The 17th Asia Pacific Conference on Communications 2011
DOI: 10.1109/apcc.2011.6152919
|View full text |Cite
|
Sign up to set email alerts
|

Root of trust for trusted node based-on ARM11 platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…However, to simulate the proposed TESLA protocol, we need to VOLUME 10, 2022 understand the initialization process and transmission of the initial security parameters and the initial symmetric key between the sender and the receiver before establishing the TESLA protocol process. Thus, the concept of the Root of Trust (RoT) is important as it provides the foundational security component of a connected device and is a set of implicitly trusted functions that the remainder of the system or device can use to ensure security [34]- [36]. As IoT is more concerned with wireless sensor network (WSN), we need to understand that WSN is a distributed infrastructure that establishes a trust routine between the members to ensure the security of the communication and integrity of the messages.…”
Section: Root Of Trustmentioning
confidence: 99%
“…However, to simulate the proposed TESLA protocol, we need to VOLUME 10, 2022 understand the initialization process and transmission of the initial security parameters and the initial symmetric key between the sender and the receiver before establishing the TESLA protocol process. Thus, the concept of the Root of Trust (RoT) is important as it provides the foundational security component of a connected device and is a set of implicitly trusted functions that the remainder of the system or device can use to ensure security [34]- [36]. As IoT is more concerned with wireless sensor network (WSN), we need to understand that WSN is a distributed infrastructure that establishes a trust routine between the members to ensure the security of the communication and integrity of the messages.…”
Section: Root Of Trustmentioning
confidence: 99%
“…flash or NAND) in the AP and then install malicious codes (e.g. backdoor in boot loader, kernel or application) [7]. Backdoor which are created by successful attack by an intruder enables an attacker to read or modify data for any clients that are connected to the infected AP.…”
Section: B Motivationsmentioning
confidence: 99%