• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

代码完整性和保密性:积极健康老龄化的主动数据方法。

Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing.

机构信息

Nokia Corporation, 90620 Oulu, Finland.

Department of Technology and Information Systems, University of Castilla-La Mancha, 13001 Ciudad Real, Spain.

出版信息

Sensors (Basel). 2023 May 16;23(10):4794. doi: 10.3390/s23104794.

DOI:10.3390/s23104794
PMID:37430708
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10222523/
Abstract

Internet of Things cybersecurity is gaining attention as the number of devices installed in IoT environments is exponentially increasing while the number of attacks successfully addressed to these devices are also proliferating. Security concerns have, however, been mainly addressed to service availability and information integrity and confidentiality. Code integrity, on the other hand, is not receiving proper attention, mainly because of the limited resources of these devices, thus preventing the implementation of advanced protection mechanisms. This situation calls for further research on how traditional mechanisms for code integrity can be adapted to IoT devices. This work presents a mechanism for code integrity in IoT devices based on a virtual-machine approach. A proof-of-concept virtual machine is presented, specially designed for providing code integrity during firmware updates. The proposed approach has been experimentally validated in terms of resource consumption among the most-widespread micro-controller units. The obtained results demonstrate the feasibility of this robust mechanism for code integrity.

摘要

物联网的网络安全正受到越来越多的关注,因为物联网环境中安装的设备数量呈指数级增长,而针对这些设备的成功攻击数量也在不断增加。然而,安全关注点主要集中在服务可用性和信息完整性和保密性上。另一方面,代码完整性并没有得到适当的关注,主要是因为这些设备的资源有限,从而阻止了先进保护机制的实施。这种情况要求进一步研究如何将传统的代码完整性机制应用于物联网设备。这项工作提出了一种基于虚拟机方法的物联网设备代码完整性机制。提出了一种特别设计的虚拟机,用于在固件更新期间提供代码完整性。在所研究的最广泛的微控制器单元中,从资源消耗的角度对提出的方法进行了实验验证。实验结果表明,该代码完整性的健壮机制是可行的。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a03d/10222523/bf41414cbae6/sensors-23-04794-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a03d/10222523/89cd761d3d05/sensors-23-04794-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a03d/10222523/3aa8e6dd74d7/sensors-23-04794-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a03d/10222523/5060d8d882de/sensors-23-04794-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a03d/10222523/bf41414cbae6/sensors-23-04794-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a03d/10222523/89cd761d3d05/sensors-23-04794-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a03d/10222523/3aa8e6dd74d7/sensors-23-04794-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a03d/10222523/5060d8d882de/sensors-23-04794-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a03d/10222523/bf41414cbae6/sensors-23-04794-g004.jpg

相似文献

1
Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing.代码完整性和保密性:积极健康老龄化的主动数据方法。
Sensors (Basel). 2023 May 16;23(10):4794. doi: 10.3390/s23104794.
2
Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations.基于无线的物联网(IoT)中的代码注入攻击:全面综述与实际实现
Sensors (Basel). 2023 Jun 30;23(13):6067. doi: 10.3390/s23136067.
3
A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments.一种用于减轻物联网环境中干扰和窃听攻击的物理层安全协作框架。
Sensors (Basel). 2024 Aug 10;24(16):5171. doi: 10.3390/s24165171.
4
An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things.一种基于物联网哈希函数组合器的有效多因素认证机制。
Sensors (Basel). 2019 Aug 23;19(17):3663. doi: 10.3390/s19173663.
5
A review: a new authentication protocol for real-time healthcare monitoring system.综述:实时医疗监测系统的新型认证协议。
Ir J Med Sci. 2021 Aug;190(3):927-932. doi: 10.1007/s11845-020-02425-x. Epub 2020 Nov 3.
6
A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review.物联网的关键网络安全分析与未来研究方向:全面综述。
Sensors (Basel). 2023 Apr 19;23(8):4117. doi: 10.3390/s23084117.
7
Certificateless Hybrid Signcryption by a Novel Protocol Applied to Internet of Things.无证书混合签密协议在物联网中的应用
Comput Intell Neurosci. 2022 Feb 26;2022:3687332. doi: 10.1155/2022/3687332. eCollection 2022.
8
Enabling Secure Data Exchange through the IOTA Tangle for IoT Constrained Devices.通过IOTA缠结实现物联网受限设备的安全数据交换。
Sensors (Basel). 2022 Feb 11;22(4):1384. doi: 10.3390/s22041384.
9
Fractional chaotic maps based short signature scheme under human-centered IoT environments.基于分数阶混沌映射的以人为中心的物联网环境下的短签名方案。
J Adv Res. 2020 Sep 9;32:139-148. doi: 10.1016/j.jare.2020.08.015. eCollection 2021 Sep.
10
Accelerating Health Data Sharing: A Solution Based on the Internet of Things and Distributed Ledger Technologies.加速健康数据共享:基于物联网和分布式账本技术的解决方案
J Med Internet Res. 2019 Jun 6;21(6):e13583. doi: 10.2196/13583.

本文引用的文献

1
Automatic Verification and Execution of Cyber Attack on IoT Devices.物联网设备网络攻击的自动验证与执行
Sensors (Basel). 2023 Jan 9;23(2):733. doi: 10.3390/s23020733.
2
A Survey of Authentication in Internet of Things-Enabled Healthcare Systems.物联网医疗系统中的认证技术综述。
Sensors (Basel). 2022 Nov 23;22(23):9089. doi: 10.3390/s22239089.
3
Are implanted electronic devices hackable?植入式电子设备可以被黑客攻击吗?
Trends Cardiovasc Med. 2019 Nov;29(8):476-480. doi: 10.1016/j.tcm.2018.11.011. Epub 2018 Nov 22.
4
Cybersecurity for Cardiac Implantable Electronic Devices: What Should You Know?心脏植入式电子设备的网络安全:您应该了解什么?
J Am Coll Cardiol. 2018 Mar 20;71(11):1284-1288. doi: 10.1016/j.jacc.2018.01.023. Epub 2018 Feb 20.