Secure Intermittent Computing: Precomputation and Implementation
This thesis explores the security of intermittent devices, embedded systems designed to retain their state across periods of power loss, for cases both when the device has an excess of available energy and when power loss is unavoidable. Existing work with intermittent systems has focused on the pro...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Virginia Tech
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10919/83376 |
id |
ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-83376 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-833762021-11-17T05:37:44Z Secure Intermittent Computing: Precomputation and Implementation Suslowicz, Charles Eugene Electrical and Computer Engineering Schaumont, Patrick R. Michaels, Alan J. Patterson, Cameron D. intermittent computing embedded systems security This thesis explores the security of intermittent devices, embedded systems designed to retain their state across periods of power loss, for cases both when the device has an excess of available energy and when power loss is unavoidable. Existing work with intermittent systems has focused on the problems inherent to the intermittent paradigm and ignored the security implications of persistent state across periods of power loss. The security of these devices is closely linked to their unique operational characteristics and are addressed here in two studies. First, the presence of an energy harvester creates an opportunity to use excess energy, available when additional energy is harvested after the local energy reservoir is filled, to precompute security related operations. Precomputation powered by this excess energy can reduce the cost of expensive tasks during periods of energy scarcity, potentially enabling the use of expensive security operations on traditionally unsecured devices. Second, when energy is limited and intermittent operation is required, the secure storage of checkpoints is a necessity to protect against adversary manipulation of the system state. To examine the secure storage of checkpoints a protocol is implemented to ensure the integrity and authenticity of a device's checkpoints, and evaluated for its energy overhead and performance. The cost of properly ensuring the integrity and authenticity of these checkpoints is examined to identify the overhead necessary to execute intermittent operations in a secure manner. Taken together, these studies lay the groundwork for a comprehensive view of the current state of intermittent device security. Master of Science 2018-05-23T08:00:33Z 2018-05-23T08:00:33Z 2018-05-22 Thesis vt_gsexam:16461 http://hdl.handle.net/10919/83376 In Copyright http://rightsstatements.org/vocab/InC/1.0/ ETD application/pdf application/pdf Virginia Tech |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
intermittent computing embedded systems security |
spellingShingle |
intermittent computing embedded systems security Suslowicz, Charles Eugene Secure Intermittent Computing: Precomputation and Implementation |
description |
This thesis explores the security of intermittent devices, embedded systems designed to retain their state across periods of power loss, for cases both when the device has an excess of available energy and when power loss is unavoidable. Existing work with intermittent systems has focused on the problems inherent to the intermittent paradigm and ignored the security implications of persistent state across periods of power loss. The security of these devices is closely linked to their unique operational characteristics and are addressed here in two studies. First, the presence of an energy harvester creates an opportunity to use excess energy, available when additional energy is harvested after the local energy reservoir is filled, to precompute security related operations. Precomputation powered by this excess energy can reduce the cost of expensive tasks during periods of energy scarcity, potentially enabling the use of expensive security operations on traditionally unsecured devices. Second, when energy is limited and intermittent operation is required, the secure storage of checkpoints is a necessity to protect against adversary manipulation of the system state. To examine the secure storage of checkpoints a protocol is implemented to ensure the integrity and authenticity of a device's checkpoints, and evaluated for its energy overhead and performance. The cost of properly ensuring the integrity and authenticity of these checkpoints is examined to identify the overhead necessary to execute intermittent operations in a secure manner. Taken together, these studies lay the groundwork for a comprehensive view of the current state of intermittent device security. === Master of Science |
author2 |
Electrical and Computer Engineering |
author_facet |
Electrical and Computer Engineering Suslowicz, Charles Eugene |
author |
Suslowicz, Charles Eugene |
author_sort |
Suslowicz, Charles Eugene |
title |
Secure Intermittent Computing: Precomputation and Implementation |
title_short |
Secure Intermittent Computing: Precomputation and Implementation |
title_full |
Secure Intermittent Computing: Precomputation and Implementation |
title_fullStr |
Secure Intermittent Computing: Precomputation and Implementation |
title_full_unstemmed |
Secure Intermittent Computing: Precomputation and Implementation |
title_sort |
secure intermittent computing: precomputation and implementation |
publisher |
Virginia Tech |
publishDate |
2018 |
url |
http://hdl.handle.net/10919/83376 |
work_keys_str_mv |
AT suslowiczcharleseugene secureintermittentcomputingprecomputationandimplementation |
_version_ |
1719494272271515648 |