2021 IEEE 12th Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2021
DOI: 10.1109/uemcon53757.2021.9666717
|View full text |Cite
|
Sign up to set email alerts
|

Trustful Remote-Sensing Architectures based on Hardware-Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…In the implementation, we used a real HSM, the same that was used by Dominic et al in [ 24 ], the Blockchain Security 2Go starter kit R2 [ 63 ]. Moreover, it was connected to a low-price system on chip, Raspberry Pi 4B: Broadcom BCM2711, Quad core Cortex-A72 (ARM v8) 64-bit SoC @ 1.5 GHz 8 GB LPDDR4-3200 SDRAM.…”
Section: System Implementationmentioning
confidence: 99%
See 2 more Smart Citations
“…In the implementation, we used a real HSM, the same that was used by Dominic et al in [ 24 ], the Blockchain Security 2Go starter kit R2 [ 63 ]. Moreover, it was connected to a low-price system on chip, Raspberry Pi 4B: Broadcom BCM2711, Quad core Cortex-A72 (ARM v8) 64-bit SoC @ 1.5 GHz 8 GB LPDDR4-3200 SDRAM.…”
Section: System Implementationmentioning
confidence: 99%
“…In our proposed work, we propose a solution for all these problems. Firstly, we propose the use of secure hardware architecture [ 24 ] that signs the data even before being gathered by the IoT nodes, thus achieving the much sought after trustworthiness. Secondly, we combine that secure sensor with a personalized blockchain-based PKI to enroll and identify the IoT nodes quickly and cheaply.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The remote sensing device generally includes multiple sensor units and host controller units with intercommunication capabilities. An Unmanned Aerial Vehicle (UAV) represents a common case for a remote sensing device, since it is always equipped with multiple sensors so that data streams are diverted into another content of architectures, such as a remote control or an authority [1]. Regardless of the protected inter-communication channels, datasets collected by the sensors required to be satisfied throughout the way to the processing contents, which requires a strong and protected communication channel between numbers of sensing devices and the processing entity that provide the most essential properties: one is integrity, second is confidentiality, and the last one is authenticity.…”
Section: Introductionmentioning
confidence: 99%