Carlson, 2019 - Google Patents
An internet of things software and firmware update architecture based on the suit specificationCarlson, 2019
View PDF- Document ID
- 2011256171501399651
- Author
- Carlson S
- Publication year
External Links
Snippet
As society becomes more digitalized, cyberattacks are increasingly common and severe. Security in the Internet of Things (IoT) is essential, and IoT devices must be updated to patch vulnerabilities. The thesis aims to investigate the question" How can the Software Updates …
- 238000004891 communication 0 description 38
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6923611B2 (en) | Content security at the service layer | |
| US11947681B2 (en) | Cryptographic secret generation and provisioning | |
| TWI469603B (en) | A digital rights management using trust processing technology | |
| JP5021215B2 (en) | Reliable third-party authentication for web services | |
| JP4603043B2 (en) | Method for transmitting sync ML synchronization data | |
| US20220114249A1 (en) | Systems and methods for secure and fast machine learning inference in a trusted execution environment | |
| KR20200066288A (en) | Asset update service | |
| EP3248360A1 (en) | Systems and methods for trusted path secure communication | |
| WO2019019887A1 (en) | Server authentication method, apparatus and system for terminal access, server and computer readable storage medium | |
| TW201215070A (en) | Key Management Systems and methods for shared secret ciphers | |
| Gupta et al. | Onboarding and software update architecture for IoT devices | |
| US11570213B2 (en) | Collaborative security for application layer encryption | |
| Carlson | An internet of things software and firmware update architecture based on the suit specification | |
| Itani et al. | SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications | |
| Al Ayoubi et al. | Centralized Management of BLE-BasedOTA Firmware Updates: Design and Prototype Implementation | |
| Itani et al. | PETRA: a secure and energy-efficient software update protocol for severely-constrained network devices | |
| Pérez Díaz et al. | A PUF-based authentication mechanism for OSCORE | |
| Cooper | FIDO IoT spec | |
| Kadir | RewritingHealer: An approach for securing web service communication | |
| Dasun | Blockchain Based Protocol for IoT Device Authentication and Secure Communication | |
| Šimůnek | Bezpečný upgrade firmware embedded platformy | |
| Nobelis et al. | Designing Security Properties-Centric Communication Protocols using a Component-Based Approach | |
| Suriadi et al. | Denial of service defence appliance for web services | |
| Blanco Romero | Enhancing Communication Security in ROS 2 | |
| Krichanov et al. | Testing of cryptographic protocols based on formal specifications |