Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
GPT-5.1
GPT-5.1 91 tok/s
Gemini 3.0 Pro 46 tok/s Pro
Gemini 2.5 Flash 148 tok/s Pro
Kimi K2 170 tok/s Pro
Claude Sonnet 4.5 34 tok/s Pro
2000 character limit reached

DIMSIM -- Device Integrity Monitoring through iSIM Applets and Distributed Ledger Technology (2405.09916v1)

Published 16 May 2024 in cs.CR

Abstract: In the context of industrial environment, devices, such as robots and drones, are vulnerable to malicious activities such device tampering (e.g., hardware and software changes). The problem becomes even worse in a multi-stakeholder environment where multiple players contribute to an ecosystem. In such scenarios, particularly, when devices are deployed in remote settings, ensuring device integrity so that all stakeholders can trust them is challenging. Existing methods, often depend on additional hardware like the Trusted Platform Module (TPM) which may not be universally provided by all vendors. In this study, we introduce a distributed ledger technology-oriented architecture to monitor the remote devices' integrity using eUICC technology, a feature commonly found in industrial devices for cellular connectivity. We propose that using secure applets in eUICC, devices' integrity can be monitored and managed without installing any additional hardware. To this end, we present an end-to-end architecture to monitor device integrity thereby enabling all the stakeholders in the system to trust the devices. Additionally, we leverage the properties of immutable databases to provide robustness and efficiently to our model. In our primary evaluations, we measure the overhead caused by hashing our proposed data packets and performance of integrating an immutable database into our system. Our results show that performing hashing on our data packets takes order of microseconds, while reading and writing to an immutable database also requires only milliseconds.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (15)
  1. T. Redlich, S. Wulf, M. Moritz, S. Buxbaum-Conradi, P. Krenz, and J. Wulfsberg, “The strategy of openness in industrial production,” in 2015 Portland International Conference on Management of Engineering and Technology (PICMET).   IEEE, 2015, pp. 302–309.
  2. K. Makhijani and T. Faisal, “Accountable and distributed industrial control systems with autonomous contracts : Ocn-dlt: Industry operations and control networks with distributed ledger technology,” in 2023 26th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), 2023, pp. 195–202.
  3. T. Faisal, “Accountable and transparent resource sharing and provisioning in future networks,” Ph.D. dissertation, King’s College London, 2023.
  4. “Unpatched Apache Tomcat Servers Spread Mirai Botnet Malware,” https://bit.ly/47nvhmR, accessed: 22-11-2023.
  5. “Nokia Attestation Engine,” https://github.com/nokia/AttestationEngine, accessed on: 22-03-2024.
  6. “SGP Embedded UICC Protection Profile,” https://bit.ly/GSMAeUICC, accessed: 09-11-2023.
  7. M. Paik, J. Irazábal, D. Zimmer, M. Meloni, and V. Padurean, “‘immudb: A lightweight, performant immutable database,” CodeNotary, Bellaire, TX, USA, Tech. Rep, 2020.
  8. “eSIM Whitepaper – The What and How of Remote SIM Provisioning,” https://bit.ly/GSMAeSIMWhitePaper, published on: March 2018.
  9. S. Patil, A. Kashyap, G. Sivathanu, and E. Zadok, “I3fs: An in-kernel integrity checker and intrusion detection file system.” in LISA, vol. 4, no. 1, 2004, pp. 67–78.
  10. G. H. Kim and E. H. Spafford, “The design and implementation of tripwire: A file system integrity checker,” in Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp. 18–29.
  11. D. Chakraborty, L. Hanzlik, and S. Bugiel, “{{\{{simTPM}}\}}: User-centric {{\{{TPM}}\}} for mobile devices,” in 28th USENIX Security Symposium (USENIX Security 19), 2019, pp. 533–550.
  12. H. Raj, S. Saroiu, A. Wolman, R. Aigner, J. Cox, P. England, C. Fenner, K. Kinshumann, J. Loeser, D. Mattoon et al., “{{\{{fTPM}}\}}: A {{\{{Software-Only}}\}} implementation of a {{\{{TPM}}\}} chip,” in 25th USENIX Security Symposium (USENIX Security 16), 2016, pp. 841–856.
  13. N. L. Petroni Jr, T. Fraser, J. Molina, and W. A. Arbaugh, “Copilot-a coprocessor-based kernel runtime integrity monitor.” in USENIX security symposium.   San Diego, USA, 2004, pp. 179–194.
  14. T. Schläpfer and A. Rüst, “Security on iot devices with secure elements,” in Embedded World Conference, Nuremberg, Germany, 26-28 February 2019.   WEKA, 2019.
  15. “SLM 97CSINFX8000PE,” https://bit.ly/Infinon, accessed: 05-10-2023.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets

This paper has been mentioned in 1 tweet and received 0 likes.

Upgrade to Pro to view all of the tweets about this paper: