Attestation in wireless sensor networks: A survey

RV Steiner, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Attestation is a mechanism used by a trusted entity to validate the software integrity of an
untrusted platform. Over the past few years, several attestation techniques have been …

On the difficulty of software-based attestation of embedded devices

C Castelluccia, A Francillon, D Perito… - Proceedings of the 16th …, 2009 - dl.acm.org
Device attestation is an essential feature in many security protocols and applications. The
lack of dedicated hardware and the impossibility to physically access devices to be attested …

A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.

H Tan, W Hu, S Jha - Security and Communication Networks, 2015 - Wiley Online Library
Given the limited resources and computational power of current embedded sensor devices,
memory protection is difficult to achieve and generally unavailable. Hence, the software run …

自愈控制系统研究的综述, 分析与展望.

尹逊和, 王忻 - Control Theory & Applications/Kongzhi Lilun …, 2021 - search.ebscohost.com
近年来, 为了改变依靠紧急停车, 人工维护和故障排除的传统的维修方法, 在一些技术应用领域中
人们提出了自愈控制的思想. 本文通过梳理智能电网的自愈控制, 飞行控制系统的自愈控制和 …

A fault section location technique for distribution systems based on wide-area fault information fuzzy clustering analysis

K Yu, X Zeng, M Huang - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
In order to realize smart distribution system self-healing control, fault section location is the
precondition. Neutral ineffectively earthed power system is adopted as the distribution …

Hardware Based Detection, Recovery, and Tamper Evident Concept to Protect from Control Flow Violations in Embedded Processing

PR DaSilva, PJ Fortier - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
The ubiquitous presence of embedded devices coupled with their low processing power and
finite energy creates unique challenges in the security of embedded systems. Software …

Fine-grained reasoning about the security and usability trade-off in modern security tools

MI Al-Saleh - 2011 - search.proquest.com
Defense techniques detect or prevent attacks based on their ability to model the attacks. A
balance between security and usability should always be established in any kind of defense …

[图书][B] Novel security mechanisms for wireless sensor networks

IE Bagci - 2016 - search.proquest.com
Abstract Wireless Sensor Networks (WSNs) are used for critical applications such as health
care, traffic management or plant automation. Thus, we depend on their availability, and …

Code Attestation with Compressed Instruction Code

B Vetter, D Westhoff - arXiv preprint arXiv:1102.5322, 2011 - arxiv.org
Available purely software based code attestation protocols have recently been shown to be
cheatable. In this work we propose to upload compressed instruction code to make the code …

[PDF][PDF] A Framework for Reconstruction and Operation of Auto-Healing strategy for the Switch Inference Attack for WSN

KL Narasimha, N Sainath - International Journal of Applied Engineering …, 2017 - jbrec.edu.in
These days remote sensor systems have discovered their way into a wide assortment of
utilizations and frameworks with tremendously fluctuating necessities and qualities, yet …