[图书][B] Embedded system design: embedded systems foundations of cyber-physical systems, and the internet of things
P Marwedel - 2021 - library.oapen.org
… This chapter presents terms used in the context of embedded systems together with their
history as well as opportunities, challenges, and common characteristics of embedded and …
history as well as opportunities, challenges, and common characteristics of embedded and …
Security & trusted devices in the context of internet of things (IoT)
N Sklavos, ID Zaharakis, A Kameas… - … Conference on Digital …, 2017 - ieeexplore.ieee.org
… the technologies of the Internet of Things (IoT), regarding to security and trusted devices. It
provides to the readers a comprehensive understanding of both security and privacy aspects. …
provides to the readers a comprehensive understanding of both security and privacy aspects. …
Security considerations for Internet of Things: A survey
… [5] surveyed IoT frameworks on the emphasis of security and privacy. This paper clarifies
the proposed architecture, and hardware sepcand points out the security features for 8 IoT …
the proposed architecture, and hardware sepcand points out the security features for 8 IoT …
Security in internet of things: A survey
… Kothmayr et al. in [32] described a similar IoT security solution to [31]. They proposed the
use of a dedicated hardware to enable security in constrained devices. The main idea is to use …
use of a dedicated hardware to enable security in constrained devices. The main idea is to use …
Ultra-low-power design and hardware security using emerging technologies for Internet of Things
In this review article for Internet of Things (IoT) applications, important low-power design
techniques for digital and mixed-signal analog–digital converter (ADC) circuits are presented. …
techniques for digital and mixed-signal analog–digital converter (ADC) circuits are presented. …
Towards security on internet of things: applications and challenges in technology
… secure IoT communications and current trends in IoT security. Babar et al. suggested an
embedded security … with physical protection of secret keys and secure operating system [9]. As …
embedded security … with physical protection of secret keys and secure operating system [9]. As …
A comprehensive study of security of internet-of-things
… Moreover, we define the security requirements in the context of IoT. Then, in Section IV, we
describe possible attacks against IoT. We summarize countermeasures against these attacks …
describe possible attacks against IoT. We summarize countermeasures against these attacks …
Security challenges of the Internet of Things
MG Samaila, M Neto, DAB Fernandes… - … the internet of things …, 2017 - Springer
… discuss the security challenges of … of security and security requirements in the context of
IoT. We then consider fundamental security issues in the IoT and thereafter highlight the security …
IoT. We then consider fundamental security issues in the IoT and thereafter highlight the security …
Internet of things security: A top-down survey
DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
… Furthermore, we provide a top down review that offers a holistic view of the security in Internet
of Things. This review encompasses in three steps the different aspects of security in IoT …
of Things. This review encompasses in three steps the different aspects of security in IoT …
Internet of things (IoT) design considerations for developers and manufacturers
… Security assurance in IoT ecosystem is one of the major challenges to address. In this context,
embedded security becomes a key issue in IoT devices which are constrained in terms of …
embedded security becomes a key issue in IoT devices which are constrained in terms of …