Τσαγδής, 2022 - Google Patents
Hardware-based security methods for Internet of Things (IoT), Internet of Everything (IoE) & Cyber-Physical Systems (CPS)Τσαγδής, 2022
View PDF- Document ID
- 6908562870298814690
- Author
- Τσαγδής Î
- Publication year
External Links
Snippet
Hardware security has emerged as a prominent study area in the last decade, drawing academics, businesses and governments alike. Electronic data processing now controls documents and nearly all aspects of our lives. Bits become as important as actual resources …
- 238000000605 extraction 0 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00Â -Â G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Williams et al. | A survey on security in internet of things with a focus on the impact of emerging technologies | |
Da Xu et al. | Embedding blockchain technology into IoT for security: A survey | |
Blazytko et al. | {GRIMOIRE}: Synthesizing structure while fuzzing | |
US11379263B2 (en) | Systems, devices, and methods for selecting a distributed framework | |
Neshenko et al. | Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations | |
US10742421B1 (en) | Methods and systems for anonymous hardware attestation | |
Pu et al. | A lightweight and privacy-preserving mutual authentication and key agreement protocol for Internet of Drones environment | |
Kumbhar et al. | Cybersecurity for battery management systems in cyber-physical environments | |
Hakeem et al. | A key management protocol based on the hash chain key generation for securing LoRaWAN networks | |
Mogadem et al. | A survey on internet of energy security: related fields, challenges, threats and emerging technologies | |
Marian et al. | Experimenting with digital signatures over a DNP3 protocol in a multitenant cloud-based SCADA architecture | |
Bou-Harb et al. | Cyber threat intelligence for the internet of things | |
Roy et al. | Device-specific security challenges and solution in IoT edge computing: a review | |
Falas et al. | A modular end-to-end framework for secure firmware updates on embedded systems | |
Wilson | Inter-device authentication protocol for the internet of things | |
Τσαγδής | Hardware-based security methods for Internet of Things (IoT), Internet of Everything (IoE) & Cyber-Physical Systems (CPS) | |
Boussard et al. | A process for generating concrete architectures | |
Sniatala et al. | Evolution of Smart Sensing Ecosystems with Tamper Evident Security | |
McGinthy | Solutions for internet of things security challenges: trust and authentication | |
Jin | Cryptographic Solutions for Cyber-Physical System Security | |
Bordel et al. | Physical Unclonable Functions based on silicon micro-ring resonators for secure signature delegation in Wireless Sensor Networks. | |
El-Hajj et al. | Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0 | |
Goutsos | Physical unclonability framework for the Internet of Things | |
Rull Aixa | Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach | |
Falas et al. | Hardware-enabled secure firmware updates in embedded systems |