering IoT device security. This paper delves deeply into the application of TEEs within the IoT ecosystem to protect sensitive data and operations. It begins by discussing the necessity of hardware support in implementing TEEs, followed by an examination of the core security principles essential to their functioning. A systematic analysis then explores successful deployments of TEEs in IoT devices, with case studies illustrating their effectiveness in enhancing security. Further, this study reviews current IoT security regulations, providing insights into how TEEs can aid in compliance. The discussion transitions to the challenges associated with integrating TEEs into IoT devices, focusing on scalability, network complexity, and specific security vulnerabilities inherent to TEEs. This research highlights the significant role of TEEs in strengthening IoT devices against an evolving landscape of cyber threats, while also recognizing the complexities involved in their implementation.

Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 2024 2nd International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2024)
Series
Advances in Computer Science Research
Publication Date
16 October 2024
ISBN
978-94-6463-540-9
ISSN
2352-538X
DOI
10.2991/978-94-6463-540-9_58How to use a DOI?
Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Zheng Zhang
PY  - 2024
DA  - 2024/10/16
TI  - Enhancing IoT Security Through Trusted Execution Environments
BT  - Proceedings of the 2024 2nd International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2024)
PB  - Atlantis Press
SP  - 580
EP  - 589
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-540-9_58
DO  - 10.2991/978-94-6463-540-9_58
ID  - Zhang2024
ER  -