A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Firmware over-the-air programming techniques for IoT networks – A survey
[article]
2020
arXiv
pre-print
In this work, we present a survey of OTAP techniques, which can be applied to IoT networks. ...
an efficient and reliable pipeline for over-the-air programming (OTAP). ...
PLATFORMS SUPPORTING FIRMWARE OVER-
THE-AIR PROGRAMMING In this section, we present a collection of cloud platforms that offer firmware OTAP for IoT devices. ...
arXiv:2009.02260v2
fatcat:wwemcsa6f5gfrifyiswkldd6ba
A Survey on Recent Advanced Research of CPS Security
2021
Applied Sciences
Therefore, it is worth surveying CPS security by reviewing and analyzing the latest high-quality related works. ...
In this paper, we provide an overview of the CPS security studies from the last five years and select 142 related works from A- or B-level conferences/journals recommended by the China Computer Federation ...
Due to the heterogeneity of IoT deployments, the capability to securely (re)program embedded devices over the air is confined, so SEDA [83] is designed to address confusion caused by over-the-air updates ...
doi:10.3390/app11093751
fatcat:fxby2wjzpnchrfshvilxalmptm
A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model
2018
International Journal of Advanced Computer Science and Applications
Second, we describe a set of IoT security goals. Third, we identify IoT attack taxonomy for each asset. ...
To the best of our knowledge, this is the first paper that attempts to provide a comprehensive IoT attacks model based on a building-blocked reference model. ...
Reprogram attack: Reprogramming the IoT objects remotely as done in some environments can be achieved using a network programming system. ...
doi:10.14569/ijacsa.2018.090349
fatcat:swdbzypft5bwbo6pkzaucteduq
Security Considerations for Internet of Things: A Survey
2020
SN Computer Science
This paper is focusing on a survey on IoT security and aims to highlight the most significant problems related to safety and security in the IoT ecosystems. ...
However, the security of these connected Internet of things (IoT) plays a centric role with no margin for error. ...
For a better isolation of a problem, access to the network can be handled by implementing another technique, called segregation [9] . ...
doi:10.1007/s42979-020-00201-3
fatcat:4gkafccu7vgq7olrqdxdpgm2eu
A Survey of IoT and Blockchain Integration: Security Perspective
2021
IEEE Access
The surveyed articles have been chronologically organized in tables for better clarity. ...
of the complexities of implementing blockchain technology for IoT. ...
Furthermore, with global IoT deployments, updating devices one by one can be a difficult task [10] . On IoT devices, over-the-air (OTA) firmware updates are common. ...
doi:10.1109/access.2021.3129697
fatcat:l3tj4zelejbobouc2ouw3j3pcy
A Comparative Survey of LPWA Networking
[article]
2018
arXiv
pre-print
These technologies promise to enable a scalable high range network on cheap low power devices, facilitating the development of a ubiquitous IoT. ...
Motivated by the increasing variance of suggested Internet of Things (IoT) applications and the lack of suitability of current wireless technologies in scalable, long range deployments, a number of diverging ...
Weightless claim low latency in both uplink and downlink, enabling the support of over-the-air firmware upgrades. ...
arXiv:1802.04222v1
fatcat:i5tsjgcawvb6ljc4yeeayellp4
A Survey on Security Issues in Modern Implantable Devices: Solutions and Future Issues
[article]
2022
arXiv
pre-print
Implantable Medical Devices (IMD) is a fast pace growing medical field and continues to grow in the foreseeable future. ...
Finally, we conclude the article with future research directions toward securing IMD systems to light the way for researchers. ...
One of the most common techniques that is employed during firmware update is Over-the-Air (OTA) update. OTA delivers firmware update using wireless connectivity. ...
arXiv:2205.00893v1
fatcat:3nwvnv6cmvemhls75xrogqslb4
A Survey of Cybersecurity of Digital Manufacturing
2020
Proceedings of the IEEE
| The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance quality and productivity, which reduces inventory and the lead time for delivering custom, batch-of-one products ...
