Change search
Link to record
Permanent link

Direct link
Publications (10 of 28) Show all publications
Höglund, R., Tiloca, M., Selander, G., Mattsson, J. P., Vucinic, M. & Watteyne, T. (2024). Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols. IEEE Access, 12, 49865
Open this publication in new window or tab >>Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols
Show others...
2024 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 12, p. 49865-Article in journal (Refereed) Published
Abstract [en]

Communication security of an Internet-of-Things (IoT) product depends on the variety of protocols employed throughout its lifetime. The underlying low-power radio communication technologies impose constraints on maximum transmission units and data rates. Surpassing maximum transmission unit thresholds has an important effect on the efficiency of the solution: transmitting multiple fragments over low-power IoT radio technologies is often prohibitively expensive. Furthermore, IoT communication paradigms such as one-to-many require novel solutions to support the applications executing on constrained devices. Over the last decade, the Internet Engineering Task Force (IETF) has been working through its various Working Groups on defining lightweight protocols for Internet-of-Things use cases. “Lightweight” refers to the minimal processing overhead, memory footprint and number of bytes in the air, compared to the protocol counterparts used for non-constrained devices in the Internet. This article overviews the standardization efforts in the IETF on lightweight communication security protocols. It introduces EDHOC, a key exchange protocol, OSCORE and Group OSCORE, application data protection protocols adapted for securing IoT applications. The article additionally highlights the design considerations taken into account during the design of these protocols, an aspect not present in the standards documents. Finally, we present an evaluation of these protocols in terms of the message sizes and compare with the non-constrained counterpart, the (D)TLS protocol. We demonstrate that the novel key exchange protocol EDHOC achieves ×5 reduction over DTLS 1.3 authenticated with pre-shared keys in terms of total number of bytes transmitted over the air, while keeping the benefits of authentication with asymmetric credentials.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2024
Keywords
Authentication; Internet of things; Internet protocols; Network security; Radio communication; Radio transmission; Secure communication; Signal encoding; CoAP; Communication system security; Communications security; EDHOC; Encodings; Internet engineering task forces; OSCORE; Protection; Security; Standardization
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-73052 (URN)10.1109/ACCESS.2024.3384095 (DOI)2-s2.0-85189629993 (Scopus ID)
Available from: 2024-04-17 Created: 2024-04-17 Last updated: 2024-05-27Bibliographically approved
Rasori, M., Saracino, A., Mori, P. & Tiloca, M. (2024). Using the ACE framework to enforce access and usage control with notifications of revoked access rights. International Journal of Information Security
Open this publication in new window or tab >>Using the ACE framework to enforce access and usage control with notifications of revoked access rights
2024 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270Article in journal (Refereed) Epub ahead of print
Abstract [en]

The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is intended for use in Internet-of-Things environments. In particular, ACE relies on OAuth 2.0, CoAP, CBOR, and COSE as its core building blocks. In ACE, a non-constrained entity called Authorization Server issues Access Tokens to Clients according to some access control and policy evaluation mechanism. An Access Token is then consumed by a Resource Server, which verifies the Access Token and lets the Client accordingly access a protected resource it hosts. Access Tokens have a validity which is limited over time, but they can also be revoked by the Authorization Server before they expire. In this work, we propose the Usage Control framework as an underlying access control means for the ACE Authorization Server, and we assess its performance in terms of time required to issue and revoke Access Tokens. Moreover, we implement and evaluate a method relying on the Observe extension for CoAP, which allows to notify Clients and Resource Servers about revoked Access Tokens. Through results obtained in a real testbed, we show how this method reduces the duration of illegitimate access to protected resources following the revocation of an Access Token, as well as the time spent by Clients and Resource Servers to learn about their Access Tokens being revoked. 

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2024
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-74636 (URN)10.1007/s10207-024-00877-1 (DOI)2-s2.0-85197676884 (Scopus ID)
Note

This work has been partially supported by: the Sweden’sInnovation Agency VINNOVA within the EUREKA CELTIC-NEXTproject CYPRESS; the H2020 project SIFIS-Home (grant agreement952652); and the SSF project SEC4Factory (grant RIT17-0032).

