Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 9
Page No. 2371 - 2376

Proposed System Architecture for Integrity Verification of Embedded Systems

Authors : Abdo Ali A. Al-Wosabi and Zarina Shukur

References

Alcaraz, C., J. Lopez, R. Roman and H.H. Chen, 2012. Selecting key management schemes for WSN applications. Comput. Secur., 31: 956-956.
Direct Link  |  

Basile, C., D.S. Carlo and A. Scionti, 2012. FPGA-based remote-code integrity verification of programs in distributed embedded systems. IEEE. Trans. Syst. Man Cybern. C. Appl. Rev., 42: 187-200.
CrossRef  |  Direct Link  |  

Garcia, F.D. and B. Jacobs, 2010. Privacy-Friendly Energy-Metering Via Homomorphic Encryption. In: Security and Trust Management, Cuellar, J., L. Javier, B. Gilles and P. Alexander (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-22443-0, pp: 226-238.

Gelbart, O., E. Leontie, B. Narahari and R. Simha, 2009. A compiler-hardware approach to software protection for embedded systems. Comput, Electr. Eng., 35: 315-328.
Direct Link  |  

Ibrahim, M.A., Z. Shukur, N. Zainal and A.A.A. Wosabi, 2015. Software manipulative techniques of protection and detection. ARPN. J. Eng. Appl. Sci., 10: 17953-17961.
Direct Link  |  

Kumari, P., F. Kelbert and A. Pretschner, 2011. Data protection in heterogeneous distributed systems: A smart meter example. Karlsruhe Institute of Technology, Karlsruhe, Germany.

Lowe, G., 1997. Casper: A compiler for the analysis of security protocols. Proceedings of 10th IEEE Computer Security Foundations Workshop, June 10-12, IEEE, Los Alamitos, CA., United States, pp: 18-30.

Mao, S. and T. Wolf, 2010. Hardware support for secure processing in embedded systems. IEEE Trans. Comput., 59: 847-854.
CrossRef  |  

Nimgaonkar, S., M. Gomathisankaran and S.P. Mohanty, 2013. MEM-DnP a novel energy efficient approach for memory integrity detection and protection in embedded systems. Circuits Syst. Signal Process., 32: 2581-2604.
CrossRef  |  Direct Link  |  

Nimgaonkar, S., M. Gomathisankaran and S.P. Mohanty, 2013. TSV: A novel energy efficient memory integrity verification scheme for embedded systems. J. Syst. Archit., 59: 400-411.
Direct Link  |  

Rogers, A. and A. Milenkovic, 2009. Security extensions for integrity and confidentiality in embedded processors. Microprocess. Microsyst., 33: 398-414.
Direct Link  |  

Ryan, P. and S.A. Schneider, 2001. The Modelling and Analysis of Security Protocols: The Csp Approach. Addison-Wesley, Boston, USA., ISBN:0-201-674718, Pages: 299.

Shaikh, R. and S. Devane, 2010. Formal verification of payment protocol using AVISPA. Int. J. Inf., 3: 326-337.

Shukur, Z., N. Alias, M.H.M. Halip and B. Idrus, 2006. Formal specification and validation of selective acknowledgement protocol using Z/EVES theorem prover. J. Applied Sci., 6: 1712-1719.
CrossRef  |  Direct Link  |  

Subashini, S. and V. Kavitha, 2012. An adaptive security framework delivered as a service for cloud environment. J. Eng. Appl. Sci., 7: 468-482.
Direct Link  |  

Sullabi, M.A. and Z. Shukur, 2008. SNL2Z: Tool for translating an informal structured software specification into formal specification. Am. J. Applied Sci., 5: 378-384.
CrossRef  |  Direct Link  |  

Wosabi, A.A.A.A. and Z. Shukur, 2015. Software tampering detection in embedded systems a systematic literature review. J. Theor. Appl. Inf. Technol., 76: 211-216.
Direct Link  |  

Wosabi, A.A.A.A., Z. Shukur and M.A. Ibrahim, 2015. Framework for software tampering detection in embedded systems. Proceeding of the 2015 International Conference on Electrical Engineering and Informatics, August 10-11, 2015, IEEE, Sepang District, Malaysia, ISBN:978-1-4673-7319-7, pp: 259-264.

Zimmer, C., B. Bhat, F. Mueller and S. Mohan, 2010. Time-based intrusion detection in cyber-physical systems. Proceedings of the 1st ACM IEEE International Conference on Cyber-Physical Systems, April 13-15, 2010, ACM, New York, USA., ISBN:978-1-4503-0066-7, pp: 109-118.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved