VHDL Programming for Secure Bootloaders in IoT Security

Year : 2025 | Volume : 03 | Issue : 01 | Page : 19 28
    By

    K Kazi,

  • Sayyad Liyakat,

  1. Professor and Head, Department of Electronics and Telecommunication Engineering, Brahmdevdada Mane Institute of Technology, Solapur (MS), India
  2. Student, Electronics and Telecommunication Engineering, Brahmdevdada Mane Institute of Technology, Solapur (MS), India

Abstract

The proliferation of Internet of Things (IoT) devices has brought unparalleled connectivity and convenience. However, this increased connectivity comes with a heightened risk of security vulnerabilities. One of the most critical areas for securing IoT devices is the bootloader, the software responsible for initializing the device and loading the operating system. A compromised bootloader can lead to a complete takeover of the device, making it a prime target for malicious actors. This article explores the role of VHDL (VHSIC Hardware Description Language) programming in creating robust and secure bootloaders for IoT devices, drawing from the key findings and conclusions of research in this domain. Traditional software-based bootloaders, often written in C or assembly language, are susceptible to a range of attacks including buffer overflows, code injections, and reverse engineering. These vulnerabilities can be exploited to install malicious firmware, bypass security mechanisms, and ultimately compromise the entire device. To mitigate these threats, a different strategy utilizes the built-in security benefits of hardware. Implementing secure bootloaders in hardware, using a Hardware Description Language like VHDL offers a crucial “root of trust.” This means that the boot process is anchored in hardware, making it significantly more difficult for attackers to tamper with the initial stages of device startup. This research focuses on leveraging VHDL programming to develop secure bootloaders for IoT devices. Given the vulnerability of software-based bootloaders, this approach aims to establish a hardware root of trust, enhancing security by implementing key functionalities like secure key storage, hardware-enforced authentication, and tamper resistance directly in hardware. The study explores the design principles, challenges, and potential benefits of VHDL-based secure bootloaders, ultimately contributing to a more robust and secure IoT ecosystem.

Keywords: VHDL, IoT, Security, Bootloaders, Malicious

[This article belongs to International Journal of VLSI Circuit Design & Technology ]

How to cite this article:
K Kazi, Sayyad Liyakat. VHDL Programming for Secure Bootloaders in IoT Security. International Journal of VLSI Circuit Design & Technology. 2025; 03(01):19-28.
How to cite this URL:
K Kazi, Sayyad Liyakat. VHDL Programming for Secure Bootloaders in IoT Security. International Journal of VLSI Circuit Design & Technology. 2025; 03(01):19-28. Available from: https://journals.stmjournals.com/ijvcdt/article=2025/view=206693


