Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








893 Hits in 7.4 sec

Firmware over-the-air programming techniques for IoT networks – A survey [article]

Konstantinos Arakadakis, Pavlos Charalampidis, Antonis Makrogiannakis, Alexandros Fragkiadakis
2020 arXiv   pre-print
In this work, we present a survey of OTAP techniques, which can be applied to IoT networks.  ...  an efficient and reliable pipeline for over-the-air programming (OTAP).  ...  PLATFORMS SUPPORTING FIRMWARE OVER- THE-AIR PROGRAMMING In this section, we present a collection of cloud platforms that offer firmware OTAP for IoT devices.  ... 
arXiv:2009.02260v2 fatcat:wwemcsa6f5gfrifyiswkldd6ba

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
Therefore, it is worth surveying CPS security by reviewing and analyzing the latest high-quality related works.  ...  In this paper, we provide an overview of the CPS security studies from the last five years and select 142 related works from A- or B-level conferences/journals recommended by the China Computer Federation  ...  Due to the heterogeneity of IoT deployments, the capability to securely (re)program embedded devices over the air is confined, so SEDA [83] is designed to address confusion caused by over-the-air updates  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model

Hezam Akram, Dimitri Konstantas, Mohammed Mahyoub
2018 International Journal of Advanced Computer Science and Applications  
Second, we describe a set of IoT security goals. Third, we identify IoT attack taxonomy for each asset.  ...  To the best of our knowledge, this is the first paper that attempts to provide a comprehensive IoT attacks model based on a building-blocked reference model.  ...  Reprogram attack: Reprogramming the IoT objects remotely as done in some environments can be achieved using a network programming system.  ... 
doi:10.14569/ijacsa.2018.090349 fatcat:swdbzypft5bwbo6pkzaucteduq

Security Considerations for Internet of Things: A Survey

Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac
2020 SN Computer Science  
This paper is focusing on a survey on IoT security and aims to highlight the most significant problems related to safety and security in the IoT ecosystems.  ...  However, the security of these connected Internet of things (IoT) plays a centric role with no margin for error.  ...  For a better isolation of a problem, access to the network can be handled by implementing another technique, called segregation [9] .  ... 
doi:10.1007/s42979-020-00201-3 fatcat:4gkafccu7vgq7olrqdxdpgm2eu

A Survey of IoT and Blockchain Integration: Security Perspective

Elham A. Shammar, Ammar T. Zahary, Asma A. Al-Shargabi
2021 IEEE Access  
The surveyed articles have been chronologically organized in tables for better clarity.  ...  of the complexities of implementing blockchain technology for IoT.  ...  Furthermore, with global IoT deployments, updating devices one by one can be a difficult task [10] . On IoT devices, over-the-air (OTA) firmware updates are common.  ... 
doi:10.1109/access.2021.3129697 fatcat:l3tj4zelejbobouc2ouw3j3pcy

A Comparative Survey of LPWA Networking [article]

Joseph Finnegan, Stephen Brown
2018 arXiv   pre-print
These technologies promise to enable a scalable high range network on cheap low power devices, facilitating the development of a ubiquitous IoT.  ...  Motivated by the increasing variance of suggested Internet of Things (IoT) applications and the lack of suitability of current wireless technologies in scalable, long range deployments, a number of diverging  ...  Weightless claim low latency in both uplink and downlink, enabling the support of over-the-air firmware upgrades.  ... 
arXiv:1802.04222v1 fatcat:i5tsjgcawvb6ljc4yeeayellp4

A Survey on Security Issues in Modern Implantable Devices: Solutions and Future Issues [article]

Emmanuel Kwarteng, Dr. Mumin Cebe
2022 arXiv   pre-print
Implantable Medical Devices (IMD) is a fast pace growing medical field and continues to grow in the foreseeable future.  ...  Finally, we conclude the article with future research directions toward securing IMD systems to light the way for researchers.  ...  One of the most common techniques that is employed during firmware update is Over-the-Air (OTA) update. OTA delivers firmware update using wireless connectivity.  ... 
arXiv:2205.00893v1 fatcat:3nwvnv6cmvemhls75xrogqslb4

A Survey of Cybersecurity of Digital Manufacturing

Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T. S. Bukkapatanam, Nikhil Gupta, Ramesh Karri
2020 Proceedings of the IEEE  
| The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance quality and productivity, which reduces inventory and the lead time for delivering custom, batch-of-one products  ...  A DM system consists of embedded electronics, sensors, actuators, control software, and interconnectivity to enable the machines and the components within them to exchange data with other machines, components  ...  Among these, ∼59% of the printers on the network had out-of-date firmware [see Fig. 16 (b)] and over half of the printers had no password.  ... 
doi:10.1109/jproc.2020.3032074 fatcat:k5oigs6o4fbobmoemdie4n5c6u

Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security

Hannes Tschofenig, Emmanuel Baccelli
2019 IEEE Security and Privacy  
This paper surveys IoT security protocols standardized by the IETF, maps protocols to regulatory IoT security guidelines (from ENISA), and discusses remaining gaps.  ...  We observe that, while IETF protocols alone do not completely secure IoT devices, they go a long way.  ...  Unsurprisingly, the IETF has also developed a number of these protocols for use in IoT environments, as outlined in this survey [13] .  ... 
doi:10.1109/msec.2019.2923973 fatcat:wq6ds4mjcraqneiagxshqzfjbe

A Survey of Cybersecurity of Digital Manufacturing [article]

Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T.S. Bukkapatanam, Nikhil Gupta, Ramesh Karri
2020 arXiv   pre-print
The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance quality and productivity, that reduces inventory and the lead-time for delivering custom, batch-of-one products  ...  A DM system consists of embedded electronics, sensors, actuators, control software, and inter-connectivity to enable the machines and the components within them to exchange data with other machines, components  ...  Gupta are supported in part by NYU Center for Cybersecurity, and R. Karri is also supported in part by NYU-AD Center for Cybersecurity.  ... 
arXiv:2006.05042v3 fatcat:j3gf62nh45h5bdj6fw6yycm5iy

Security trends in Internet of Things: a survey

Rachit, Shobha Bhatt, Prakash Rao Ragiri
2021 SN Applied Sciences  
Our study reveals a need for protocols that are competent enough to be accorded for over one threat vector.  ...  AbstractThe Internet of Things (IoT) is a network of embedded devices that are uniquely identifiable and have embedded software required to communicate between the transient states.  ...  A thorough review presented in this survey focuses on prominent threats prevailing in current IoT systems, along with the latest security models proffered for the IoT environment in recent years.  ... 
doi:10.1007/s42452-021-04156-9 fatcat:46srogfggjhndgeuy6lqyllsxq

A Survey on Internet of Things From Industrial Market Perspective

Charith Perera, Chi Harold Liu, Srimal Jayawardena, Min Chen
2014 IEEE Access  
This survey is intended to serve as a guideline and a conceptual framework for contextaware product development and research in the IoT paradigm.  ...  Over the last few years, we have seen a plethora of IoT solutions making their way into the industry marketplace.  ...  One of the techniques for connecting everyday objects into networks is radio frequency identification RFID technology [9] .  ... 
doi:10.1109/access.2015.2389854 fatcat:5mvkwfh67jhgpjr7sag6z3t4hy

Context Aware Computing for The Internet of Things: A Survey

Charith Perera, Arkady Zaslavsky, Peter Christen, Dimitrios Georgakopoulos
2014 IEEE Communications Surveys and Tutorials  
The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT.  ...  Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future.  ...  Octopus develops middleware abstractions and programming models for the IoT.  ... 
doi:10.1109/surv.2013.042313.00197 fatcat:4ybza3q63nhk5oqan6tscdwtbe

Towards Privacy Preserving IoT Environments: A Survey

Mohamed Seliem, Khalid Elgazzar, Kasem Khalil
2018 Wireless Communications and Mobile Computing  
The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment.  ...  Lastly, we discuss the mechanisms and architectures for protecting IoT data in case of mobility at the device layer, infrastructure/platform layer, and application layer.  ...  Wireless Communications and Mobile Computing Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2018/1032761 fatcat:j76yhuc5rjhvbifkk5foq3klzq

A Survey on Trend and Classification of Internet of Things Reviews

Azana Hafizah Mohd Aman, Elahah Yadegaridehkordi, Zainab Senan Attarbashi, Rosilah Hassan, Park Yong-Jin
2020 IEEE Access  
ACKNOWLEDGMENT The authors are grateful to Faculty of Information Science and Technology, The National University of Malaysia for all the supports and contributions to this study.  ...  IoT firmware is a low-level control software for the IoT's specific hardware. The IoT firmware varies because the board or the microprocessors differ.  ...  For routing in the middle layer, the Internet Engineering Task Force (IETF) Routing over Low Power and Lossy Networks (ROLL) working group has developed a routing protocol for Low Power and Lossy Networks  ... 
doi:10.1109/access.2020.3002932 fatcat:hepsdhdq6vgx7ml46zkwvbhope
« Previous Showing results 1 — 15 out of 893 results