Remote attestation of host-based defense via optical channel

2020 ◽  
Author(s):  
Nathaniel Boggs ◽  
Brenda So ◽  
Ang Cui
2012 ◽  
Vol E95-B (1) ◽  
pp. 254-262
Author(s):  
Yoshitoshi YAMASHITA ◽  
Eiji OKAMOTO ◽  
Yasunori IWANAMI ◽  
Yozo SHOJI ◽  
Morio TOYOSHIMA ◽  
...  

2013 ◽  
Vol 32 (8) ◽  
pp. 2275-2279 ◽  
Author(s):  
Dong-lai FU ◽  
Xin-guang PENG ◽  
Gou-xi CHEN ◽  
Qiu-xiang YANG
Keyword(s):  

2003 ◽  
Author(s):  
Temel Bilici ◽  
Senol Isci ◽  
Adnan Kurt ◽  
Ali Serpenguzel
Keyword(s):  

Author(s):  
Emanuele Cesena ◽  
Gianluca Ramunno ◽  
Roberto Sassu ◽  
Davide Vernizzi ◽  
Antonio Lioy
Keyword(s):  

2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Wen-Zheng Wang ◽  
Yan-Ming Wang ◽  
Guo-Qing Shi

Respirable coal particle generated during underground mining is the main cause for gas-dust explosions and coal workers’ pneumoconiosis (CWP) which needs accurate monitoring especially on its concentration. Focusing on the coal dust pollution in the fully mechanized working face of Huangbaici coalmine, coal particle was sampled for further industrial analysis and FT-IR test to obtain its chemical composition and optical constant. Combined with the simulated spatial distribution of airborne dust, the spectral transmission characteristics of coal dust within wavelengths of 2.5 to 25 μm under different operating conditions were obtained. The simulation results show that the transmittance and aerosol optical depth (AOD) of coal dust are closely linked and obviously influenced by the variation of dust generation source (intensity of dust release, position of coal cutting, and the wetting of the coal seam) and airflow field (wind speed and direction of ventilation). Furthermore, an optical channel of 1260–1280 cm−1(7.937–7.813 μm) which is almost only sensitive to the variation of dust concentration but dull to the diameter change of coal dust was selected to establish the correlation of dust concentration and infrared transmittance. The fitting curve was then applied to retrieve the equivalent dust concentration based on optical information, and the comparison results demonstrate that the estimated pollution level is consistent with field measurement data in engineering practice.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1598
Author(s):  
Sigurd Frej Joel Jørgensen Ankergård ◽  
Edlira Dushku ◽  
Nicola Dragoni

The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-connected devices which are revolutionizing many domains, such as healthcare, transportation, smart cities, to mention only a few. Along with the unprecedented new opportunities, the IoT revolution is creating an enormous attack surface for potential sophisticated cyber attacks. In this context, Remote Attestation (RA) has gained wide interest as an important security technique to remotely detect adversarial presence and assure the legitimate state of an IoT device. While many RA approaches proposed in the literature make different assumptions regarding the architecture of IoT devices and adversary capabilities, most typical RA schemes rely on minimal Root of Trust by leveraging hardware that guarantees code and memory isolation. However, the presence of a specialized hardware is not always a realistic assumption, for instance, in the context of legacy IoT devices and resource-constrained IoT devices. In this paper, we survey and analyze existing software-based RA schemes (i.e., RA schemes not relying on specialized hardware components) through the lens of IoT. In particular, we provide a comprehensive overview of their design characteristics and security capabilities, analyzing their advantages and disadvantages. Finally, we discuss the opportunities that these RA schemes bring in attesting legacy and resource-constrained IoT devices, along with open research issues.


Sign in / Sign up

Export Citation Format

Share Document