Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions

S El Jaouhari, E Bouvet - Internet of Things, 2022 - Elsevier
Abstract The Internet of Things (IoT) market has shown strong growth in recent years, where
many manufacturers of IoT devices and IoT-related service providers are competing. Time to …

A survey on recent advanced research of CPS security

Z Wang, W Xie, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …

Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone

J Wang, A Li, H Li, C Lu, N Zhang - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …

Hardlog: Practical tamper-proof system auditing using a novel audit device

A Ahmad, S Lee, M Peinado - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Audit systems maintain detailed logs of security-related events on enterprise machines to
forensically analyze potential incidents. In principle, these logs should be safely stored in a …

Entropy sources based on silicon chips: True random number generator and physical unclonable function

Y Cao, W Liu, L Qin, B Liu, S Chen, J Ye, X Xia… - Entropy, 2022 - mdpi.com
Entropy is a measure of uncertainty or randomness. It is the foundation for almost all
cryptographic systems. True random number generators (TRNGs) and physical unclonable …

[HTML][HTML] Evaluating the applicability of hardware trust anchors for automotive applications

C Plappert, D Lorych, M Eckel, L Jäger, A Fuchs… - Computers & …, 2023 - Elsevier
The automotive trend towards autonomous driving and advanced connected services
increases both complexity of the vehicle internal network and the connections to its …

Over-the-air firmware updates for constrained NB-IoT devices

F Mahfoudhi, AK Sultania, J Famaey - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) is being deployed to provide smart solutions for buildings,
logistics, hospitals, and many more. It is growing with billions of connected devices …

A secure platform model based on ARM platform security architecture for IoT devices

J Jung, B Kim, J Cho, B Lee - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The proliferation of Internet of Things (IoT) devices comes with many challenges among
which security is one of the most serious issues. In order to address the security issue for low …

Commandfence: A novel digital-twin-based preventive framework for securing smart home systems

Y Xiao, Y Jia, Q Hu, X Cheng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Smart home systems are both technologically and economically advancing rapidly. As
people become gradually inalienable to smart home infrastructures, their security conditions …

The lazarus effect: Healing compromised devices in the internet of small things

M Huber, S Hristozov, S Ott, V Sarafov… - Proceedings of the 15th …, 2020 - dl.acm.org
We live in a time when billions of IoT devices are being deployed and increasingly relied
upon. This makes ensuring their availability and recoverability in case of a compromise a …