2017
DOI: 10.4172/2165-7866.1000217
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring Software Integrity in IoT Devices

Abstract: This paper will review the available literature covering topics relevant to ensuring software integrity of the boot image and running code in networked devices. The paper will focus on hardware devices defined as IoT (Internet of Things) in the consumer space. Software-only (virtual) devices will also be discussed. Topics reviewed will include trusted anchor concepts and technologies, chain of trust and validation of code integrity, as well as the technologies which support them, such as PKI (public key infras… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
(9 reference statements)
0
2
0
Order By: Relevance
“…Echard [14]: The data in a business network is prone to attack; the author talks about the importance of encryption and the chances of vulnerable data, the need for security keys and the decryption of data. The conclusion speaks of hazy ideas regarding the security of data over a network.…”
Section: Challenges With Wastewater Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Echard [14]: The data in a business network is prone to attack; the author talks about the importance of encryption and the chances of vulnerable data, the need for security keys and the decryption of data. The conclusion speaks of hazy ideas regarding the security of data over a network.…”
Section: Challenges With Wastewater Managementmentioning
confidence: 99%
“…Echard [14] mentions data security on a network connecting IOT devices; Schaad [15] advances his work by COSE protocol encryption for cryptographic signing of data, enhancing data security; COSE protocol follows layer encryption, i.e., content and recipient layer. Our work uses cryptographic encryption for ethereum blockchain which uses Elliptic Curve Digital Signature algorithm as a key pair encryption standard for unique public and private key pairs owned by each organization.…”
Section: Challenges With Wastewater Managementmentioning
confidence: 99%