A Review of IoT Firmware Vulnerabilities and Auditing Techniques

T Bakhshi, B Ghita, I Kuzminykh - Sensors, 2024 - mdpi.com
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …

Security and privacy risks in drone-based last mile delivery

YJ Tu, S Piramuthu - European Journal of Information Systems, 2024 - Taylor & Francis
The consideration of drones for last mile delivery brings with it several challenges that
include both physical ones such as battery life, drone range, carrying capacity, and form …

[HTML][HTML] An edge-computing based Industrial Gateway for Industry 4.0 using ARM TrustZone technology

S Gupta - Journal of Industrial Information Integration, 2023 - Elsevier
Secure and efficient communication to establish a seamless nexus between the five levels of
a typical automation pyramid is paramount to Industry 4.0. Specifically, vertical and …

On security of trustzone-m-based iot systems

L Luo, Y Zhang, C White, B Keating… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices have been increasingly integrated into our daily life.
However, such smart devices suffer a broad attack surface. Particularly, attacks targeting the …

P4G2Go: a privacy-preserving scheme for roaming energy consumers of the smart grid-to-go

A Farao, E Veroni, C Ntantogian, C Xenakis - Sensors, 2021 - mdpi.com
Due to its flexibility in terms of charging and billing, the smart grid is an enabler of many
innovative energy consumption scenarios. One such example is when a landlord rents their …

Analysis of privacy-enhancing technologies in open-source federated learning frameworks for driver activity recognition

E Novikova, D Fomichov, I Kholod, E Filippov - Sensors, 2022 - mdpi.com
Wearable devices and smartphones that are used to monitor the activity and the state of the
driver collect a lot of sensitive data such as audio, video, location and even health data. The …

An efficient trust management technique using ID3 algorithm with blockchain in smart buildings IoT

F Jeribi, R Amin, M Alhameed, A Tahir - Ieee Access, 2022 - ieeexplore.ieee.org
Because of the rising population density, relationships are necessary to raise living
standards through sending and receiving a wide range of services. Because of this, many …

Llakep: A low-latency authentication and key exchange protocol for energy internet of things in the metaverse era

X Zhang, X Huang, H Yin, J Huang, S Chai, B Xing… - Mathematics, 2022 - mdpi.com
The authenticated key exchange (AKE) protocol can ensure secure communication between
a client and a server in the electricity transaction of the Energy Internet of things (EIoT). Park …

SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …

P2ISE: preserving project integrity in CI/CD based on secure elements

A Muñoz, A Farao, JRC Correia, C Xenakis - Information, 2021 - mdpi.com
During the past decade, software development has evolved from a rigid, linear process to a
highly automated and flexible one, thanks to the emergence of continuous integration and …