Available from: 2024-08-07 Created: 2024-08-07 Last updated: 2024-08-07Bibliographically approved
Höglund, R., Tiloca, M., Bouget, S. & Raza, S. (2023). Key Update for the IoT Security Standard OSCORE. In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR): . Paper presented at 2023 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE
Open this publication in new window or tab >>Key Update for the IoT Security Standard OSCORE
2023 (English)In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), IEEE , 2023Conference paper, Published paper (Refereed)
Abstract [en]

The standard Constrained Application Protocol (CoAP) is a lightweight, web-transfer protocol based on the REST paradigm and specifically suitable for constrained devices and the Internet-of-Things. Object Security for Constrained RESTful Environment (OSCORE) is a standard, lightweight security protocol that provides end-to-end protection of CoAP messages. A number of methods exist for managing keying material for OSCORE, as to its establishment and update. This paper provides a detailed comparison of such methods, in terms of their features, limitations and security properties. Also, it especially considers the new key update protocol KUDOS, for which it provides a more extended discussion about its features and mechanics, as well as a formal verification of its security properties.

Place, publisher, year, edition, pages
IEEE, 2023
National Category
Communication Systems
Identifiers
urn:nbn:se:ri:diva-67071 (URN)10.1109/csr57506.2023.10225002 (DOI)
Conference
2023 IEEE International Conference on Cyber Security and Resilience (CSR)
Note

This work was partly supported by the H2020 projectSIFIS-Home (Grant agreement 952652), the SSF projectSEC4Factory (Grant agreement RIT17-0032), and the H2020project ARCADIAN-IoT (Grant agreement 101020259).

Available from: 2023-09-21 Created: 2023-09-21 Last updated: 2023-09-21Bibliographically approved
Seitz, L., Tiloca, M., Gunnarsson, M. & Höglund, R. (2023). Secure Software Updates for IoT Based on Industry Requirements. In: Proceedings of the 9th International Conference on Information Systems Security and Privacy: . Paper presented at 9th International Conference on Information Systems Security and Privacy (pp. 698-705). SCITEPRESS - Science and Technology Publications
Open this publication in new window or tab >>Secure Software Updates for IoT Based on Industry Requirements
2023 (English)In: Proceedings of the 9th International Conference on Information Systems Security and Privacy, SCITEPRESS - Science and Technology Publications , 2023, p. 698-705Conference paper, Published paper (Refereed)
Abstract [en]

This paper analyzes the problem and requirements of securely distributing software updates over the Internet, to devices in an Industrial Control System (ICS) and more generally in Internet of Things (IoT) infrastructures controlling a physical system, such as power grids and water supply systems. We present a novel approach that allows to securely distribute software updates of different types, e.g., device firmware and customer applications, and from sources of different type, e.g., device operators, device manufacturers and third-party library providers. Unlike previous works on this topic, our approach keeps the device operator in control of the update process, while ensuring both authenticity and confidentiality of the distributed software updates.

Place, publisher, year, edition, pages
SCITEPRESS - Science and Technology Publications, 2023
National Category
Software Engineering
Identifiers
urn:nbn:se:ri:diva-67036 (URN)10.5220/0011790100003405 (DOI)978-989-758-624-8 (ISBN)
Conference
9th International Conference on Information Systems Security and Privacy
Available from: 2023-09-21 Created: 2023-09-21 Last updated: 2023-09-21Bibliographically approved
Gunnarsson, M., Malarski, K., Höglund, R. & Tiloca, M. (2022). Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things. ACM Transactions on Internet of Things, 3(3), Article ID 3523064.
Open this publication in new window or tab >>Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things
2022 (English)In: ACM Transactions on Internet of Things, ISSN 2577-6207, Vol. 3, no 3, article id 3523064Article in journal (Refereed) Published
Abstract [en]

The Constrained Application Protocol (CoAP) is a major application-layer protocol for the Internet of Things (IoT). The recently standardized security protocol Object Security for Constrained RESTful Environments (OSCORE) efficiently provides end-to-end security of CoAP messages at the application layer, also in the presence of untrusted intermediaries. At the same time, CoAP supports one-to-many communication, targeting use cases such as smart lighting and building automation, firmware update, or emergency broadcast. Securing group communication for CoAP has additional challenges. It can be done using the novel Group Object Security for Constrained RESTful Environments (Group OSCORE) security protocol, which fulfills the same security requirements of OSCORE in group communication environments. While evaluations of OSCORE are available, no studies exist on the performance of Group OSCORE on resource-constrained IoT devices.This article presents the results of our extensive performance evaluation of Group OSCORE over two popular constrained IoT platforms, namely Zolertia Zoul and TI Simplelink. We have implemented Group OSCORE for the Contiki-NG operating system and made our implementation available as open source software. We compared Group OSCORE against unprotected CoAP as well as OSCORE. To the best of our knowledge, this is the first comprehensive and experimental evaluation of Group OSCORE over real constrained IoT devices. © 2022 Copyright held by the owner/author(s).

