Loading

Trusted Execution Environments for Internet of Things Devices
Abhilash Kayyidavazhiyil1, Sheena Kaipacheri2

1Abhilash Kayyidavazhiyil*, Research Scholar, Liverpool John Moore University, UK.
2Sheena Kaipacheri, Senior Engineer, Digital 14.
Manuscript received on 17 April 2022. | Revised Manuscript received on 03 May 2022. | Manuscript published on 30 May 2022. | PP: 45-48 | Volume-11 Issue-6, May 2022. | Retrieval Number: 100.1/ijitee.F98850511622 | DOI: 10.35940/ijitee.F9885.0511622
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential processor that’s designed to shield the most touchy information and operations. TEEs are utilized in an expansion of applications, which incorporates cell gadgets, price processing, and statistics safety. The usage of TEEs is becoming increasingly crucial because the amount of touchy records that are processed and stored electronically continues to develop. TEEs can help guard statistics from being accessed or changed with the resource of unauthorised customers, and can also assist ensure that facts aren’t always compromised at some stage in transmission. TEEs typically applied the employment of specialized hardware that would offer a better degree of protection than software program-most effective solutions. Hardware-primarily based total TEEs can also offer better overall performance and power efficiency than software-handiest solutions. There are some particular TEE implementations to be had, which incorporates Intel’s TXT, ARM’s TrustZone, and Samsung’s KNOX. Each of those implementations has its very personal strengths and weaknesses, so it’s miles more crucial to pick the right TEE on your precise software. reckoning on execution environments are becoming an increasing number of necessities because the amount of touchy facts that’s processed and stored electronically continues growing. TEEs can assist shield facts from being accessed or modified by means of way of unauthorized customers, and might also help make sure that records aren’t compromised at some point of transmission. TEEs normally implemented the employment of specialized hardware, which will offer a far better degree of protection than software program-only answers. To research how this period has been implemented to the exceptional IoT eventualities, which normally address unique characteristics which incorporate device useful resource constraints, we allotted a scientific literature evaluation. 
Keywords: Trusted Execution Environment, Internet of Things, Fog Computing, Security, Intel SGX.
Scope of the Article: Internet of Things