2020
DOI: 10.1016/j.sysarc.2020.101827
|View full text |Cite
|
Sign up to set email alerts
|

IoT Device security through dynamic hardware isolation with cloud-Based update

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…blood gas analyzer and insulin pump etc. [90]. However, few researches have been conducted in order to prevent hijacking of sensors [90].…”
Section: Device Hijackingmentioning
confidence: 99%
See 1 more Smart Citation
“…blood gas analyzer and insulin pump etc. [90]. However, few researches have been conducted in order to prevent hijacking of sensors [90].…”
Section: Device Hijackingmentioning
confidence: 99%
“…[90]. However, few researches have been conducted in order to prevent hijacking of sensors [90]. Though, there need to be developed a model in order to secure medical devices being hijacked.…”
Section: Device Hijackingmentioning
confidence: 99%
“…Kaur et al [ 35 ] also mentioned that “Hardware Security” is not well studied in the literature when compared to software-related cyber-security problems and solutions. Recently, there are emerging studies on hardware assisted security on IoT related devices such as: building a unified identity verification framework based on PUFs [ 36 ], FPGA hardware security for data centers [ 37 ], and re-configurable hardware-based isolation and protection mechanism (IPM) for IoT devices using cloud [ 38 ]. All these support our effort in introducing hardware security measures for FCGs.…”
Section: Hardware Assisted Security Of Fog Computing Devicesmentioning
confidence: 99%
“…These account for 54% of the 21.7 billion active connections worldwide [4]. More than 30 billion IoT devices are expected to be connected to the Internet by 2025 [5,6]. As demand for IoT devices has increased, different hardware and OSs, with diverse communication protocols, standards, and software applications have been created [7].…”
Section: Introductionmentioning
confidence: 99%