Place, publisher, year, edition, pages
Association for Computing Machinery, 2022
Keywords
Contiki-NG, End-to-end security, group communication, Group OSCORE, Internet of Things, Firmware, Intelligent buildings, Internet protocols, Open source software, Open systems, Application layer protocols, Application protocols, Contiki, Group communications, Group object security for constrained RESTful environment, Performances evaluation, Secure group communications, Security protocols
National Category
Computer Engineering
Identifiers
urn:nbn:se:ri:diva-59900 (URN)10.1145/3523064 (DOI)2-s2.0-85134881343 (Scopus ID)
Note

Funding details: 952652; Funding details: Horizon 2020 Framework Programme, H2020; Funding details: Innovationsfonden, IFD, HI2OT; Funding details: Stiftelsen för Strategisk Forskning, SSF, RIT17-0032; Funding details: VINNOVA; Funding text 1: Martin Gunnarsson and Krzysztof Mateusz Malarski contributed equally to this research. This work was partially funded by Innovation Fund Denmark through Eureka Turbo project IoT Watch4Life and Nordic University Hub for Industrial IoT (HI2OT); the SSF project SEC4Factory under the grant RIT17-0032; VINNOVA through the Celtic-Next project CRITISEC; and the H2020 project SIFIS-Home (Grant agreement 952652). Authors’ addresses: M. Gunnarsson, RISE Cybersecurity - RISE Research Institutes of Sweden, Scheelevägen 17, Lund, Sweden; email: martin.gunnarsson@ri.se; K. M. Malarski, DTU Technical University of Denmark, Ørsteds Plads 343, Kongens Lyngby, Denmark, 2800; email: krmal@fotonik.dtu.dk; R. Höglund, RISE Cybersecurity - RISE Research Institutes of Sweden, Isafjordsgatan 22, Kista, Sweden, Department of Information Technology - Uppsala University; email: rikard.hoglund@ri.se; M. Tiloca, RISE Cybersecurity - RISE Research Institutes of Sweden, Isafjordsgatan 22, Kista, Sweden email: marco.tiloca@ri.se.

Available from: 2022-08-11 Created: 2022-08-11 Last updated: 2023-06-07Bibliographically approved
Righetti, F., Vallati, C., Tiloca, M. & Anastasi, G. (2022). Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation. Computer Communications, 194, 411-432
Open this publication in new window or tab >>Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation
2022 (English)In: Computer Communications, ISSN 0140-3664, E-ISSN 1873-703X, Vol. 194, p. 411-432Article in journal (Refereed) Published
Abstract [en]

The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with stringent reliability and timeliness requirements. In this context, communication security is another crucial requirement, which is currently less investigated in the literature. In this article, we present a deep assessment of the security vulnerabilities of 6P, the protocol used for resource negotiation at the core of the 6TiSCH architecture. Specifically, we highlight two possible attacks against 6P, namely the Traffic Dispersion and the Overloading attacks. These two attacks effectively and stealthy alter the communication schedule of victim nodes and severely thwart network basic functionalities and efficiency, by specifically impacting network availability and energy consumption of victim nodes. To assess the impact of the attacks two analytical models have been defined, while, to demonstrate their feasibility, they have been implemented in Contiki-NG. The implementation has been used to quantitatively evaluate the impact of the two attacks by both simulations and measurements in a real testbed. Our results show that the impact of both attacks may be very significant. The impact, however, strongly depends on the position of the victim node(s) in the network and it is highly influenced by the dynamics of the routing protocol. We have investigated mitigation strategies to alleviate this impact and proposed an extended version of the Minimal Scheduling Function (MSF), i.e., the reference scheduling algorithm for 6TiSCH. This allows network nodes to early detect anomalies in their schedules possibly due to an Overloading attack, and thus curb the attack impact by appropriately revising their schedule. 

