2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015
DOI: 10.1109/apnoms.2015.7275390
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis based on Trusted Environment (TRE) of M2M/IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…This characteristic enabled significantly lower computational overheads and resource exhaustion. Thus, implementing the above discussed methods, we performed block-cipher encryption for the different set of inputs characterizing a small size authentication credential or a large plaintext data to be communicated over the IoT-centric LLNs channels or even to be stored on local memory [70]. The detailed discussion of the overall simulation results and allied inferences is given in the subsequent sections.…”
Section: A) Shannon Constrained Spn (Sspn)mentioning
confidence: 99%
See 1 more Smart Citation
“…This characteristic enabled significantly lower computational overheads and resource exhaustion. Thus, implementing the above discussed methods, we performed block-cipher encryption for the different set of inputs characterizing a small size authentication credential or a large plaintext data to be communicated over the IoT-centric LLNs channels or even to be stored on local memory [70]. The detailed discussion of the overall simulation results and allied inferences is given in the subsequent sections.…”
Section: A) Shannon Constrained Spn (Sspn)mentioning
confidence: 99%
“…In addition to the above discussed performance assessment, to assess attack-resilience of the proposed GFS-SSPN lightweight encryption system we performed qualitative assessment. In this method we examined the robustness and attack-resilience of the proposed lightweight encryption system in IoT-ecosystem [70]. In real-world IoT communication environment, an attacker can intercept the cipher stored (using SCLA), communicated (Linear and differential attack or impersonation) etc.…”
Section: B Qualitative Assessmentmentioning
confidence: 99%
“…The results are conducted after testing three test cases on smart thermostat and smart socket. [44] 2015 Machine-To-Machine…”
Section: Security Of Iotmentioning
confidence: 99%