期刊首页 优先出版 当期阅读 过刊浏览 作者中心 关于期刊 English

《工程(英文)》 >> 2016年 第2卷 第1期 doi: 10.1016/J.ENG.2016.01.014

设计不安全:当今物联网设备的安全问题

Research Director, Secure Digital Systems at the Center for Secure Information Technologies (CSIT), Queen’s University Belfast

修回日期: 发布日期: 2016-03-30

下一篇 上一篇

图片

图1

图2

参考文献

[ 1 ] Rivera J, Van der Meulen R. Gartner says 4.9 billion connected “things” will be in use in 2015 [Internet]. 2014Nov11 [cited 2016Feb20]. Available from: http://www.gartner.com/newsroom/id/2905717.

[ 2 ] Cisco. Internet of things (IoT) [Internet]. [cited 2015Jul23]. Available from: http://www.cisco.com/web/solutions/trends/iot/portfolio.html.

[ 3 ] Chapman A. Hacking into internet connected light bulbs [Internet]. 2014Jul4[cited 2015Sep15]. Available from: http://contextis.com/resources/blog/hacking-internet-connected-light-bulbs.

[ 4 ] Greenberg A. Hackers remotely kill a jeep on the highway−with me in it [Internet]. Wired2015Jul21 [cited 2015Sep15]. Available from: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/.

[ 5 ] Oswald D, Paar C. Breaking Mifare DESFire MF3ICD40: power analysis and templates in the real world. In: Preneel B, Takagi T, editors Cryptographic Hardware and Embedded Dystems−CHES 2011: 13th International Workshop; 2011Sep28−Oct1; Nara, Japan. Berlin: Springer; 2011. p. 207−22.

[ 6 ] Eisenbarth T, Kasper T, Moradi A, Paar C, Salmasizadeh M, Shalmani MTM. On the power of power analysis in the real world: a complete break of the KeeLoq code hopping scheme. In: Wagner D, editor Advances in Cryptology−CRYPTO 2008: 28th Annual International Cryptology Conference; 2008Aug17−21; Santa Barbara, CA, USA. Berlin: Springer; 2008. p. 203−20.

[ 7 ] Moradi A, Kasper M, Paar C. Black-box side-channel attacks highlight the importance of countermeasures−an analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism. In: Dunkelman O, editor Topics in Cryptology−CT-RSA 2012: The Cryptographers’ Track at the RSA Conference 2012; 2012Feb27−Mar2; San Francisco, CA, USA. Berlin: Springer; 2012. p. 1−18.

[ 8 ] National Security Agency. Suite B Cryptography today [Internet]. 2015Aug19 [cited 2015Sep15]. Available from: https://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml.

[ 9 ] SAFEcrypto. About SAFEcrypto [Internet]. [cited 2015Sep15]. Available from: www.safecrypto.eu.

[10] Gu C, O’Neill M. Ultra-compact and robust FPGA-based PUF identification generator. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS’15); 2015May24−27; Lisbon, Portugal; 2015. p. 934−7.

相关研究