A DM system consists of embedded electronics, sensors, actuators, control software, and interconnectivity to enable the machines and the components within them to exchange data with other machines, components ...
Among these, ∼59% of the printers on the network had out-of-date firmware [see Fig. 16 (b)] and over half of the printers had no password. ...
doi:10.1109/jproc.2020.3032074
fatcat:k5oigs6o4fbobmoemdie4n5c6u
Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security
2019
IEEE Security and Privacy
This paper surveys IoT security protocols standardized by the IETF, maps protocols to regulatory IoT security guidelines (from ENISA), and discusses remaining gaps. ...
We observe that, while IETF protocols alone do not completely secure IoT devices, they go a long way. ...
Unsurprisingly, the IETF has also developed a number of these protocols for use in IoT environments, as outlined in this survey [13] . ...
doi:10.1109/msec.2019.2923973
fatcat:wq6ds4mjcraqneiagxshqzfjbe
A Survey of Cybersecurity of Digital Manufacturing
[article]
2020
arXiv
pre-print
The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance quality and productivity, that reduces inventory and the lead-time for delivering custom, batch-of-one products ...
A DM system consists of embedded electronics, sensors, actuators, control software, and inter-connectivity to enable the machines and the components within them to exchange data with other machines, components ...
Gupta are supported in part by NYU Center for Cybersecurity, and R. Karri is also supported in part by NYU-AD Center for Cybersecurity. ...
arXiv:2006.05042v3
fatcat:j3gf62nh45h5bdj6fw6yycm5iy
Security trends in Internet of Things: a survey
2021
SN Applied Sciences
Our study reveals a need for protocols that are competent enough to be accorded for over one threat vector. ...
AbstractThe Internet of Things (IoT) is a network of embedded devices that are uniquely identifiable and have embedded software required to communicate between the transient states. ...
A thorough review presented in this survey focuses on prominent threats prevailing in current IoT systems, along with the latest security models proffered for the IoT environment in recent years. ...
doi:10.1007/s42452-021-04156-9
fatcat:46srogfggjhndgeuy6lqyllsxq
A Survey on Internet of Things From Industrial Market Perspective
2014
IEEE Access
This survey is intended to serve as a guideline and a conceptual framework for contextaware product development and research in the IoT paradigm. ...
Over the last few years, we have seen a plethora of IoT solutions making their way into the industry marketplace. ...
One of the techniques for connecting everyday objects into networks is radio frequency identification RFID technology [9] . ...
doi:10.1109/access.2015.2389854
fatcat:5mvkwfh67jhgpjr7sag6z3t4hy
Context Aware Computing for The Internet of Things: A Survey
2014
IEEE Communications Surveys and Tutorials
The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. ...
Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. ...
Octopus develops middleware abstractions and programming models for the IoT. ...
doi:10.1109/surv.2013.042313.00197
fatcat:4ybza3q63nhk5oqan6tscdwtbe
Towards Privacy Preserving IoT Environments: A Survey
2018
Wireless Communications and Mobile Computing
The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment. ...
Lastly, we discuss the mechanisms and architectures for protecting IoT data in case of mobility at the device layer, infrastructure/platform layer, and application layer. ...
Wireless Communications and Mobile Computing
Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper. ...
doi:10.1155/2018/1032761
fatcat:j76yhuc5rjhvbifkk5foq3klzq
A Survey on Trend and Classification of Internet of Things Reviews
2020
IEEE Access
ACKNOWLEDGMENT The authors are grateful to Faculty of Information Science and Technology, The National University of Malaysia for all the supports and contributions to this study. ...
IoT firmware is a low-level control software for the IoT's specific hardware. The IoT firmware varies because the board or the microprocessors differ. ...
For routing in the middle layer, the Internet Engineering Task Force (IETF) Routing over Low Power and Lossy Networks (ROLL) working group has developed a routing protocol for Low Power and Lossy Networks ...
doi:10.1109/access.2020.3002932
fatcat:hepsdhdq6vgx7ml46zkwvbhope
« Previous
Showing results 1 — 15 out of 893 results