{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:06:42Z","timestamp":1760242002600,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T00:00:00Z","timestamp":1543536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The introduction of the internet in embedded devices led to a new era of technology\u2014the Internet of Things (IoT) era. The IoT technology-enabled device market is growing faster by the day, due to its complete acceptance in diverse areas such as domicile systems, the automobile industry, and beyond. The introduction of internet connectivity in objects that are frequently used in daily life raises the question of security\u2014how secure is the information and the infrastructure handled by these devices when they are connected to the internet? Security enhancements through standard cryptographic techniques are not suitable due to the power and performance constraints of IoT devices. The introduction of virtualization technology into IoT devices is a recent development, meant for fulfilling security and performance needs. However, virtualization augments the vulnerability present in IoT devices, due to the addition of one more software layer\u2014namely, the hypervisor, which enables the sharing of resources among different users. This article proposes the adaptation of ASMI (Architectural Support for Memory Isolation\u2014a general architecture available in the literature for the improvement of the performance and security of virtualization technology) on the popular MIPS (Microprocessor without Interlocked Pipeline Stages) embedded virtualization platform, which could be adopted in embedded virtualization architectures for IoT devices. The article illustrates the performance enhancement achieved by the proposed architecture with the existing architectures.<\/jats:p>","DOI":"10.3390\/fi10120119","type":"journal-article","created":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T12:13:17Z","timestamp":1543579997000},"page":"119","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5912-0638","authenticated-orcid":false,"given":"Jithin","family":"R","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology, Calicut 673601, India"}]},{"given":"Priya","family":"Chandran","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology, Calicut 673601, India"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","article-title":"DDoS in the IoT: Mirai and other botnets","volume":"50","author":"Kolias","year":"2017","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Pacheco, J., and Hariri, S. (2016, January 12\u201316). IoT security framework for smart cyber infrastructures. Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), Augsburg, Germany.","key":"ref_2","DOI":"10.1109\/FAS-W.2016.58"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1109\/TII.2014.2299233","article-title":"Developing vehicular data cloud services in the IoT environment","volume":"10","author":"He","year":"2014","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","article-title":"A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications","volume":"4","author":"Lin","year":"2017","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Wurm, J., Hoang, K., Arias, O., Sadeghi, A.R., and Jin, Y. (2016, January 25\u201328). Security analysis on consumer and industrial iot devices. Proceedings of the 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macau, China.","key":"ref_5","DOI":"10.1109\/ASPDAC.2016.7428064"},{"doi-asserted-by":"crossref","unstructured":"Sherman, M. (2014, January 17). Attack Surfaces for Mobile Devices. Proceedings of the 2Nd International Workshop on Software Development Lifecycle for Mobile, Hong Kong, China.","key":"ref_6","DOI":"10.1145\/2661694.2661696"},{"doi-asserted-by":"crossref","unstructured":"Minoli, D., Sohraby, K., and Kouns, J. (2017, January 8\u201311). IoT security (IoTSec) considerations, requirements, and architectures. Proceedings of the 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","key":"ref_7","DOI":"10.1109\/CCNC.2017.7983271"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","article-title":"A survey on security and privacy issues in internet-of-things","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"unstructured":"Moratelli, C.R. (2016). A Lightweight Virtualization Layer with Hardware-Assistance for Embedded Systems, Pontif\u00edcia Universidade Cat\u00f3lica do Rio Grande do Sul.","key":"ref_9"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","article-title":"Internet of Things security: A survey","volume":"88","author":"Alaba","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., and Gabrys, B. (2016, January 24\u201329). The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. Proceedings of the 2016 IEEE Congress on Evolutionary Computation (CEC), Vancouver, BC, Canada.","key":"ref_11","DOI":"10.1109\/CEC.2016.7743900"},{"doi-asserted-by":"crossref","unstructured":"Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.R., and Tarkoma, S. (2017, January 5\u20138). IoT Sentinel: Automated device-type identification for security enforcement in IoT. Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA.","key":"ref_12","DOI":"10.1109\/ICDCS.2017.283"},{"doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., and Gauravaram, P. (2017, January 13\u201317). Blockchain for IoT security and privacy: The case study of a smart home. Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA.","key":"ref_13","DOI":"10.1109\/PERCOMW.2017.7917634"},{"doi-asserted-by":"crossref","unstructured":"Aman, M.N., Chua, K.C., and Sikdar, B. (2016, January 30). Position Paper: Physical Unclonable Functions for IoT Security. Proceedings of the 2Nd ACM International Workshop on IoT Privacy, Trust, and Security, Xi\u2019an, China.","key":"ref_14","DOI":"10.1145\/2899007.2899013"},{"doi-asserted-by":"crossref","unstructured":"Moratelli, C., Zampiva, S., and Hessel, F. (2014, January 1\u20135). Full-Virtualization on MIPS-based MPSOCs embedded platforms with real-time support. Proceedings of the 2014 27th Symposium on Integrated Circuits and Systems Design (SBCCI), Aracaju, Brazil.","key":"ref_15","DOI":"10.1145\/2660540.2661012"},{"doi-asserted-by":"crossref","unstructured":"Heiser, G. (2011, January 5\u201310). Virtualizing embedded systems: Why bother?. Proceedings of the 48th Design Automation Conference, San Diego, CA, USA.","key":"ref_16","DOI":"10.1145\/2024724.2024925"},{"doi-asserted-by":"crossref","unstructured":"Heiser, G. (2008, January 1). The role of virtualization in embedded systems. Proceedings of the 1st Workshop on Isolation and Integration in Embedded Systems, Glasgow, Scotland.","key":"ref_17","DOI":"10.1145\/1435458.1435461"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"277","DOI":"10.4236\/jsea.2012.54033","article-title":"A state-of-the-art survey on real-time issues in embedded systems virtualization","volume":"5","author":"Gu","year":"2012","journal-title":"J. Softw. Eng. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s11265-008-0272-9","article-title":"SIGMA System: A Multi-OS Environment for Embedded Systems","volume":"59","author":"Kanda","year":"2010","journal-title":"J. Signal Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Moratelli, C., Johann, S., Neves, M., and Hessel, F. (2016, January 1\u20137). Embedded virtualization for the design of secure IoT applications. Proceedings of the 2016 International Symposium on Rapid System Prototyping (RSP), Pittsburgh, PA, USA.","key":"ref_20","DOI":"10.1145\/2990299.2990301"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/5.259423","article-title":"Real-time computing: A new discipline of computer science and engineering","volume":"82","author":"Shin","year":"1994","journal-title":"Proc. IEEE"},{"doi-asserted-by":"crossref","unstructured":"Xi, S., Wilson, J., Lu, C., and Gill, C. (2011, January 9\u201314). Rt-xen: Towards real-time hypervisor scheduling in xen. Proceedings of the 2011 Proceedings of the International Conference on Embedded Software (EMSOFT), Taipei, Taiwan.","key":"ref_22","DOI":"10.1145\/2038642.2038651"},{"doi-asserted-by":"crossref","unstructured":"Smith, J.E., and Nair, R. (2006). Virtual Machines: Versatile Platform for Systems and Processes, Morgan Kaufmann.","key":"ref_23","DOI":"10.1016\/B978-155860910-5\/50004-5"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/LCA.2016.2617308","article-title":"Towards a trustzone-assisted hypervisor for real time embedded systems","volume":"16","author":"Pinto","year":"2017","journal-title":"IEEE Comput. Arch. Lett."},{"doi-asserted-by":"crossref","unstructured":"Ukil, A., Sen, J., and Koilakonda, S. (2011, January 4\u20135). Embedded security for Internet of Things. Proceedings of the 2011 2nd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), Shillong, India.","key":"ref_25","DOI":"10.1109\/NCETACS.2011.5751382"},{"doi-asserted-by":"crossref","unstructured":"Pinto, S., Oliveira, D., Pereira, J., Cardoso, N., Ekpanyapong, M., Cabral, J., and Tavares, A. (2014, January 16\u201319). Towards a lightweight embedded virtualization architecture exploiting arm trustzone. Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA), Barcelona, Spain.","key":"ref_26","DOI":"10.1109\/ETFA.2014.7005255"},{"doi-asserted-by":"crossref","unstructured":"Jithin, R., and Chandran, P. (2014). Virtual Machine Isolation. Recent Trends in Computer Networks and Distributed Systems Security, Proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems (SNDS 2014), Trivandrum, India, 13\u201314 March 2014, Springer.","key":"ref_27","DOI":"10.1007\/978-3-642-54525-2_8"},{"unstructured":"(2018, June 13). Security on ARM TrustZone. Available online: https:\/\/www.arm.com\/products\/security-on-arm\/trustzone.","key":"ref_28"},{"unstructured":"(2018, June 13). MIPS Multi-Domain Security. Available online: https:\/\/www.mips.com\/products\/technologies\/mips-multi-domain-security.","key":"ref_29"},{"doi-asserted-by":"crossref","unstructured":"Jithin, R., and Chandran, P. (2016, January 4\u20138). Dynamic partitioning of physical memory among virtual machines: ASMI: Architectural support for memory isolation. Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy.","key":"ref_30","DOI":"10.1145\/2851613.2851870"},{"unstructured":"(2017, May 10). MIPS64\u00ae Architecture for Programmers Volume IV-i: Virtualization Module of the MIPS64\u00ae Architecture. Available online: http:\/\/cdn2.imgtec.com\/documentation\/MD00847-2B-VZMIPS64-AFP-01.06.pdf.","key":"ref_31"},{"doi-asserted-by":"crossref","unstructured":"Mhatre, S.C., and Chandran, P. (2018, January 9\u201313). On the Simulation of Processors Enhanced for Security in Virtualization. Proceedings of the Companion of the 2018 ACM\/SPEC International Conference on Performance Engineering, Berlin, Germany.","key":"ref_32","DOI":"10.1145\/3185768.3185774"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3461","DOI":"10.1109\/TC.2015.2401022","article-title":"Fast Two-level Address Translation for Virtualized Systems","volume":"64","author":"Ahn","year":"2015","journal-title":"IEEE Trans. Comput."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/12\/119\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:33:34Z","timestamp":1760196814000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/12\/119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,30]]},"references-count":33,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,12]]}},"alternative-id":["fi10120119"],"URL":"https:\/\/doi.org\/10.3390\/fi10120119","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2018,11,30]]}}}