Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

Collective remote attestation at the Internet of Things scale: State-of-the-art and future challenges

M Ambrosin, M Conti, R Lazzeretti… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In recent years, the booming of Internet of Things (IoT) has populated the world with billions
of smart devices that implement novel services and applications. The potential for …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

SARA: Secure asynchronous remote attestation for IoT systems

E Dushku, MM Rabbani, M Conti… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Remote attestation has emerged as a valuable security mechanism which aims to verify
remotely whether or not a potentially untrusted device has been compromised. The …

State-of-the-art software-based remote attestation: Opportunities and open issues for Internet of Things

SFJJ Ankergård, E Dushku, N Dragoni - Sensors, 2021 - mdpi.com
The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-
connected devices which are revolutionizing many domains, such as healthcare …

S-MAPS: Scalable mutual authentication protocol for dynamic UAV swarms

G Bansal, B Sikdar - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) domain has seen rapid developments in recent years.
UAVs have been deployed for many applications and missions like data transmission …

Attestation-enabled secure and scalable routing protocol for IoT networks

M Conti, P Kaliyar, MM Rabbani, S Ranise - Ad Hoc Networks, 2020 - Elsevier
Cybercrime in the past decade has experienced an all-time high due to the inclusion of so-
called smart devices in our daily lives. These tiny devices with brittle security features are …

Remote attestation: A literature review

AS Banks, M Kisiel, P Korsholm - arXiv preprint arXiv:2105.02466, 2021 - arxiv.org
With the rising number of IoT devices, the security of such devices becomes increasingly
important. Remote attestation (RA) is a distinct security service that allows a remote verifer to …

RADIS: Remote attestation of distributed IoT services

M Conti, E Dushku, LV Mancini - 2019 Sixth International …, 2019 - ieeexplore.ieee.org
Remote attestation is a security technique through which a remote trusted party (ie, Verifier)
checks the trust-worthiness of a potentially untrusted device (ie, Prover). In the Internet of …

CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm

M Conti, P Kaliyar, C Lal - Concurrency and Computation …, 2019 - Wiley Online Library
The cyber‐security threats to low‐cost end‐user devices could severely undermine the
expected deployment of Internet of Thing (IoT) solutions in a range of real‐world …