Cleber S. Peter, Thayná Oliveira, Eduardo M. Monks, Fernanda P. Motta, J. Barbosa, A. Yamin
{"title":"iOTA: An Approach to Secure Over-The-Air Updates on the Internet of Things Scenario","authors":"Cleber S. Peter, Thayná Oliveira, Eduardo M. Monks, Fernanda P. Motta, J. Barbosa, A. Yamin","doi":"10.1145/3470482.3479630","DOIUrl":null,"url":null,"abstract":"The IoT's widely distributed nature has promoted demands for Over-The-Air (OTA) upgrading of embedded systems. This paper presents the conception of a new approach, called iOTA, which meets the security requirements of the SUIT specification of the Internet Engineering Task Force (IETF). The partial evaluation of the proposal points to the continuation of the research and showed that iOTA stands out in terms of security in relation to the other approaches proposed by the literature, offering protection against attacks to which a remote update of an embedded system is usually exposed.","PeriodicalId":350776,"journal":{"name":"Proceedings of the Brazilian Symposium on Multimedia and the Web","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Brazilian Symposium on Multimedia and the Web","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3470482.3479630","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The IoT's widely distributed nature has promoted demands for Over-The-Air (OTA) upgrading of embedded systems. This paper presents the conception of a new approach, called iOTA, which meets the security requirements of the SUIT specification of the Internet Engineering Task Force (IETF). The partial evaluation of the proposal points to the continuation of the research and showed that iOTA stands out in terms of security in relation to the other approaches proposed by the literature, offering protection against attacks to which a remote update of an embedded system is usually exposed.