Secure Intermittent Computing: Precomputation and Implementation

This thesis explores the security of intermittent devices, embedded systems designed to retain their state across periods of power loss, for cases both when the device has an excess of available energy and when power loss is unavoidable. Existing work with intermittent systems has focused on the pro...

Full description

Bibliographic Details
Main Author: Suslowicz, Charles Eugene
Other Authors: Electrical and Computer Engineering
Format: Others
Published: Virginia Tech 2018
Subjects:
Online Access:http://hdl.handle.net/10919/83376
id ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-83376
record_format oai_dc
spelling ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-833762021-11-17T05:37:44Z Secure Intermittent Computing: Precomputation and Implementation Suslowicz, Charles Eugene Electrical and Computer Engineering Schaumont, Patrick R. Michaels, Alan J. Patterson, Cameron D. intermittent computing embedded systems security This thesis explores the security of intermittent devices, embedded systems designed to retain their state across periods of power loss, for cases both when the device has an excess of available energy and when power loss is unavoidable. Existing work with intermittent systems has focused on the problems inherent to the intermittent paradigm and ignored the security implications of persistent state across periods of power loss. The security of these devices is closely linked to their unique operational characteristics and are addressed here in two studies. First, the presence of an energy harvester creates an opportunity to use excess energy, available when additional energy is harvested after the local energy reservoir is filled, to precompute security related operations. Precomputation powered by this excess energy can reduce the cost of expensive tasks during periods of energy scarcity, potentially enabling the use of expensive security operations on traditionally unsecured devices. Second, when energy is limited and intermittent operation is required, the secure storage of checkpoints is a necessity to protect against adversary manipulation of the system state. To examine the secure storage of checkpoints a protocol is implemented to ensure the integrity and authenticity of a device's checkpoints, and evaluated for its energy overhead and performance. The cost of properly ensuring the integrity and authenticity of these checkpoints is examined to identify the overhead necessary to execute intermittent operations in a secure manner. Taken together, these studies lay the groundwork for a comprehensive view of the current state of intermittent device security. Master of Science 2018-05-23T08:00:33Z 2018-05-23T08:00:33Z 2018-05-22 Thesis vt_gsexam:16461 http://hdl.handle.net/10919/83376 In Copyright http://rightsstatements.org/vocab/InC/1.0/ ETD application/pdf application/pdf Virginia Tech
collection NDLTD
format Others
sources NDLTD
topic intermittent computing
embedded systems security
spellingShingle intermittent computing
embedded systems security
Suslowicz, Charles Eugene
Secure Intermittent Computing: Precomputation and Implementation
description This thesis explores the security of intermittent devices, embedded systems designed to retain their state across periods of power loss, for cases both when the device has an excess of available energy and when power loss is unavoidable. Existing work with intermittent systems has focused on the problems inherent to the intermittent paradigm and ignored the security implications of persistent state across periods of power loss. The security of these devices is closely linked to their unique operational characteristics and are addressed here in two studies. First, the presence of an energy harvester creates an opportunity to use excess energy, available when additional energy is harvested after the local energy reservoir is filled, to precompute security related operations. Precomputation powered by this excess energy can reduce the cost of expensive tasks during periods of energy scarcity, potentially enabling the use of expensive security operations on traditionally unsecured devices. Second, when energy is limited and intermittent operation is required, the secure storage of checkpoints is a necessity to protect against adversary manipulation of the system state. To examine the secure storage of checkpoints a protocol is implemented to ensure the integrity and authenticity of a device's checkpoints, and evaluated for its energy overhead and performance. The cost of properly ensuring the integrity and authenticity of these checkpoints is examined to identify the overhead necessary to execute intermittent operations in a secure manner. Taken together, these studies lay the groundwork for a comprehensive view of the current state of intermittent device security. === Master of Science
author2 Electrical and Computer Engineering
author_facet Electrical and Computer Engineering
Suslowicz, Charles Eugene
author Suslowicz, Charles Eugene
author_sort Suslowicz, Charles Eugene
title Secure Intermittent Computing: Precomputation and Implementation
title_short Secure Intermittent Computing: Precomputation and Implementation
title_full Secure Intermittent Computing: Precomputation and Implementation
title_fullStr Secure Intermittent Computing: Precomputation and Implementation
title_full_unstemmed Secure Intermittent Computing: Precomputation and Implementation
title_sort secure intermittent computing: precomputation and implementation
publisher Virginia Tech
publishDate 2018
url http://hdl.handle.net/10919/83376
work_keys_str_mv AT suslowiczcharleseugene secureintermittentcomputingprecomputationandimplementation
_version_ 1719494272271515648