<p>In the past few years, the diffusion of IoT devices used in everyday life has skyrocketed.<br> From wearable devices to smart home appliances, these gadgets are increasingly exposed to the Internet or to open networks.<br> This means that it is necessary to find security solutions that can guarantee the safety of these devices, while at the same time saving on energy consumption and implementation space.<br> In this paper we explore recent works that use remote attestation as a possible solution to the security of IoT devices while also focusing on the use of Physically Unclonable Functions (PUFs).<br> We provide a thorough analysis of the selected papers, providing insights on possible future research direc...
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...
Smart factories, critical infrastructures, and medical devices largely rely on embedded systems that...
Cyber-Physical Systems (CPS) typically involve a number of networked systems that can watch over and...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internetconnected devices...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
In this work, we examine whether Physical Unclonable Functions (PUFs) can act as lightweight securit...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Remote attestation is a mechanism to securely and verifiably obtain information about the state of a...
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially cons...
Remote attestation mechanisms are well studied in the high-end computing environments; however, the ...
Internet of Things (IoT) is a revolutionary network that is envisioned to connect physical entities ...
In this work, we examine very briefly a number of Advanced Reconfigurable Physical Unclonable Functi...
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...
Smart factories, critical infrastructures, and medical devices largely rely on embedded systems that...
Cyber-Physical Systems (CPS) typically involve a number of networked systems that can watch over and...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internetconnected devices...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
In this work, we examine whether Physical Unclonable Functions (PUFs) can act as lightweight securit...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Remote attestation is a mechanism to securely and verifiably obtain information about the state of a...
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially cons...
Remote attestation mechanisms are well studied in the high-end computing environments; however, the ...
Internet of Things (IoT) is a revolutionary network that is envisioned to connect physical entities ...
In this work, we examine very briefly a number of Advanced Reconfigurable Physical Unclonable Functi...
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...
Smart factories, critical infrastructures, and medical devices largely rely on embedded systems that...
Cyber-Physical Systems (CPS) typically involve a number of networked systems that can watch over and...