Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Wireless Personal Communications"
DOI: 10.1007/s11277-020-07364-5
Abstract: In general, Internet of Things (IoT) devices collect status information or operate according to control commands from other devices. If the safety and reliability of externally accessed devices are compromised, the risk of exposure of…
read more here.
Keywords:
design implementation;
implementation hardware;
smart home;
internet things ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2869307
Abstract: Nowadays, there is a rapid development of smart sensor network solutions. To prevent potential malicious attacks and make sure that the activities of devices are correct, there is a pressing need to ensure the software…
read more here.
Keywords:
swarm attestation;
attestation malicious;
topology;
attestation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2018.2866623
Abstract: This paper addresses the problem of developing attestation techniques for Industrial Internet of Things systems. To ensure hardware security, the proposed attestation protocols are based on physically unclonable functions. Moreover, to achieve scalability, the proposed…
read more here.
Keywords:
auth hybrid;
attestation;
att auth;
hybrid protocol ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2019.2936988
Abstract: This article proposes a novel mechanism for swarm attestation, i.e., the remote attestation (RA) of a multitude of interconnected devices, also called a swarm of devices. Classical RA protocols work with one prover and one…
read more here.
Keywords:
heterogeneous layered;
attestation;
swarm;
swarm devices ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3176530
Abstract: The advent of 4G and 5G mobile networks has made the Internet of Things (IoT) devices an essential part of smart nation drives. Firmware integrity is crucial to the security of IoT systems. Most of…
read more here.
Keywords:
machine learning;
internet things;
memory;
attestation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2021.3077993
Abstract: Internet of Things (IoT) applications build upon resource-constrained, distributed devices that generate data and enable communication. For such applications to be truly trustworthy, it must be ensured that the devices are not compromised by malicious…
read more here.
Keywords:
software;
network;
based remote;
trusted hardware ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2020.2983282
Abstract: Remote attestation has emerged as a valuable security mechanism which aims to verify remotely whether or not a potentially untrusted device has been compromised. The protocols of Remote attestation are particularly important for securing Internet…
read more here.
Keywords:
iot systems;
asynchronous remote;
secure asynchronous;
attestation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2020.3038834
Abstract: With the rise of new technological paradigms such as the Internet of Things (IoT) and the Internet of Vehicles (IoV), we are going to see an unprecedented growth of connected vehicles on the roads. Also,…
read more here.
Keywords:
vehicles iov;
authentication;
authentication attestation;
attestation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "International Journal of Intelligent Engineering and Systems"
DOI: 10.22266/ijies2017.0228.16
Abstract: Predicting the behavioural patterns of an ambiguous environment is a complex task that could risk the integrity of security architecture if left unnoticed. One such ambiguous environment is the cloud computing paradigm where computations are…
read more here.
Keywords:
trusted computing;
security;
assure security;
attestation ... See more keywords