Proceedings of the 27th International Symposium on Rapid System Prototyping: Shortening the Path From Specification to Prototyp 2016
DOI: 10.1145/2990299.2990301
|View full text |Cite
|
Sign up to set email alerts
|

Embedded virtualization for the design of secure IoT applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…Edge computing is about processing data streams at least partially on the spot (e.g., directly on DES) in a resource‐saving way. It runs specific applications in a fixed logic location and is strongly based on virtualization 3,7‐10,13‐19 . For a long time, the research community believed that hypervisor‐based virtualization was an overkill approach for DES due to its inherent overhead 7,8,13,15 .…”
Section: Virtualization On Desmentioning
confidence: 99%
“…Edge computing is about processing data streams at least partially on the spot (e.g., directly on DES) in a resource‐saving way. It runs specific applications in a fixed logic location and is strongly based on virtualization 3,7‐10,13‐19 . For a long time, the research community believed that hypervisor‐based virtualization was an overkill approach for DES due to its inherent overhead 7,8,13,15 .…”
Section: Virtualization On Desmentioning
confidence: 99%
“…The framework summarizes the heterogeneity of a large number of different devices or objects while increasing reliability and making it easier to consider the views of different users. Integrated virtualization has become an effective way to reduce costs, improve software quality and reduce development time [21,22].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Virtualization technology is mainly used in embedded devices to run normal and real-time operating systems (RTOSs) concurrently [17][18][19][20]. The difference between real-time operating systems and normal operating systems is that in a real-time operating system, the response time of instruction execution demands a guaranteed throughput rather than a high throughput [21] as required in a normal operating system.…”
Section: Virtualization On Embedded Devicesmentioning
confidence: 99%
“…A trusted computing base/secure execution environment is considered to be a major security requirement of a virtualized IoT infrastructure [20,[24][25][26]. Virtual machine isolation at different hardware levels (e.g., processor, memory, and networking) is essential for achieving a trusted computing base [27].…”
Section: Virtualization On Embedded Devicesmentioning
confidence: 99%