Nothing Special   »   [go: up one dir, main page]

Τσαγδής, 2022 - Google Patents

Hardware-based security methods for Internet of Things (IoT), Internet of Everything (IoE) & Cyber-Physical Systems (CPS)

Τσαγδής, 2022

View PDF
Document ID
6908562870298814690
Author
Τσαγδής Î
Publication year

External Links

Snippet

Hardware security has emerged as a prominent study area in the last decade, drawing academics, businesses and governments alike. Electronic data processing now controls documents and nearly all aspects of our lives. Bits become as important as actual resources …
Continue reading at polynoe.lib.uniwa.gr (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Similar Documents

Publication Publication Date Title
Williams et al. A survey on security in internet of things with a focus on the impact of emerging technologies
Da Xu et al. Embedding blockchain technology into IoT for security: A survey
Blazytko et al. {GRIMOIRE}: Synthesizing structure while fuzzing
US11379263B2 (en) Systems, devices, and methods for selecting a distributed framework
Neshenko et al. Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations
US10742421B1 (en) Methods and systems for anonymous hardware attestation
Pu et al. A lightweight and privacy-preserving mutual authentication and key agreement protocol for Internet of Drones environment
Kumbhar et al. Cybersecurity for battery management systems in cyber-physical environments
Hakeem et al. A key management protocol based on the hash chain key generation for securing LoRaWAN networks
Mogadem et al. A survey on internet of energy security: related fields, challenges, threats and emerging technologies
Marian et al. Experimenting with digital signatures over a DNP3 protocol in a multitenant cloud-based SCADA architecture
Bou-Harb et al. Cyber threat intelligence for the internet of things
Roy et al. Device-specific security challenges and solution in IoT edge computing: a review
Falas et al. A modular end-to-end framework for secure firmware updates on embedded systems
Wilson Inter-device authentication protocol for the internet of things
Τσαγδής Hardware-based security methods for Internet of Things (IoT), Internet of Everything (IoE) & Cyber-Physical Systems (CPS)
Boussard et al. A process for generating concrete architectures
Sniatala et al. Evolution of Smart Sensing Ecosystems with Tamper Evident Security
McGinthy Solutions for internet of things security challenges: trust and authentication
Jin Cryptographic Solutions for Cyber-Physical System Security
Bordel et al. Physical Unclonable Functions based on silicon micro-ring resonators for secure signature delegation in Wireless Sensor Networks.
El-Hajj et al. Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0
Goutsos Physical unclonability framework for the Internet of Things
Rull Aixa Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach
Falas et al. Hardware-enabled secure firmware updates in embedded systems