Embedded security for Internet of Things

A Ukil, J Sen, S Koilakonda - 2011 2nd National Conference on …, 2011 - ieeexplore.ieee.org
… to different security attacks. In this work, we provide the requirements of embedded security,
… technology for resisting temper proofing of the embedded devices by the concept of trusted …

Proposed embedded security framework for internet of things (iot)

S Babar, A Stango, N Prasad, J Sen… - 2011 2nd International …, 2011 - ieeexplore.ieee.org
… Finally, this paper proposes an embedded securitysecurity solutions and the need for
applied security. In this paper we set out to have a comprehensive view on the embedded security

The Embedded Framework for Securing the Internet of Things.

AB Ferozkhan, G Anandharaj - Journal of Engineering Research, 2021 - kuwaitjournals.org
… The embedded security provided to the application are shielded from the hw level, OS level,
… The embedded security refers to inbuilt security that provides device level security from the …

[HTML][HTML] A malicious pattern detection engine for embedded security systems in the Internet of Things

D Oh, D Kim, WW Ro - Sensors, 2014 - mdpi.com
… In this paper, we proposed a novel multiple pattern-matching algorithm for embedded security
systems. Since the general embedded systems have a small size for the main memory, we …

Hardware and embedded security in the context of internet of things

A Kanuparthi, R Karri, S Addepalli - … the 2013 ACM workshop on Security …, 2013 - dl.acm.org
… We focus on securing the resource-constrained embedded devices (the … We also describe
how embedded and hardware security … We describe how embedded and hardware security

Towards security on internet of things: applications and challenges in technology

KM Sadique, R Rahmani, P Johannesson - Procedia Computer Science, 2018 - Elsevier
… current trends in IoT security. Babar et al. suggested an embedded security framework and
… of the Internet of Things (IoT) paradigm and security requirements at each layer in Table 2. …

Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications

AP Johnson, S Patranabis, RS Chakraborty… - Microprocessors and …, 2017 - Elsevier
… of a growing number of Internet of Things (IoT)-based and embedded security applications.
However, the use of remote DPR brings with it a number of security threats that could lead to …

Emerging frontiers in embedded security

MM Kermani, M Zhang… - … on embedded …, 2013 - ieeexplore.ieee.org
… their implications on secure embedded system design. While embedded security is not a
new … platforms necessitate a fresh look at embedded security and new approaches to secure …

Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems

M Eceiza, JL Flores, M Iturbe - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
embedded IoT devices and fuzzing. For this end, we list the particularities of the embedded
world as far as security … , studying their applicability to embedded IoT devices and, finally, we …

Internet of things security: A top-down survey

DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
… Furthermore, we provide a top down review that offers a holistic view of the security in Internet
of Things. This review encompasses in three steps the different aspects of security in IoT …