Hardware Security of Fog End-Devices for the Internet of Things
暂无分享,去创建一个
[1] David Myers. Detecting cyber attacks on industrial control systems using process mining , 2019 .
[2] Garrett S. Rose,et al. Physically Unclonable and Reconfigurable Computing System (PURCS) for Hardware Security Applications , 2021, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[3] Ulrich Rührmair,et al. PUFs in Security Protocols: Attack Models and Security Evaluations , 2013, 2013 IEEE Symposium on Security and Privacy.
[4] François-Xavier Standaert,et al. Introduction to Side-Channel Attacks , 2010, Secure Integrated Circuits and Systems.
[5] Yoav Weizman,et al. An SRAM PUF with 2 Independent Bits/Cell in 65nm , 2019, 2019 IEEE International Symposium on Circuits and Systems (ISCAS).
[6] Nuno Pereira,et al. Security Risk Analysis of LoRaWAN and Future Directions , 2018, Future Internet.
[7] Yoonmyung Lee,et al. A 445F2 leakage-based physically unclonable Function with Lossless Stabilization Through Remapping for IoT Security , 2018, 2018 IEEE International Solid - State Circuits Conference - (ISSCC).
[8] Tim Güneysu,et al. Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[9] Hayri Sever,et al. Creating consensus group using online learning based reputation in blockchain networks , 2019, Pervasive Mob. Comput..
[10] Wil Michiels,et al. Mechanism for software tamper resistance: an application of white-box cryptography , 2007, DRM '07.
[11] Sang Joon Kim,et al. A Smart Hardware Security Engine Combining Entropy Sources of ECG, HRV and SRAM PUF for Authentication and Secret Key Generation , 2019, 2019 IEEE Asian Solid-State Circuits Conference (A-SSCC).
[12] Tansu Alpcan,et al. Fog Computing May Help to Save Energy in Cloud Computing , 2016, IEEE Journal on Selected Areas in Communications.
[13] Prem Prakash Jayaraman,et al. Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions , 2018, IEEE Access.
[14] Ravi Sankar,et al. Prevention and detection of intrusions in wireless sensor networks , 2013 .
[15] Ismail Butun,et al. Detecting Intrusions in Cyber-Physical Systems of Smart Cities : Challenges and Directions , 2019 .
[16] Ping Zhang,et al. Energy Efficient Secure Computation Offloading in NOMA-Based mMTC Networks for IoT , 2019, IEEE Internet of Things Journal.
[17] Ismail Butun,et al. Security Implications of Fog Computing on the Internet of Things , 2018, 2019 IEEE International Conference on Consumer Electronics (ICCE).
[18] Paul J. Fortier,et al. Hardware Based Detection, Recovery, and Tamper Evident Concept to Protect from Control Flow Violations in Embedded Processing , 2019, 2019 IEEE International Symposium on Technologies for Homeland Security (HST).
[19] Lawrie Brown,et al. Computer Security: Principles and Practice , 2007 .
[20] Tom H. Luan,et al. Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.
[21] Paul C. van Oorschot,et al. A generic attack on checksumming-based software tamper resistance , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[22] Mustafa Kocakulak,et al. An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[23] Dimitrios Tzovaras,et al. From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes , 2019, 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[24] Arenberg Doctoral,et al. Physically Unclonable Functions: Constructions, Properties and Applications , 2012 .
[25] Akhilesh Tyagi,et al. Software Tamper Resistance Through Dynamic Program Monitoring , 2005, DRMTICS.
[26] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[27] Deepak Puthal,et al. PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE) , 2019, IEEE Consumer Electronics Magazine.
[28] Mohammad Tehranipoor,et al. Physical Attacks and Tamper Resistance , 2012 .
[29] Houbing Song,et al. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.
[30] Mark Zwolinski,et al. Overview of PUF-based hardware security solutions for the internet of things , 2016, 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS).
[31] Georg Sigl,et al. Side-Channel Analysis of PUFs and Fuzzy Extractors , 2011, TRUST.
[32] Georg Sigl,et al. Physical Unclonable Functions , 2012, Datenschutz und Datensicherheit - DuD.
