Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints

L Zhou, KH Yeh, G Hancke, Z Liu… - IEEE Signal Processing …, 2018 - ieeexplore.ieee.org
Endpoint devices form a core part of the architecture of the Industrial Internet of Things (IIoT).
Aspects of endpoint device security also extend to related technology paradigms, such as …

When federated learning meets blockchain: A new distributed learning paradigm

C Ma, J Li, L Shi, M Ding, T Wang… - IEEE Computational …, 2022 - ieeexplore.ieee.org
Motivated by the increasingly powerful computing capabilities of end-user equipment, and
by the growing privacy concerns over sharing sensitive raw data, a distributed machine …

SDN security review: Threat taxonomy, implications, and open challenges

M Rahouti, K Xiong, Y Xin… - IEEE …, 2022 - ieeexplore.ieee.org
Software-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible,
and programmatically efficient configuration of networks to revolutionize network control and …

Time-efficient finite field microarchitecture design for curve448 and ed448 on cortex-M4

M Anastasova, R Azarderakhsh, MM Kermani… - … on Information Security …, 2022 - Springer
The elliptic curve family of schemes has the lowest computational latency, memory use,
energy consumption, and bandwidth requirements, making it the most preferred public key …

AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT

B Haase, B Labrique - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Increasingly connectivity becomes integrated in products and devices that previously
operated in a stand-alone setting. This observation holds for many consumer ap-plications …

Using hardware features for increased debugging transparency

F Zhang, K Leach, A Stavrou, H Wang… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
With the rapid proliferation of malware attacks on the Internet, understanding these
malicious behaviors plays a critical role in crafting effective defense. Advanced malware …

An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones

N Zhang, Q Jiang, L Li, X Ma, J Ma - Peer-to-Peer Networking and …, 2021 - Springer
Due to the mobility, flexibility and autonomy of drones, the Internet of Drones (IoD) have
gained momentum recently and are being widely used in a variety of fields, such as …

IoT-NUMS: evaluating NUMS elliptic curve cryptography for IoT platforms

Z Liu, H Seo - IEEE Transactions on Information Forensics and …, 2018 - ieeexplore.ieee.org
In 2015, NIST held a workshop calling for new candidates for the next generation of elliptic
curves to replace the almost two-decade old NIST curves. Nothing Upon My Sleeves …

Supersingular isogeny key encapsulation (SIKE) round 2 on ARM Cortex-M4

H Seo, M Anastasova, A Jalali… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We present the first practical software implementation of Supersingular Isogeny Key
Encapsulation (SIKE) round 2, targeting NIST's 1, 2, 3, and 5 security levels on 32-bit ARM …

Side-channel analysis and countermeasure design for implementation of Curve448 on cortex-M4

M Bisheh-Niasar, M Anastasova, A Abdulgadir… - Proceedings of the 11th …, 2022 - dl.acm.org
The highly secure Curve448 cryptographic algorithm has been recently recommended by
NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its …