Trusted lightweight communication for IoT systems using hardware security
A Durand, P Gremaud, J Pasquier… - … on the Internet of Things, 2019 - dl.acm.org
… in IoT networks; due to the large number of competing IoT … hardware security to protect the
keys and data of IoT systems … of constrained devices connected to IoT middleware, which can …
keys and data of IoT systems … of constrained devices connected to IoT middleware, which can …
Security & trusted devices in the context of internet of things (IoT)
N Sklavos, ID Zaharakis, A Kameas… - … Conference on Digital …, 2017 - ieeexplore.ieee.org
… for the presented IoT technologies. Emphasis is given to IoT embedded hardware platforms
like … Thus, the IoT networks enable the unprecedented environment and systems’ exploration …
like … Thus, the IoT networks enable the unprecedented environment and systems’ exploration …
Hardware security in IoT devices with emphasis on hardware trojans
S Sidhu, BJ Mohd, T Hayajneh - Journal of Sensor and Actuator Networks, 2019 - mdpi.com
… Device Identifier Composition Engine (DICE): DICE is a security standard created by Trusted
Computing Group (TCG) for hardware-based cryptographic device identity, attestation of …
Computing Group (TCG) for hardware-based cryptographic device identity, attestation of …
Guest editorial securing IoT hardware: threat models and reliable, low-power design solutions
A Sengupta, S Kundu - IEEE Transactions on Very Large Scale …, 2017 - ieeexplore.ieee.org
… IoT service stack relies on security of network, software, and … For a trusted hardware design,
protection and security of intellectual … for security problems related to hardware used in IoT. …
protection and security of intellectual … for security problems related to hardware used in IoT. …
Hardware-security technologies for industrial IoT: TrustZone and security controller
C Lesjak, D Hein, J Winter - IECON 2015-41st Annual …, 2015 - ieeexplore.ieee.org
… network connection. This attacker does not have physical access to the equipment hardware.
… Yet, in the green world it is possible to carry out trusted plausibility checks on the data to be …
… Yet, in the green world it is possible to carry out trusted plausibility checks on the data to be …
[PDF][PDF] Survey of hardware-based security support for IoT/CPS systems
… Thus, TMP can be used for trusted and secure boot. TPM has … under the Trusted Computing
Group (TCG) and is ideal for IoT/… To secure the IoT networks, any hardware devices used …
Group (TCG) and is ideal for IoT/… To secure the IoT networks, any hardware devices used …
Recommendations for securing Internet of Things devices using commodity hardware
SJ Johnston, M Scott, SJ Cox - … on Internet of Things (WF-IoT), 2016 - ieeexplore.ieee.org
… Metcalfe’s law [2] states that “the value of a telecommunications network is proportional to
… , an attacker can circumvent our first approach to trusted boot. Using a boot ROM that can …
… , an attacker can circumvent our first approach to trusted boot. Using a boot ROM that can …
Things, trouble, trust: on building trust in IoT systems
… that can easily accommodate an additional trusted hardware component (eg, a TPM) …
network setting (ie, multiple hops between the prover and the verifier) while minimizing hardware …
network setting (ie, multiple hops between the prover and the verifier) while minimizing hardware …
A novel trusted hardware-based scalable security framework for IoT edge devices
… trusted hardware aiming at a security framework for IoT systems. The trusted hardware …
Objective 3: The network-enabled hardware called the trusted device will be responsible for …
Objective 3: The network-enabled hardware called the trusted device will be responsible for …
A blockchain based fast authentication framework for iot networks with trusted hardware
C Huang, K Yan - 2020 IEEE 22nd International Conference on …, 2020 - ieeexplore.ieee.org
… Aiming at solving the decentralized authentication and enhancing the privacy and reliability
for IoT networks, this section outlines the detail of the proposed authentication framework, as …
for IoT networks, this section outlines the detail of the proposed authentication framework, as …
相关搜索
- secure iot networks
- authentication scheme iot networks
- threat models iot hardware
- trust in iot systems
- hardware vulnerabilities iot iiot devices
- trusted boot iot nodes
- iot devices hardware trojans
- iot applications hardware architectures
- trust mechanisms iot edge devices
- authentication framework iot networks
- design solutions iot hardware
- industrial iot hardware security
- iot systems hardware security