ABSTRACT
This work concerns the demonstration of a security solution for a network of networks, which comprises heterogeneous devices and utilises diverse communication protocols. The security solution used in this work employs an architecture presented in a previous work, which is based upon the concept of hardware and software security co-engineering.
- D. Dolev and A. Yao. 1983. On the security of public key protocols. IEEE Transactions on Information Theory 29, 2 (1983), 198–208. Google ScholarDigital Library
- Samuel Greengard. 2021. The Worsening State of Ransomware. Commun. ACM 64, 4 (March 2021), 15–17. 0001-0782 Google ScholarDigital Library
- Nico Mexis, Nikolaos Athanasios Anagnostopoulos, Shuai Chen, Jan Bambach, Tolga Arul, and Stefan Katzenbeisser. 2021. A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems. ACM J. Emerg. Technol. Comput. Syst. 17, 3, Article 43 (June 2021), 25 pages. 1550-4832 Google ScholarDigital Library
Index Terms
- A design for a secure network of networks using a hardware and software co-engineering architecture
Recommendations
A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems
In recent years, a new generation of the Internet of Things (IoT 2.0) is emerging, based on artificial intelligence, the blockchain technology, machine learning, and the constant consolidation of pre-existing systems and subsystems into larger systems. In ...
Embedded Software Assurance for Configuring Secure Hardware
The recent development of high-security processors and hardware is substantially changing embedded software tools, shedding light on security in the embedded development environment. The process of developing, certifying, and implementing a secure ...
Do we need a holistic approach for the design of secure IoT systems?
CF'17: Proceedings of the Computing Frontiers ConferenceIn this paper, four cryptography and security experts point out to future research directions in internet-of-things (IoT) security. Coming from different research domains, the experts address a broad range of issues related to IoT security. In ...
Comments