Nowadays, Internet of Things (IoT) devices are widely used in several application scenarios. Due to their cheap structure, they often do not guarantee high security standard, making them prone to hacker attacks. Remote attestation is widely used to verify the configuration integrity on remote devices. Unfortunately, checking the integrity of each single device is impractical, thus several collective remote attestation protocols have been recently proposed to efficiently run attestations in wide device swarms. However, current solutions still have several limitations in terms of network topology, scalability, and efficiency. This paper presents a new efficient collective remote attestation protocol for highly dynamic networks. Our protocol i...
Embedded devices are increasingly permeating our environment to collect data and act on the insight ...
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially cons...
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) che...
Remote Attestation (RA) has been proven to be a powerful security service to check the legitimacy of...
Remote attestation protocols are widely used to detect device configuration (e.g., software and/or d...
An Internet of Things (IoT) system generally contains thousands of heterogeneous devices which often...
The swarm attestation methods have been proposed to detect illegitimate modifications in a large net...
© 2018 IEEE. The growing pervasiveness of Internet of Things (IoT) expands the attack surface by con...
Remote Attestation (RA) has been proven to be a powerful security service to check the legitimacy of...
Large numbers of smart connected devices, also named as the Internet of Things (IoT), are permeating...
The Internet of Things (IoT) is shaped by the increasing number of low-cost Internet-connected embed...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
In recent years, the booming of Internet of Things (IoT) has populated the world with billions of sm...
Remote Attestation (RA) is a security mechanism that allows a centralized trusted entity (Verifier) ...
Internet of Things (IoT) technology promises to bring new value creation opportunities across all ma...
Embedded devices are increasingly permeating our environment to collect data and act on the insight ...
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially cons...
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) che...
Remote Attestation (RA) has been proven to be a powerful security service to check the legitimacy of...
Remote attestation protocols are widely used to detect device configuration (e.g., software and/or d...
An Internet of Things (IoT) system generally contains thousands of heterogeneous devices which often...
The swarm attestation methods have been proposed to detect illegitimate modifications in a large net...
© 2018 IEEE. The growing pervasiveness of Internet of Things (IoT) expands the attack surface by con...
Remote Attestation (RA) has been proven to be a powerful security service to check the legitimacy of...
Large numbers of smart connected devices, also named as the Internet of Things (IoT), are permeating...
The Internet of Things (IoT) is shaped by the increasing number of low-cost Internet-connected embed...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
In recent years, the booming of Internet of Things (IoT) has populated the world with billions of sm...
Remote Attestation (RA) is a security mechanism that allows a centralized trusted entity (Verifier) ...
Internet of Things (IoT) technology promises to bring new value creation opportunities across all ma...
Embedded devices are increasingly permeating our environment to collect data and act on the insight ...
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially cons...
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) che...