Attestation in wireless sensor networks: A survey
RV Steiner, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Attestation is a mechanism used by a trusted entity to validate the software integrity of an
untrusted platform. Over the past few years, several attestation techniques have been …
untrusted platform. Over the past few years, several attestation techniques have been …
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The
lack of dedicated hardware and the impossibility to physically access devices to be attested …
lack of dedicated hardware and the impossibility to physically access devices to be attested …
A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.
Given the limited resources and computational power of current embedded sensor devices,
memory protection is difficult to achieve and generally unavailable. Hence, the software run …
memory protection is difficult to achieve and generally unavailable. Hence, the software run …
自愈控制系统研究的综述, 分析与展望.
尹逊和, 王忻 - Control Theory & Applications/Kongzhi Lilun …, 2021 - search.ebscohost.com
近年来, 为了改变依靠紧急停车, 人工维护和故障排除的传统的维修方法, 在一些技术应用领域中
人们提出了自愈控制的思想. 本文通过梳理智能电网的自愈控制, 飞行控制系统的自愈控制和 …
人们提出了自愈控制的思想. 本文通过梳理智能电网的自愈控制, 飞行控制系统的自愈控制和 …
A fault section location technique for distribution systems based on wide-area fault information fuzzy clustering analysis
K Yu, X Zeng, M Huang - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
In order to realize smart distribution system self-healing control, fault section location is the
precondition. Neutral ineffectively earthed power system is adopted as the distribution …
precondition. Neutral ineffectively earthed power system is adopted as the distribution …
Hardware Based Detection, Recovery, and Tamper Evident Concept to Protect from Control Flow Violations in Embedded Processing
PR DaSilva, PJ Fortier - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
The ubiquitous presence of embedded devices coupled with their low processing power and
finite energy creates unique challenges in the security of embedded systems. Software …
finite energy creates unique challenges in the security of embedded systems. Software …
Fine-grained reasoning about the security and usability trade-off in modern security tools
MI Al-Saleh - 2011 - search.proquest.com
Defense techniques detect or prevent attacks based on their ability to model the attacks. A
balance between security and usability should always be established in any kind of defense …
balance between security and usability should always be established in any kind of defense …
[图书][B] Novel security mechanisms for wireless sensor networks
IE Bagci - 2016 - search.proquest.com
Abstract Wireless Sensor Networks (WSNs) are used for critical applications such as health
care, traffic management or plant automation. Thus, we depend on their availability, and …
care, traffic management or plant automation. Thus, we depend on their availability, and …
Code Attestation with Compressed Instruction Code
B Vetter, D Westhoff - arXiv preprint arXiv:1102.5322, 2011 - arxiv.org
Available purely software based code attestation protocols have recently been shown to be
cheatable. In this work we propose to upload compressed instruction code to make the code …
cheatable. In this work we propose to upload compressed instruction code to make the code …
[PDF][PDF] A Framework for Reconstruction and Operation of Auto-Healing strategy for the Switch Inference Attack for WSN
KL Narasimha, N Sainath - International Journal of Applied Engineering …, 2017 - jbrec.edu.in
These days remote sensor systems have discovered their way into a wide assortment of
utilizations and frameworks with tremendously fluctuating necessities and qualities, yet …
utilizations and frameworks with tremendously fluctuating necessities and qualities, yet …