2022
DOI: 10.1007/978-3-031-09234-3_43
|View full text |Cite
|
Sign up to set email alerts
|

Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Research studies such as [22][23][24] focused on secure update mechanisms, including covering techniques for authentication, integrity checks and encryption, aiming to mitigate attacks coming from potential adversaries with various levels of computing power, up to quantum computing power levels. Efficiency and reliability aspects are explored, along with strategies for network load minimization and power management, aiming to optimize the OTA update process in IoT environments with limited network and battery resources [25].…”
Section: Tiny Machine Learning Operations (Tinymlops)mentioning
confidence: 99%
See 1 more Smart Citation
“…Research studies such as [22][23][24] focused on secure update mechanisms, including covering techniques for authentication, integrity checks and encryption, aiming to mitigate attacks coming from potential adversaries with various levels of computing power, up to quantum computing power levels. Efficiency and reliability aspects are explored, along with strategies for network load minimization and power management, aiming to optimize the OTA update process in IoT environments with limited network and battery resources [25].…”
Section: Tiny Machine Learning Operations (Tinymlops)mentioning
confidence: 99%
“…Note that, as per the SUIT specification, different schemes for digital signatures, hashing and encryption can be used (performance comparisons are available in prior work such as [24]). In the below, we assume the use of Secure Hash Algorithm 256-bit (SHA256) [29] for hashing, and Ed25519 algorithm [30] for digital signatures.…”
Section: Model Update Proceduresmentioning
confidence: 99%
“…As observed by the IETF Software Updates for Internet of Things (SUIT) group in [36], since the lifespan of IoT devices may last decades, manufacturers should start considering the use of post-quantum cryptographic primitives. There are few studies, e.g., [37,38] that analyze the feasibility and performance of quantum-resistant cryptographic primitives on IoT-class devices.…”
Section: Lightweight Cryptographymentioning
confidence: 99%
“…The first level of crypto agility enabled by Cubedate uses flexibility provided by the SUIT standard specification: while keeping the same metadata and workflow, diverse crypto primitives backends can be used. For instance, to upgrade from pre-to post-quantum security, digital signature performed with ed25519 (elliptic curve crypto), can be swapped for hash-based signatures (LMS [20]).…”
Section: G Supporting Crypto Agilitymentioning
confidence: 99%