KIND: A novel image-mutual-information-based decision fusion method for saturation attack detection in SD-IoT
M Xiao, Y Cui, Q Qian, G Shen - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Software-defined networking for IoT (SD-IoT), as an emerging architecture, is suffering from
numerous security issues. Saturation attacks against the SDN switches and controllers are …
numerous security issues. Saturation attacks against the SDN switches and controllers are …
Software-defined Interaction-based Heterogeneous Bus Data Processing for Low-cost Embedded Devices
J Shi, Y Zhao, J Wang, G Dai, Y Wu - IEEE Access, 2023 - ieeexplore.ieee.org
The rapid growth of the Internet of Things (IoT) market has made serial buses a universal
transmission method for connecting various devices and carrying large amounts of …
transmission method for connecting various devices and carrying large amounts of …
[HTML][HTML] AC-SIF: ACE Access Control for Standardized Secure IoT Firmware Updates
J Höglund, A Khurshid, S Raza - SECURWARE 2022, The Sixteenth …, 2022 - diva-portal.org
Globally identifiable, internet-connected embedded systems can be found throughout critical
infrastructures in modern societies. Many of these devices operate unattended for several …
infrastructures in modern societies. Many of these devices operate unattended for several …
SFIOT: Software-Defined Function for the IoT
Wireless reprogramming is a significant yet challenging issue in the Internet of Things (IoT).
Existing methods designed for wireless sensor networks (WSN) are inadequate for IoT …
Existing methods designed for wireless sensor networks (WSN) are inadequate for IoT …
Public Key Infrastructure and its applications for resource-constrained IoT
J Höglund - 2023 - diva-portal.org
The Internet of Things (IoT) is rapidly expanding and IoT devices are being deployed in
security-critical scenarios, such as in critical infrastructure monitoring and within e-health …
security-critical scenarios, such as in critical infrastructure monitoring and within e-health …
Towards Trustworthy and Secure Internet of Things Devices: Using hardware-assisted Trusted Execution and Automated Certification
A Khurshid - 2022 - diva-portal.org
TEEs provide hardware-supported mechanisms to create secure areas to store sensitive
data and execute critical software. However, the secure areas lack a secure way to …
data and execute critical software. However, the secure areas lack a secure way to …
[PDF][PDF] An SDF-based Photovoltaic Energy System
Wireless reprogramming is a critical issue in the Internet of Things (IoT). Current approaches
designed for wireless sensor networks (WSN) are inadequate for IoT scenarios due to …
designed for wireless sensor networks (WSN) are inadequate for IoT scenarios due to …