2022
DOI: 10.1109/jiot.2021.3109917
|View full text |Cite
|
Sign up to set email alerts
|

Attacking the Edge-of-Things: A Physical Attack Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 49 publications
0
5
0
Order By: Relevance
“…The IPCS system serves as an intelligent platform with numerous connected and autonomous vehicles [11]. However, these devices and terminals in autonomous driving are vulnerable to malicious attacks exploiting security weaknesses in the wireless network [12][13][14]. Attackers can send harmful data to the control system, jeopardizing legitimate operations and vehicle communication.…”
Section: Prior Art and Motivationmentioning
confidence: 99%
“…The IPCS system serves as an intelligent platform with numerous connected and autonomous vehicles [11]. However, these devices and terminals in autonomous driving are vulnerable to malicious attacks exploiting security weaknesses in the wireless network [12][13][14]. Attackers can send harmful data to the control system, jeopardizing legitimate operations and vehicle communication.…”
Section: Prior Art and Motivationmentioning
confidence: 99%
“…It is reported that attacks on the RNGs are possible, both passively and actively, such as side-channel attacks (SCA) [ 74 ], fault injection attacks [ 75 , 76 , 77 ] and machine learning attacks [ 78 ]. With the rapidly advancing machine learning algorithms, new challenges are coming soon.…”
Section: Trngmentioning
confidence: 99%
“…A fault attack introduces deliberate faults into the computation of the cryptographic function and exploits the faulty results to extract information about the secret key. Environmental elements that can be used for injecting faults are varied, such as high temperature, ultralow temperature, strong electromagnetic, and strong light environment [ 75 ]. For example, most oscillator-based TRNGs are vulnerable to frequency injection attacks [ 76 , 77 ].…”
Section: Trngmentioning
confidence: 99%
“…Oscillators are important building blocks of analog and digital systems. A ring oscillator (ROSC) is commonly used for generating sinusoidal signals for various applications such as true random number generator [1], current to voltage converter for temperature sensor [2], aging sensor [3], analog and digital converters [4], [5], phase-locked loop [6], for calibrating baseline interconnect path [7]. A ROSC is preferred because it has a robust and compact design and a wide tuning range.…”
Section: Introductionmentioning
confidence: 99%
“…Free-running ROSCs are used in some applications [1], [3]. In most of the applications, tuning of frequency is required [2], [4]- [10].…”
Section: Introductionmentioning
confidence: 99%