A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Boyu KuangAnmin FuWilly SusiloShui YuYansong GaoPublished in: Comput. Secur. (2022)
Keyphrases
- countermeasures
- remote attestation
- information security
- virtual machine
- trusted computing
- computing platform
- cloud computing
- power analysis
- security protocols
- java card
- embedded systems
- differential power analysis
- security measures
- cyber attacks
- computer security
- information systems
- security mechanisms
- security requirements
- low cost
- databases