Trusted lightweight communication for IoT systems using hardware security

A Durand, P Gremaud, J Pasquier… - … on the Internet of Things, 2019 - dl.acm.org
… in IoT networks; due to the large number of competing IoThardware security to protect the
keys and data of IoT systems … of constrained devices connected to IoT middleware, which can …

Security & trusted devices in the context of internet of things (IoT)

N Sklavos, ID Zaharakis, A Kameas… - … Conference on Digital …, 2017 - ieeexplore.ieee.org
… for the presented IoT technologies. Emphasis is given to IoT embedded hardware platforms
like … Thus, the IoT networks enable the unprecedented environment and systems’ exploration …

Hardware security in IoT devices with emphasis on hardware trojans

S Sidhu, BJ Mohd, T Hayajneh - Journal of Sensor and Actuator Networks, 2019 - mdpi.com
… Device Identifier Composition Engine (DICE): DICE is a security standard created by Trusted
Computing Group (TCG) for hardware-based cryptographic device identity, attestation of …

Guest editorial securing IoT hardware: threat models and reliable, low-power design solutions

A Sengupta, S Kundu - IEEE Transactions on Very Large Scale …, 2017 - ieeexplore.ieee.org
IoT service stack relies on security of network, software, and … For a trusted hardware design,
protection and security of intellectual … for security problems related to hardware used in IoT. …

Hardware-security technologies for industrial IoT: TrustZone and security controller

C Lesjak, D Hein, J Winter - IECON 2015-41st Annual …, 2015 - ieeexplore.ieee.org
network connection. This attacker does not have physical access to the equipment hardware.
… Yet, in the green world it is possible to carry out trusted plausibility checks on the data to be …

[PDF][PDF] Survey of hardware-based security support for IoT/CPS systems

A Al-Omary, A Othman, HM AlSabbagh… - KnE …, 2018 - knepublishing.com
… Thus, TMP can be used for trusted and secure boot. TPM has … under the Trusted Computing
Group (TCG) and is ideal for IoT/… To secure the IoT networks, any hardware devices used …

Recommendations for securing Internet of Things devices using commodity hardware

SJ Johnston, M Scott, SJ Cox - … on Internet of Things (WF-IoT), 2016 - ieeexplore.ieee.org
… Metcalfe’s law [2] states that “the value of a telecommunications network is proportional to
… , an attacker can circumvent our first approach to trusted boot. Using a boot ROM that can …

Things, trouble, trust: on building trust in IoT systems

T Abera, N Asokan, L Davi, F Koushanfar… - Proceedings of the 53rd …, 2016 - dl.acm.org
… that can easily accommodate an additional trusted hardware component (eg, a TPM) …
network setting (ie, multiple hops between the prover and the verifier) while minimizing hardware

A novel trusted hardware-based scalable security framework for IoT edge devices

M Khan, M Hatami, W Zhao, Y Chen - Discover Internet of Things, 2024 - Springer
trusted hardware aiming at a security framework for IoT systems. The trusted hardware
Objective 3: The network-enabled hardware called the trusted device will be responsible for …

A blockchain based fast authentication framework for iot networks with trusted hardware

C Huang, K Yan - 2020 IEEE 22nd International Conference on …, 2020 - ieeexplore.ieee.org
… Aiming at solving the decentralized authentication and enhancing the privacy and reliability
for IoT networks, this section outlines the detail of the proposed authentication framework, as …