Security and privacy on 6g network edge: A survey

B Mao, J Liu, Y Wu, N Kato - IEEE communications surveys & …, 2023 - ieeexplore.ieee.org
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …

SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …

iRECOVer: Patch your IoT on-the-fly

U Maroof, A Shaghaghi, R Michelin, S Jha - Future Generation Computer …, 2022 - Elsevier
In this paper, we propose a holistic solution for the security management of the Internet of
Things (IoT) devices. Following the “security-by-design” principle, we propose …

Spacelord: Private and secure smart space sharing

Y Bae, S Banerjee, S Lee, M Peinado - Proceedings of the 38th Annual …, 2022 - dl.acm.org
Space sharing services like vacation rentals are being equipped with smart devices.
However, sharing of such devices has privacy and security problems due to no or unclear …

Trusted monitor: Tee-based system monitoring

B Jung, C Eichler, J Röckl, R Schlenk… - 2022 XII Brazilian …, 2022 - ieeexplore.ieee.org
As trusted computing becomes increasingly important, Trusted Execution Environments
(TEEs) see more widespread use. A particular high demand for security arises in the context …

[PDF][PDF] Veto: Prohibit Outdated Edge System Software from Booting.

J Röckl, A Wagenhäuser, T Müller - ICISSP, 2023 - scitepress.org
Edge computing emerges as a trend, forming a link between the Internet of Things and cloud-
based services. Large-scale edge deployments are already in place today in the context of …

Resilient, Auditable and Secure IoT-Enabled Smart Inverter Firmware Amendments With Blockchain

R Akkaoui, A Stefanov, P Palensky… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The solar industry in residential areas has been witnessing an astonishing growth
worldwide. At the heart of this transformation, affecting the edge of the electricity grid, reside …

Advanced system resiliency based on virtualization techniques for IoT devices

J Röckl, M Protsenko, M Huber, T Müller… - Proceedings of the 37th …, 2021 - dl.acm.org
An increasing number of powerful devices are equipped with network connectivity and are
connected to the Internet of Things (IoT). Influenced by the steady growth of computing …

IoT-REX: a secure remote-control system for IoT devices from centralized multi-designated verifier signatures

Y Watanabe, N Yanai, J Shikata - International Conference on Information …, 2023 - Springer
IoT technology has been developing rapidly, while at the same time, notorious IoT malware
such as Mirai is a severe and inherent threat. We believe it is essential to consider systems …

TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB

T Takemura, R Yamamoto, K Suzaki - IEEE Access, 2024 - ieeexplore.ieee.org
AI&IoT edge devices run complex applications and are under the threat of stealthy attacks
that are not easily detected by traditional security systems. Provenance auditing is a …