2018 13th International Conference on Design &Amp; Technology of Integrated Systems in Nanoscale Era (DTIS) 2018
DOI: 10.1109/dtis.2018.8368561
|View full text |Cite
|
Sign up to set email alerts
|

SI ECCS: SECure context saving for IoT devices

Abstract: Energy consumption of IoT devices is a very important issue. For this reason, many techniques have been developed to allow IoT nodes to be aware of the amount of available energy. When energy is missing, the device halts and saves its state. One of those techniques is context saving, relying on the use of Non-Volatile Memories (NVM) to store and restore the state of the device. However, this information, as far as IoT devices deal with security, might be the target of attacks, including tampering and theft of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Ghodsi et al [22] use lightweight algorithms [12] for securing checkpoints. Valea et al [58] propose a SECure Context Saving (SECCS) hardware module inside the MCU, whereas Khrishnan et al [37] apply Authenticated Encryption with Associated Data (AEAD) to protect checkpointing data.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Ghodsi et al [22] use lightweight algorithms [12] for securing checkpoints. Valea et al [58] propose a SECure Context Saving (SECCS) hardware module inside the MCU, whereas Khrishnan et al [37] apply Authenticated Encryption with Associated Data (AEAD) to protect checkpointing data.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In [3], a security issue related to context saving was introduced. The need for security in many emerging IoT applications is in contrast to existing context saving techniques that expose the content of the internal registers of the CPU to an external NVM without implementing security criteria.…”
Section: Introductionmentioning
confidence: 99%