Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2020
DOI: 10.1145/3395351.3399342
|View full text |Cite
|
Sign up to set email alerts
|

Secure and user-friendly over-the-air firmware distribution in a portable faraday cage

Abstract: Setting up a large-scale wireless sensor networks (WSNs) is challenging, as firmware must be distributed and trust between sensor nodes and a backend needs to be established. To perform this task efficiently, we propose an approach named Box, which utilizes an intelligent Faraday Cage (FC). The FC acquires firmware images and secret keys from a backend, patches the firmware with the keys and deploys those customized images over-the-air (OTA) to sensor nodes placed in the FC. Electromagnetic (EM) shielding prot… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…In practice, RFAF cannot be used in wireless sensor networks, even under ideal conditions, to determine neighbor hop distances. Besides, the identity-based attack detection results are derived by the K-means algorithm in the received signal strength [6,[13][14]. Here, the cluster centroids through signal space serve as the reference to the process of position.…”
Section: Introductionmentioning
confidence: 99%
“…In practice, RFAF cannot be used in wireless sensor networks, even under ideal conditions, to determine neighbor hop distances. Besides, the identity-based attack detection results are derived by the K-means algorithm in the received signal strength [6,[13][14]. Here, the cluster centroids through signal space serve as the reference to the process of position.…”
Section: Introductionmentioning
confidence: 99%