SHOID: A Secure Herd of IoT Devices Firmware Update Protocol.
Frédéric RuelléQuentin GuellaënArnaud RosayPublished in: ICISSP (2023)
Keyphrases
- cryptographic protocols
- covert channel
- rfid systems
- key management
- key distribution
- authentication protocol
- security protocols
- mobile agent system
- group communication
- scalar product
- secure routing
- provably secure
- rfid tags
- security analysis
- mutual authentication
- key exchange protocol
- operating system
- lightweight
- password authentication
- key agreement protocol
- mobile devices
- key exchange
- diffie hellman
- security model
- power consumption
- multi party
- management system
- homomorphic encryption
- key establishment
- secure communication
- privacy preserving
- secure multiparty computation
- vertically partitioned data
- standard model
- secure multi party
- security requirements
- public key
- computer systems
- secret key
- cloud computing
- cryptographic algorithms
- smart card
- security properties
- electronic voting
- trusted third party
- mobile payment
- mobile agents
- smart objects
- embedded systems
- big data
- low cost
- smart home
- network devices
- rfid technology
- ad hoc networks
- key agreement
- input output
- user privacy