Articles with "attestation" as a keyword



Photo from wikipedia

Design and Implementation of Hardware-Based Remote Attestation for a Secure Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-020-07364-5

Abstract: In general, Internet of Things (IoT) devices collect status information or operate according to control commands from other devices. If the safety and reliability of externally accessed devices are compromised, the risk of exposure of… read more here.

Keywords: design implementation; implementation hardware; smart home; internet things ... See more keywords
Photo by williamtm from unsplash

Dynamic Swarm Attestation With Malicious Devices Identification

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2869307

Abstract: Nowadays, there is a rapid development of smart sensor network solutions. To prevent potential malicious attacks and make sure that the activities of devices are correct, there is a pressing need to ensure the software… read more here.

Keywords: swarm attestation; attestation malicious; topology; attestation ... See more keywords
Photo by jordanharrison from unsplash

ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2018.2866623

Abstract: This paper addresses the problem of developing attestation techniques for Industrial Internet of Things systems. To ensure hardware security, the proposed attestation protocols are based on physically unclonable functions. Moreover, to achieve scalability, the proposed… read more here.

Keywords: auth hybrid; attestation; att auth; hybrid protocol ... See more keywords
Photo by williamtm from unsplash

SHeLA: Scalable Heterogeneous Layered Attestation

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2936988

Abstract: This article proposes a novel mechanism for swarm attestation, i.e., the remote attestation (RA) of a multitude of interconnected devices, also called a swarm of devices. Classical RA protocols work with one prover and one… read more here.

Keywords: heterogeneous layered; attestation; swarm; swarm devices ... See more keywords
Photo by cokdewisnu from unsplash

Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3176530

Abstract: The advent of 4G and 5G mobile networks has made the Internet of Things (IoT) devices an essential part of smart nation drives. Firmware integrity is crucial to the security of IoT systems. Most of… read more here.

Keywords: machine learning; internet things; memory; attestation ... See more keywords
Photo by thisisengineering from unsplash

Software-Based Remote Network Attestation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3077993

Abstract: Internet of Things (IoT) applications build upon resource-constrained, distributed devices that generate data and enable communication. For such applications to be truly trustworthy, it must be ensured that the devices are not compromised by malicious… read more here.

Keywords: software; network; based remote; trusted hardware ... See more keywords
Photo by kiranck123 from unsplash

SARA: Secure Asynchronous Remote Attestation for IoT Systems

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2020.2983282

Abstract: Remote attestation has emerged as a valuable security mechanism which aims to verify remotely whether or not a potentially untrusted device has been compromised. The protocols of Remote attestation are particularly important for securing Internet… read more here.

Keywords: iot systems; asynchronous remote; secure asynchronous; attestation ... See more keywords
Photo by williamk from unsplash

A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2020.3038834

Abstract: With the rise of new technological paradigms such as the Internet of Things (IoT) and the Internet of Vehicles (IoV), we are going to see an unprecedented growth of connected vehicles on the roads. Also,… read more here.

Keywords: vehicles iov; authentication; authentication attestation; attestation ... See more keywords
Photo by scottwebb from unsplash

Trusted Computing Model with Attestation to Assure Security for Software Services in a Cloud Environment

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Intelligent Engineering and Systems"

DOI: 10.22266/ijies2017.0228.16

Abstract: Predicting the behavioural patterns of an ambiguous environment is a complex task that could risk the integrity of security architecture if left unnoticed. One such ambiguous environment is the cloud computing paradigm where computations are… read more here.

Keywords: trusted computing; security; assure security; attestation ... See more keywords