Physical unclonable functions for device authentication and secret key generation
Proceedings of the 44th annual Design Automation Conference
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Securing the Internet of Things
Computer
A Novel Secure Architecture for the Internet of Things
ICGEC '11 Proceedings of the 2011 Fifth International Conference on Genetic and Evolutionary Computing
Data-Provenance Verification For Secure Hosts
IEEE Transactions on Dependable and Secure Computing
Fog computing and its role in the internet of things
Proceedings of the first edition of the MCC workshop on Mobile cloud computing
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters
Proceedings of the 50th Annual Design Automation Conference
Hi-index | 0.00 |
Internet of Things (IoT) is the interconnection of a large number of resource-constrained devices such as sensors, actuators, and nodes that generate large volumes of data which are then processed into useful actions in areas such as home and building automation, intelligent transportation and connected vehicles, industrial automation, smart healthcare, smart cities, and others. Important challenges remain to fulfill the IoT vision including data provenance and integrity, trust management, identity management, and privacy. We describe how embedded and hardware security approaches can be the basis to address these security challenges.