Explore chapters and articles related to this topic
Analysis of Security Issues in IoT System
Published in Asis Kumar Tripathy, Chiranji Lal Chowdhary, Mahasweta Sarkar, Sanjaya Kumar Panda, Cognitive Computing Using Green Technologies, 2021
Likhet Kashori Sahu, Sudibyajyoti Jena, Sambit Kumar Mishra, Sonali Mishra
Booting is defined as powering up devices to make them ready for operations. The perception layer can be made safe if we employ secure booting techniques. In secure booting, the operating system of device utilizes cryptographic algorithms to ensure the integrity of devices by checking for malware and protecting against malicious code and unauthorized software updates.
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic
Published in Connection Science, 2021
Shaik Shakeel Ahamad, Al-Sakib Khan Pathan
One of the most critical attacks against MHA is repackaging attack (Chen et al., 2018) where an attacker with malicious intent alters an application distributed in the market and then redistributes it. In order to overcome the repackaging attacks on MHA from the get-go, our framework implements the following countermeasures: Self-Signing Restriction: This is a countermeasure against repackaging attacks. MHAs should be signed by both CA and CHA.Code Obfuscation: By obstructing analysis, it can prevent disclosure of logic or code (i.e. less chance of reverse engineering). SPMHF adopts logic obfuscation such as control obfuscation.Code Attestation: TPM and UICC are hardware-based platform security solutions in SPMHF. TPM ensures secure booting process from boot loader to the kernel of OS (Operating System) and loading of library modules. Platform integrity is checked remotely by privileged isolation between applications along with remote attestation. Thus, any forgery of data (exchanged between CCH and patient's application) can be detected.