Articles with "attestation" as a keyword



Photo from wikipedia

Design and Implementation of Hardware-Based Remote Attestation for a Secure Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-020-07364-5

Abstract: In general, Internet of Things (IoT) devices collect status information or operate according to control commands from other devices. If the safety and reliability of externally accessed devices are compromised, the risk of exposure of… read more here.

Keywords: design implementation; implementation hardware; smart home; internet things ... See more keywords

Bypassing software-based remote attestation using debug registers

Sign Up to like & get
recommendations!
Published in 2024 at "Connection Science"

DOI: 10.1080/09540091.2024.2306965

Abstract: Remote attestation (RA) is an essential feature in many security protocols to verify the memory integrity of remote embedded devices susceptible to malware infections. The attestation process needs to be consecutive and atomic to prevent… read more here.

Keywords: debug registers; attestation; self relocating; software based ... See more keywords

Dynamic Swarm Attestation With Malicious Devices Identification

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2869307

Abstract: Nowadays, there is a rapid development of smart sensor network solutions. To prevent potential malicious attacks and make sure that the activities of devices are correct, there is a pressing need to ensure the software… read more here.

Keywords: swarm attestation; attestation malicious; topology; attestation ... See more keywords

Formal Specification and Verification of Architecturally-Defined Attestation Mechanisms in Arm CCA and Intel TDX

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2023.3346501

Abstract: Attestation is one of the most critical mechanisms in confidential computing (CC). We present a holistic verification approach enabling comprehensive and rigorous security analysis of architecturally-defined attestation mechanisms in CC. Specifically, we analyze two prominent… read more here.

Keywords: attestation; attestation mechanisms; defined attestation; cca intel ... See more keywords

Automated Fog Node Audit and Certification Scheme With Multiple Attestation Certificate Authorities

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3529702

Abstract: Fog computing is a complementary paradigm to cloud computing. It aims to improve the performance of Internet of Things (IoT) applications by positioning fog computing nodes closer to IoT networks. Establishing trust between fog nodes… read more here.

Keywords: scheme; attestation; service; fog node ... See more keywords

Quantum Well-Based Physical Unclonable Functions for IoT Device Attestation

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3583881

Abstract: Internet of Things (IoT) peripheral devices typically operate in resource-constrained environments and platform enclosures. This poses challenges when attempting to secure data traffic between operators and field devices. Due to the resource-intensive nature and/or stringent… read more here.

Keywords: attestation; resource; quantum well; well based ... See more keywords
Photo by jordanharrison from unsplash

ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2018.2866623

Abstract: This paper addresses the problem of developing attestation techniques for Industrial Internet of Things systems. To ensure hardware security, the proposed attestation protocols are based on physically unclonable functions. Moreover, to achieve scalability, the proposed… read more here.

Keywords: auth hybrid; attestation; att auth; hybrid protocol ... See more keywords

SHeLA: Scalable Heterogeneous Layered Attestation

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2936988

Abstract: This article proposes a novel mechanism for swarm attestation, i.e., the remote attestation (RA) of a multitude of interconnected devices, also called a swarm of devices. Classical RA protocols work with one prover and one… read more here.

Keywords: heterogeneous layered; attestation; swarm; swarm devices ... See more keywords

Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3176530

Abstract: The advent of 4G and 5G mobile networks has made the Internet of Things (IoT) devices an essential part of smart nation drives. Firmware integrity is crucial to the security of IoT systems. Most of… read more here.

Keywords: machine learning; internet things; memory; attestation ... See more keywords

Runtime Self-Attestation of FPGA-Based IoT Devices

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2024.3429109

Abstract: Flexibility and reconfigurability make field-programmable gate arrays (FPGAs) ideal for IoT applications because they enable efficient customization and optimization of hardware acceleration tasks in diverse IoT applications. Malicious hardware trojans pose a significant security threat,… read more here.

Keywords: hardware; attestation; self attestation; attestation fpga ... See more keywords

HA-CAAP: Hardware-Assisted Continuous Authentication and Attestation Protocol for IoT Based on Blockchain

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2025.3530775

Abstract: The increasing integration of Internet of Things (IoT) devices in various sectors has created complex and dynamically changing interconnected systems. In several multiauthority and multidomain applications, IoT devices may continuously change their connectivity status, leading… read more here.

Keywords: attestation; authentication; continuous authentication; protocol ... See more keywords