2016
DOI: 10.1186/s13638-016-0746-6
|View full text |Cite
|
Sign up to set email alerts
|

Secure dissemination of software updates for intelligent mobility in future wireless networks

Abstract: Wireless mobile networks frequently need remote software updates to add or adjust the tasks of mobile nodes. Software update traffic, particularly in the Internet of Things (IoT), should be carefully handled since attackers can easily compromise a number of unattended devices by modifying a piece of code in the software update routine. These attacks are quite realistic and harmful as seen in the real world. To protect lower-powered mobile devices, an in-network detection mechanism is preferred. However, due to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Furthermore, as future opportunities, studies could address data safety and supply chain management. Information safety is fundamental in collaborative networks (Lee and Kwon, 2016), and the elements of industry 4.0 are directly related to data and information flows. In addition, further research could develop horizontal and vertical integration mechanism systems in SCM, since this topic was not yet explored by the analyzed literature.…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, as future opportunities, studies could address data safety and supply chain management. Information safety is fundamental in collaborative networks (Lee and Kwon, 2016), and the elements of industry 4.0 are directly related to data and information flows. In addition, further research could develop horizontal and vertical integration mechanism systems in SCM, since this topic was not yet explored by the analyzed literature.…”
Section: Discussionmentioning
confidence: 99%
“…These methods treat the payload of software update like a binary data. However, Lee et al proposed CodeDog [ 7 ] and employed a specific markers to find semantic modification in a fragmented program code from a sequence of packets, gathered by network monitors. Cheng et al rather focused on prioritizing nodes to patch first.…”
Section: Related Workmentioning
confidence: 99%
“…This reliable delivery of software update is extended by mobile sources (initiators) in [ 5 ] and by distributed dissemination in [ 6 ]. Focusing on the second problem, Lee et al [ 7 ] recently presented CodeDog in-network monitoring of software update delivery with semantic fingerprints of payload. Cheng et al in [ 8 ] proposed the traffic-aware patching to select optimal relaying node to update in order to minimize the propagation of attacks.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of technology, mobile intelligent devices represented by smart phones tend to have better scalability (Lee & Kwon, 2016), which makes it possible to further extend the function of the intelligent devices by installing the corresponding application program in the actual use process. At the same time, the powerful sound processing function and application program in the smart phone make it possible to further improve the effectiveness of English teaching through the application of the smart phone in the process of English teaching.…”
Section: Powerful Sound Systemmentioning
confidence: 99%