Affiliations 

  • 1 School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India
  • 2 Computer Science and Engineering Department, Symbiosis Institute of Technology (SIT), Symbiosis International (Deemed) University (SIU), Pune, India
  • 3 Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India
  • 4 Department of Information Systems, King Khalid University, Muhayel Aseer, Saudi Arabia
  • 5 Universiti Malaysia Sabah, Sabah, Malaysia
  • 6 Alzaiem Alazhari University, Khartoum North, Sudan
  • 7 Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia
PeerJ Comput Sci, 2023;9:e1771.
PMID: 38192478 DOI: 10.7717/peerj-cs.1771

Abstract

The Internet of Things has a bootloader and applications responsible for initializing the device's hardware and loading the operating system or firmware. Ensuring the security of the bootloader is crucial to protect against malicious firmware or software being loaded onto the device. One way to increase the security of the bootloader is to use digital signature verification to ensure that only authorized firmware can be loaded onto the device. Additionally, implementing secure boot processes, such as a chain of trust, can prevent unauthorized access to the device's firmware and protect against tampering during the boot process. This research is based on the firmware bootloader and application dataflow taint analysis and security assessment of IoT devices as the most critical step in ensuring the security and integrity of these devices. This process helps identify vulnerabilities and potential attack vectors that attackers could exploit and provides a foundation for developing effective remediation strategies.

* Title and MeSH Headings from MEDLINE®/PubMed®, a database of the U.S. National Library of Medicine.