Proceedings of the 23rd European Conference on Pattern Languages of Programs 2018
DOI: 10.1145/3282308.3282329
|View full text |Cite
|
Sign up to set email alerts
|

IoT Device Security the Hard(ware) way

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Among them, OPV, PSCs, and CdTe based cells have lower cost. 45,66 In addition, within the range of 5 years, the OPV devices show lower costs if using the R2R method.…”
Section: Application Potential Of Ipvsmentioning
confidence: 97%
See 1 more Smart Citation
“…Among them, OPV, PSCs, and CdTe based cells have lower cost. 45,66 In addition, within the range of 5 years, the OPV devices show lower costs if using the R2R method.…”
Section: Application Potential Of Ipvsmentioning
confidence: 97%
“…In recent years, the research trend of energy efficiency and low power hardware protocols is to solve this problem, improve energy efficiency to reduce latency, and improve data reliability. 65,66 Fig. 1f shows the comparison of the production of system units based on lowvolume amorphous Si, III-V, PSCs, CdTe, and Si compounds with the annual production volume.…”
Section: Application Potential Of Ipvsmentioning
confidence: 99%
“…In the same direction but more on the trustfulness, paper Pahl et al (2018) proposes an architecture pattern based on blockchain to ensure the identity of hardware devices and software applications, the origin and integrity of data and the contractual nature of orchestration. There is only one paper (Schuß et al 2018) that proposes a pattern at the hardware layer for IoT security. Schuß et al (2018) show a pattern to secure the device through hardware, by implementing exchangeable cryptographic co-processors.…”
Section: Answering Rq22 How Well Do the Patterns And Architectures Co...mentioning
confidence: 99%
“…There is only one paper (Schuß et al 2018) that proposes a pattern at the hardware layer for IoT security. Schuß et al (2018) show a pattern to secure the device through hardware, by implementing exchangeable cryptographic co-processors. This paper provides security features that can be implemented to a general IoT system, but it requires changes or additions to the hardware.…”
Section: Answering Rq22 How Well Do the Patterns And Architectures Co...mentioning
confidence: 99%
“…Security pattern RQ1. Data must be encrypted Symmetric encryption [Fernandez B, 2013 Hardware IoT [Schuß et al, 2018] Table 2: Security requirements of the hydroponic crop and the security patterns used to address them although it can be stated that the objective of the CPS is "the creation of a hydroponic crop from scratch in order to study the typical elements of CPS, along with its specific security needs". With regard to the orchestration layer, it is mainly in charge of defining the requirements that must be satisfied by the CPS.…”
Section: Security Requirementmentioning
confidence: 99%