2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) 2016
DOI: 10.1109/percomw.2016.7457156
|View full text |Cite
|
Sign up to set email alerts
|

Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…There are many motivations to design and develop applications in smart homes, the main ones being independent living [ 3 , 7 , 9 , 10 , 11 , 57 ]; wellbeing [ 4 , 6 , 8 , 12 , 58 ]; efficient use of electricity [ 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , 71 , 72 ]; and safety and security [ 73 , 74 , 75 , 76 , 77 , 78 , 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 ].…”
Section: Related Workmentioning
confidence: 99%
“…There are many motivations to design and develop applications in smart homes, the main ones being independent living [ 3 , 7 , 9 , 10 , 11 , 57 ]; wellbeing [ 4 , 6 , 8 , 12 , 58 ]; efficient use of electricity [ 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , 71 , 72 ]; and safety and security [ 73 , 74 , 75 , 76 , 77 , 78 , 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 ].…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [36] propose a solution based on device diversity for a particular scenario of vehicular networks. Similar solutions were proposed in [37,38] with a non-trustworthy assumption. However, the problem of scalability, which is central to IoT devices, is not addressed.…”
Section: General Architectures For Iot Patchingmentioning
confidence: 80%
“…It has been shown in Huth et al [ 66 ] that PUFs can be leveraged by IoT devices to ensure IP protection during software update procedures. Accordingly, an IoT end-device has to prove the erasure of its memory within a time constraint and a PUF binds the newly downloaded software IP to the target platform.…”
Section: Hardware Assisted Security Of Fog Computing Devicesmentioning
confidence: 99%