A review of monitoring technologies for solar PV systems using data processing modules and transmission protocols: Progress, challenges and prospects

S Ansari, A Ayob, MSH Lipu, MHM Saad, A Hussain - Sustainability, 2021 - mdpi.com
Solar photovoltaic (PV) is one of the prominent sustainable energy sources which shares a
greater percentage of the energy generated from renewable resources. As the need for solar …

A smart farming concept based on smart embedded electronics, internet of things and wireless sensor network

M Mahbub - Internet of Things, 2020 - Elsevier
With the exponential growth of the human race that means the growth of population, the
conventional or ancient farming methods are becoming unable to cope with the growth with …

High-level approaches to hardware security: A tutorial

H Pearce, R Karri, B Tan - ACM Transactions on Embedded Computing …, 2023 - dl.acm.org
Designers use third-party intellectual property (IP) cores and outsource various steps in the
integrated circuit (IC) design and manufacturing flow. As a result, security vulnerabilities …

Breaking all the things—A systematic survey of firmware extraction techniques for IoT devices

S Vasile, D Oswald, T Chothia - … Conference on Smart Card Research and …, 2018 - Springer
In this paper, we systematically review and categorize different hardware-based firmware
extraction techniques, using 24 examples of real, wide-spread products, eg smart voice …

Fill your boots: Enhanced embedded bootloader exploits via fault injection and binary analysis

J Van den Herrewegen, D Oswald… - IACR Transactions on …, 2021 - tches.iacr.org
The bootloader of an embedded microcontroller is responsible for guarding the device's
internal (flash) memory, enforcing read/write protection mechanisms. Fault injection …

A secure platform model based on ARM platform security architecture for IoT devices

J Jung, B Kim, J Cho, B Lee - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The proliferation of Internet of Things (IoT) devices comes with many challenges among
which security is one of the most serious issues. In order to address the security issue for low …

Security evaluation of arduino projects developed by hobbyist IoT programmers

F Corno, L Mannella - Sensors, 2023 - mdpi.com
Arduino is an open-source electronics platform based on cheap hardware and the easy-to-
use software Integrated Development Environment (IDE). Nowadays, because of its open …

Less is more: dimensionality reduction from a theoretical perspective

N Bruneau, S Guilley, A Heuser, D Marion… - … and Embedded Systems …, 2015 - Springer
Reducing the dimensionality of the measurements is an important problem in side-channel
analysis. It allows to capture multi-dimensional leakage as one single compressed sample …

Authentication of IoT device and IoT server using security key

W Alnahari, MT Quasim - 2021 International Congress of …, 2021 - ieeexplore.ieee.org
IoT is an emerging topic in the field of IT that has attracted the interest of researchers from
different parts of the world. Authentication of IoT includes the establishment of a model for …

Survey for performance & security problems of passive side-channel attacks countermeasures in ECC

R Abarzúa, C Valencia, J López - Cryptology ePrint Archive, 2019 - eprint.iacr.org
The main objective of the Internet of Things is to interconnect everything around us to obtain
information which was unavailable to us before, thus enabling us to make better decisions …