Proceedings of the 2013 ACM Workshop on Security, Privacy &Amp; Dependability for Cyber Vehicles 2013
DOI: 10.1145/2517968.2517976
|View full text |Cite
|
Sign up to set email alerts
|

Hardware and embedded security in the context of internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 101 publications
(48 citation statements)
references
References 10 publications
0
46
0
Order By: Relevance
“…The author in (Kanuparthi et al, 2013) proposed hardware and embedded security mechanisms to tackle with the issues of data access control, authorization and authentication, trust and privacy. Author proposed integrated sensing with PUF technology to ensure controlled data access and authentication.…”
Section: Privacymentioning
confidence: 99%
“…The author in (Kanuparthi et al, 2013) proposed hardware and embedded security mechanisms to tackle with the issues of data access control, authorization and authentication, trust and privacy. Author proposed integrated sensing with PUF technology to ensure controlled data access and authentication.…”
Section: Privacymentioning
confidence: 99%
“…Hardware trojans implanted in chips during various stage [137,138] of its supply chain can lead to information leakage [139], operational failure [137] leading to denial of service, and breach in the integrity of the data [140]. IoT, Smart Sensors, and CPS in general have various resource constraint which makes the task of securing the hardware challenging [141]. There have been various efforts to secure the hardware [142][143][144].…”
Section: Hardware Security and Manufacturing Supply Chainmentioning
confidence: 99%
“…Ensuring the trustworthiness [25] of data coming from IoT to applications that analyze that data and potentially actuate requires that trust be addressed at both the producer and the consumer side. This is usually ensured by protecting data with passwords.…”
Section: B Data Integrity and Provenancementioning
confidence: 99%