References

  1. Jadhav M, Nerkar PM. FPGA-Based finger vein recognition system for personal verification. Int. J. Eng. Res. Gen. Sci. 2015;3:382–8.
  2. Kulkarni S, Nerkar PM. Retina Image Decomposition Using Variational Mode Decomposition. Retina. 2018 Jun;5(06).
  3. Khadake S, Kawade S, Moholkar S, Pawar M. A review of 6G technologies and its advantages over 5G technology. InTechno-Societal 2016, International Conference on Advanced Technologies for Societal Applications 2022 Dec 9 (pp. 1043–1051). Cham: Springer International Publishing.
  4. Patil VJ, Khadake SB, Tamboli DA, Mallad HM, Takpere SM, Sawant VA. Review of AI in power electronics and drive systems. In2024 3rd International conference on Power Electronics and IoT Applications in Renewable Energy and its Control (PARC) 2024 Feb 23 (pp. 94–99). IEEE.
  5. Dudgikar AB, Ingalgi AA, Jamadar AG, Swami OR, Khadake SB, Moholkar SV. Intelligent battery swapping system for electric vehicles with charging stations locator on IoT and cloud platform. International Journal of Advanced Research in Science, Communication and Technology. 2023 Jan;3(1):204–8.
  6. Wamborikar YS, Sinha A. Solar powered vehicle. Inproceedings of the World Congress on Engineering and Computer Science 2010 Oct 20 (Vol. 2, pp. 20–22).
  7. Zohuri B, Mossavar-Rahmani F. The symbiotic relationship unraveling the interplay between technology and artificial intelligence (an intelligent dynamic relationship). Journal of Energy and Power Engineering. 2023 Apr;17(2).
  8. Khattak MA. PLC based intelligent traffic control system. International Journal of Electrical & Computer Sciences IJECS-IJENS. 2011 Dec;11(06).
  9. Samy CK, Ahmadi HB, Atfah YA, Dol SS, Alavi M. Design of portable vortex bladeless wind turbine: The preliminary study. Journal of Advanced Research in Applied Mechanics. 2023 Feb;102(1):32–43.
  10. Abass N, Vaidya R, Satav R, Jeyavel J. Automatic sanitizer dispenser with temperature screening. International Journal of Advance Research, Ideas and Innovations in Technology. 2021;7(3):283–5.
  11. Dhawale A, Kamble A, Ghule S, Gawande M. Solar Powered Indoor Air Purifier With Air Quality Monitor. In2023 9th International Conference on Electrical Energy Systems (ICEES) 2023 Mar 23 (pp. 206–209). IEEE.
  12. Shabnam S, Latha HN. Design and implementation of saliency detection model in h. 264 standard. International Journal of Science and Research (IJSR). 2014:2014–20.
  13. Mane A, Kharade M, Sonkambale P, Tapase S, Kudte SS. Design & analysis of vortex bladeless turbine with gyro e-generator. Int. J. Innov. Res. Sci. Eng. 2017 Apr;3(4):445–52.
  14. Muniappan A, Thiagarajan C, Kumar GA, Joseph Raj X, Irene J, Niranjan N. Conversion of Conventional Vehicle Into Solar Powered Electric Vehicle—A Realistic Approach. Int. J. Innovative Res. Sci., Eng. Technol.. 2014;3(9):16232–7.
  15. Pawar P, Gite N, Sonawane M. Automatic Load Sharing of Transformer By using PLC. International Research Journal of Engineering and Technology. 2020;7(7):339–42.
  16. Nikhil KN. A review on battery management system for electric vehicles. International Journal for Research in Applied Science & Engineering Technology (IJRASET). 2022 Jul;10(7).
  17. Chounde A, Gopnarayan BB, Patil KB, Kamble SS. Human Health Care System: A New Approach towards Life. Grenze International Journal of Engineering & Technology (GIJET). 2024 Jun 15;10.
  18. Patil VJ, Mallad HM, Gopnarayan BB, Pati KB. Maximize Farming Productivity through Agriculture 4.0 based Intelligence, with use of Agri Tech Sense Advanced Crop Monitoring System. Grenze International Journal of Engineering & Technology (GIJET). 2024 Jun 15;10.
  19. Muniappan A, Thiagarajan C, Kumar GA, Joseph Raj X, Irene J, Niranjan N. Conversion of Conventional Vehicle Into Solar Powered Electric Vehicle—A Realistic Approach. Int. J. Innovative Res. Sci., Eng. Technol.. 2014;3(9):16232–7.
  20. Atabani AE. Biodiesel: a promising alternative energy resource. Alternative Fuels Research Progress (93 pp). International Energy and Environmental Foundation Publishers. 2013.
  21. Kazi KS. AI-Driven-IoT (AIIoT)-Based Decision Making in Kidney Diseases Patient Healthcare Monitoring: KSK Approach for Kidney Monitoring. InAI-Driven Innovation in Healthcare Data Analytics 2025 (pp. 277–306). IGI Global Scientific Publishing.
  22. Liyakat KK. Smart agriculture based on AI-driven-IoT (AIIoT): A KSK approach. labour. 2024 Jul 29;18:19.
  23. Kazi KS. KK Approach to Increase Resilience in Internet of Things: A T-Cell Security Concept. InAnalyzing Privacy and Security Difficulties in Social Media: New Challenges and Solutions 2025 (pp. 87–120). IGI Global Scientific Publishing.
  24. Alaparthy V. A Study on the Adaptability of Immune System Principles to Wireless Sensor Network and IoT Security. University of South Florida; 2018.
  25. Thakur A, Kumar A. Diagnosing of Disease Using Machine Learning in Internet of Healthcare Things. InPractical Artificial Intelligence for Internet of Medical Things 2023 Feb 28 (pp. 241–262). CRC Press.
  26. Vo QM, Cao NT, Ton-That AH. Unsafe image classification using convolutional neural network for brand safety. In2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) 2020 Dec 16 (pp. 1–4). IEEE.

Regular Issue Subscription Original Research
Volume 03
Issue 01
Received 28/03/2025
Accepted 29/03/2025
Published 09/04/2025
Publication Time 12 Days



My IP

PlumX Metrics