From: Efficient adaptive framework for securing the Internet of Things devices
Reference | O1 | E2 | A3 | H4 | Remarks |
---|---|---|---|---|---|
[8], 2014 | Identification of possible threats to wearable devices | Discussion without proposing any solution | |||
[9], 2011 | Mitigating passive attacks like eavesdropping and active attacks like control of wearable devices | ✓ | Rolling cryptographic protocol is used | ||
[10], 2008 | Alleviating software attacks on wearable devices | Zero power mitigation is used | |||
[13], 2017 | Highlighting security issues in architecture elements of IoTs | Discussion on possible architectural threats without any solutions | |||
[15], 2013 | Identification of security challenges to embedded platforms | Discussion without providing any solutions | |||
[16], 2016 | To reduce the susceptibility of a circuit layout to hardware trojan insertion | Vulnerability analysis of hardware circuit layout is carried out | |||
[17], 2016 | To cope with the information leakage in wearable devices | Identified the reasons for physiological information leakage and suggested countermeasures such as signal strength reduction, information reduction and noise addition | |||
[18], 2013 | To reduce the effect of DoS attacks | Proposed modification in network routing protocol by Parno et al [19] | |||
[20], 2013 | To increase the trojan detection sensitivity in ICs | ✓ | ✓ | Use thermal and power maps for trojan detection | |
[21], 2004 | To provide secured authentication for RFID systems | ✓ | ✓ | Used AES algorithm as a cryptographic primitive | |
[22], 2017 | Efficient implementation of AES for embedded devices | ✓ | ✓ | Comparison of different AES implementation techniques for embedded devices | |
This work, 2018 | Efficient resource and area throughput based encryption scheme selection for heterogeneous IoT devices | ✓ | ✓ | ✓ | Used matching algorithm to find the encryption scheme |