[33] Victor I. Chang,et al. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..
[34] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[35] David M. Eyers,et al. Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.
[36] Mikael Gidlund,et al. A Central Intrusion Detection System for RPL-Based Industrial Internet of Things , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).
[37] Ismail Butun,et al. Industrial Networks and IIoT: Now and Future Trends , 2020, Industrial IoT.
[38] Dimitrios Tzovaras,et al. Acceleration at the Edge for Supporting SMEs Security: The FORTIKA Paradigm , 2019, IEEE Communications Magazine.
[39] Silvia Liberata Ullo,et al. Advances in Smart Environment Monitoring Systems Using IoT and Sensors , 2020, Sensors.
[40] Burak Kantarci,et al. Anomaly detection and privacy preservation in cloud-centric Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[41] Chih-Min Wang,et al. A PUF scheme using competing oxide rupture with bit error rate approaching zero , 2018, 2018 IEEE International Solid - State Circuits Conference - (ISSCC).
[42] Dirk Koch,et al. Invited Tutorial: FPGA Hardware Security for Datacenters and Beyond , 2020, FPGA.
[43] Jack W. Davidson,et al. Software Tamper Resistance: Obstructing Static Analysis of Programs , 2000 .
[44] Arslan Munir,et al. IFCIoT: Integrated Fog Cloud IoT: A novel architectural paradigm for the future Internet of Things. , 2017, IEEE Consumer Electronics Magazine.
[45] Ren-Hung Hwang,et al. A QoS-aware streaming service over fog computing infrastructures , 2016, 2016 Digital Media Industry & Academic Forum (DMIAF).
[46] Yier Jin,et al. Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.
[47] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[48] Armin Babaei,et al. Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges , 2019, Sensors.
[49] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[50] Marina Papatriantafilou,et al. Intrusion Detection in Industrial Networks via Data Streaming , 2020, Industrial IoT.
[51] Stefan Katzenbeisser,et al. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon , 2012, CHES.
[52] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[53] Travis Boraten,et al. Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs , 2018, J. Parallel Distributed Comput..
[54] Edward A. Lee,et al. The Cloud is Not Enough: Saving IoT from the Cloud , 2015, HotStorage.
[55] Francisco V. Fernández,et al. Improving the reliability of SRAM-based PUFs in the presence of aging , 2020, 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS).
[56] Sherali Zeadally,et al. Fog Computing Architecture, Evaluation, and Future Research Directions , 2018, IEEE Communications Magazine.
[57] Alex Lu,et al. Anomaly detection on the edge , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[58] Giovanni Di Crescenzo,et al. Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory , 2019, SECITC.
[59] Henrik Klessig,et al. Requirements and current solutions of wireless communication in industrial automation , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[60] Paul C. van Oorschot,et al. Hardware-assisted circumvention of self-hashing software tamper resistance , 2005, IEEE Transactions on Dependable and Secure Computing.
[61] Alka Agrawal,et al. Security Issues in Fog Environment: A Systematic Literature Review , 2020, International Journal of Wireless Information Networks.
[62] Massimo Alioto,et al. Trends in Hardware Security: From basics to ASICs , 2019, IEEE Solid-State Circuits Magazine.
[63] Kire Trivodaliev,et al. A review of Internet of Things for smart home: Challenges and solutions , 2017 .
[64] Wissam Aoudi. Departure-Based Intrusion Detection , 2019 .
[65] Quan Wang,et al. A PUF-based unified identity verification framework for secure IoT hardware via device authentication , 2019, World Wide Web.
[66] Christophe Bobda,et al. IoT Device security through dynamic hardware isolation with cloud-Based update , 2020, J. Syst. Archit..
[67] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[68] Daniele Ielmini,et al. Applications of Resistive Switching Memory as Hardware Security Primitive , 2019, Applications of Emerging Memory Technology.
[69] Mikael Gidlund,et al. Challenges of Securing the Industrial Internet of Things Value Chain , 2018, 2018 Workshop on Metrology for Industry 4.0 and IoT.
[70] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .