2021
DOI: 10.1109/jsac.2020.3020658
|View full text |Cite
|
Sign up to set email alerts
|

xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…Lu et al [ 89 ] proposed a method which assumed that modules can not be tampered with to obtain a private–public key pair and if it, does the trusted server will detect this with a function. The device encrypts an index and the value of that index by a key pair and shares it with the server.…”
Section: Iomt Security Solutionsmentioning
confidence: 99%
“…Lu et al [ 89 ] proposed a method which assumed that modules can not be tampered with to obtain a private–public key pair and if it, does the trusted server will detect this with a function. The device encrypts an index and the value of that index by a key pair and shares it with the server.…”
Section: Iomt Security Solutionsmentioning
confidence: 99%
“…To protect data from eavesdropping and tampering in the transmission process, Lu et al. [7] used Paillier homomorphic encryption and one‐way hash chains to guarantee the accuracy and privacy of data, whereas Abera et al. [8] used proxy re‐encryption techniques.…”
Section: Related Workmentioning
confidence: 99%
“…To protect data from eavesdropping and tampering in the transmission process, Lu et al [7] used Paillier homomorphic encryption and one-way hash chains to guarantee the accuracy and privacy of data, whereas Abera et al [8] used proxy reencryption techniques. To address the challenge of resourceconstrained IoT gadgets, researchers have continued to optimise encryption techniques and reduce the computational costs of the encryption.…”
Section: Related Workmentioning
confidence: 99%
“…The most used scenario of TPM is trust chain construction, 18 but the key trust metric in the process of trust chain establishment, CRTM, is a segment of the program stored in the BIOS. The password from the device exists completely at the command of the upper call, and cannot provide code logic to the upper software security, once the operating system or application is attacked is easy to be bypassed.…”
Section: Related Workmentioning
confidence: 99%