2020
DOI: 10.1016/j.cose.2020.101922
|View full text |Cite
|
Sign up to set email alerts
|

A secured TPM integration scheme towards smart embedded system based collaboration network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
1
0
Order By: Relevance
“…TPM and TEE provide strong technical support for end system security protection, and a series of end system security protection mechanisms are derived based on TPM and TEE [14−17] . 4.1.2 End system protection scheme based on TPM and TEE Due to the pervasive attack surface of embedded devices, a large amount of TEE/TPM-based solutions have been proposed to protect the confidentiality and integrity of data, code, memory, and program flow on embedded devices [14][15][16][17][18][19] . To guarantee the security of data storage and management, Lu et al [15] and Akowuah and Ahlawat [14] built TEE-assisted encrypted embedded databases, respectively.…”
Section: Trusted Platform Module and Trusted Execution Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…TPM and TEE provide strong technical support for end system security protection, and a series of end system security protection mechanisms are derived based on TPM and TEE [14−17] . 4.1.2 End system protection scheme based on TPM and TEE Due to the pervasive attack surface of embedded devices, a large amount of TEE/TPM-based solutions have been proposed to protect the confidentiality and integrity of data, code, memory, and program flow on embedded devices [14][15][16][17][18][19] . To guarantee the security of data storage and management, Lu et al [15] and Akowuah and Ahlawat [14] built TEE-assisted encrypted embedded databases, respectively.…”
Section: Trusted Platform Module and Trusted Execution Environmentmentioning
confidence: 99%
“…Lu et al [17] proposed a TPM integration scheme for the collaboration of multiple smart embedded devices, with which measurement operations of TPM can detect any unauthorized modifications to the embedded system. To address the issue that some embedded devices lack hardware-based root-of-trust, Lu et al [16] proposed an integrity protection TPM extending scheme towards system and user data to establish a trusted environment for each device to realize data integrity protection.…”
Section: Trusted Platform Module and Trusted Execution Environmentmentioning
confidence: 99%
“…As a result, they present the design of trust-bft protocols that require each replica to host a trusted component [6,10,32,38,54,58]. The interest in these trusted component is so profound that they come in several flavors, such as Intel SGX [13], and Keystone [37], and have been used to design a variety of secure applications [19,40,42]. One recent work also employs these trust-bft protocols to achieve faster consensus in sharded systems [16].…”
Section: Related Workmentioning
confidence: 99%