2021
DOI: 10.1109/access.2021.3102280
|View full text |Cite
|
Sign up to set email alerts
|

Automated and Secure Onboarding for System of Systems

Abstract: The Internet of Things (IoT) is rapidly changing the number of connected devices and the way they interact with each other. This increases the need for an automated and secure onboarding procedure for IoT devices, systems and services. Device manufacturers are entering the market with internet connected devices, ranging from small sensors to production devices, which are subject of security threats specific to IoT. The onboarding procedure is required to introduce a new device in a System of Systems (SoS) with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 36 publications
(47 reference statements)
0
0
0
Order By: Relevance
“…The www system is a system that utilizes client–server technology architecture to store, retrieve, transform, and display universally accessible information (Kesavan et al, 2021; Maksuti et al, 2021). Business organizations have used this www system to support their business activities.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…The www system is a system that utilizes client–server technology architecture to store, retrieve, transform, and display universally accessible information (Kesavan et al, 2021; Maksuti et al, 2021). Business organizations have used this www system to support their business activities.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…It has been shown, e.g., [5,[46][47][48] that, using class-4 devices, as defined in [5], i.e., devices with few KBs of RAM, with 8-bit processors, that do support ECC asymmetric cryptographic primitives, in conjunction with class-1 or class-2 devices, to secure the system operations and, in particular, the software update process. It is thus crucial to have one or more "PC-like" devices in loop in order to be able to execute the high level computations and to work as local decision point for the installation policy.…”
Section: Challenges and Solutionsmentioning
confidence: 99%