2021
DOI: 10.1109/access.2021.3085524
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications

Abstract: Trusted Execution Environments have been applied to improve data security in many distinct application scenarios since they enable data processing in a separate and protected region of memory. To investigate how this technology has been applied to the different IoT scenarios, which commonly deal with specific characteristics such as device resource constraints, we carried out a systematic literature review. For this, we selected and analyzed 58 papers from different conferences and journals, identifying the ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 68 publications
0
14
0
Order By: Relevance
“…Numerous opinion mining approaches are used to extract the feelings hidden in the comments and reviews for a specific unlocked mobile. Additionally, a thorough analysis of sentiment classification methods is performed using the data set from mobile phone assessments [ 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 ]. The study’s [ 24 ] findings provide a comparison of eight distinct classifiers based on the assessment parameters of accuracy, recall, precision, and F-measure.…”
Section: Results and Comparative Analysismentioning
confidence: 99%
“…Numerous opinion mining approaches are used to extract the feelings hidden in the comments and reviews for a specific unlocked mobile. Additionally, a thorough analysis of sentiment classification methods is performed using the data set from mobile phone assessments [ 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 ]. The study’s [ 24 ] findings provide a comparison of eight distinct classifiers based on the assessment parameters of accuracy, recall, precision, and F-measure.…”
Section: Results and Comparative Analysismentioning
confidence: 99%
“…Furthermore, the correct code must be executed in IoT scenarios where processing is already done within the IoT device (e.g., in automotive or healthcare applications). TEEs can be used on the device to protect the execution code and increase trust by attesting correctness to the backend system (Pettersen et al, 2017;Valadares et al, 2021).…”
Section: Example Applications Of Teementioning
confidence: 99%
“…To the best our knowledge, the IoT security in recent years is based on two ways [43], machine learning [23,29,31,34,39] or trusted execution environments [47,48,51]. These approaches often utilize a central server to control resource-constrained IoT devices outside of them.…”
Section: Related Workmentioning
confidence: 99%