Place, publisher, year, edition, pages
Elsevier B.V., 2022
Keywords
6P, 6P vulnerabilities, 6TiSCH, Availability, Industrial Internet of Things, MSF, Security, Energy utilization, Internet protocols, Network architecture, Network security, Power management (telecommunication), Scheduling algorithms, 6p vulnerability, Impact analysis, Impact mitigation, Industrial internet of thing, Minimal scheduling function, Scheduling functions, Standard solutions, Internet of things
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-60173 (URN)10.1016/j.comcom.2022.07.054 (DOI)2-s2.0-85136202483 (Scopus ID)
Note

 Funding details: 952652; Funding details: RIT17-0032; Funding details: Horizon 2020 Framework Programme, H2020; Funding details: VINNOVA; Funding details: Ministero dell’Istruzione, dell’Università e della Ricerca, MIUR; Funding text 1: The authors sincerely thank the anonymous reviewers and the Associate Editor for their insightful comments and suggestions, that have helped to improve the technical and editorial quality of the manuscript. The authors would also like to thank Gioele Carignani for his invaluable help in the implementation of the attacks on the Contiki-NG OS. This work was partially supported by the Italian Ministry of Education and Research (MIUR) in the framework of the CrossLab project (Departments of Excellence); by VINNOVA and the CelticNext project CRITISEC; by the H2020 project SIFIS-Home (Grant agreement 952652 ); and by the SSF project SEC4Factory (grant RIT17-0032 ).

Available from: 2022-09-29 Created: 2022-09-29 Last updated: 2023-05-25Bibliographically approved
Righetti, F., Vallati, C., Tiloca, M. & Anastasi, G. (2022). Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation. Computer Communications, 194, 411-432
Open this publication in new window or tab >>Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation
2022 (English)In: Computer Communications, ISSN 0140-3664, E-ISSN 1873-703X, Computer Communications, Vol. 194, p. 411-432Article in journal (Refereed) Published
Abstract [en]

The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with stringent reliability and timeliness requirements. In this context, communication security is another crucial requirement, which is currently less investigated in the literature. In this article, we present a deep assessment of the security vulnerabilities of 6P, the protocol used for resource negotiation at the core of the 6TiSCH architecture. Specifically, we highlight two possible attacks against 6P, namely the Traffic Dispersion and the Overloading attacks. These two attacks effectively and stealthy alter the communication schedule of victim nodes and severely thwart network basic functionalities and efficiency, by specifically impacting network availability and energy consumption of victim nodes. To assess the impact of the attacks two analytical models have been defined, while, to demonstrate their feasibility, they have been implemented in Contiki-NG. The implementation has been used to quantitatively evaluate the impact of the two attacks by both simulations and measurements in a real testbed. Our results show that the impact of both attacks may be very significant. The impact, however, strongly depends on the position of the victim node(s) in the network and it is highly influenced by the dynamics of the routing protocol. We have investigated mitigation strategies to alleviate this impact and proposed an extended version of the Minimal Scheduling Function (MSF), i.e., the reference scheduling algorithm for 6TiSCH. This allows network nodes to early detect anomalies in their schedules possibly due to an Overloading attack, and thus curb the attack impact by appropriately revising their schedule.

Keywords
Industrial Internet of Things, Security, 6TiSCH, 6P, MSF, 6P Vulnerabilities, Availability
National Category
Communication Systems Computer Systems Embedded Systems
Identifiers
urn:nbn:se:ri:diva-60318 (URN)10.1016/j.comcom.2022.07.054 (DOI)
Available from: 2022-10-11 Created: 2022-10-11 Last updated: 2023-05-25Bibliographically approved
Gunnarsson, M., Brorsson, J., Palombini, F., Seitz, L. & Tiloca, M. (2021). Evaluating the performance of the OSCORE security protocol in constrained IoT environments. Internet of Things: Engineering Cyber Physical Human Systems, 13, Article ID 100333.
Open this publication in new window or tab >>Evaluating the performance of the OSCORE security protocol in constrained IoT environments
Show others...
2021 (English)In: Internet of Things: Engineering Cyber Physical Human Systems, E-ISSN 2542-6605, Vol. 13, article id 100333Article in journal (Refereed) Published
Abstract [en]

The Constrained Application Protocol (CoAP) is a standard communication protocol for resource-constrained devices in the Internet of Things (IoT). Many IoT deployments require proxies to support asynchronous communication between edge devices and the back-end. This allows (non-trusted) proxies to access sensitive parts of CoAP messages. Object Security for Constrained RESTful Environments (OSCORE) is a recent standard protocol that provides end-to-end security for CoAP messages at the application layer. Unlike the commonly used standard Datagram Transport Layer Security (DTLS), OSCORE efficiently provides selective integrity protection and encryption on different parts of CoAP messages. Thus, OSCORE enables end-to-end security through intermediary (non-trusted) proxies, while still allowing them to perform their expected services, with considerable security and privacy improvements.

To assess whether these security features consume too much of the limited resources available on a constrained device, we have implemented OSCORE (the implementation is available as open-source), and evaluated its efficiency. This paper provides a comprehensive, comparative and experimental performance evaluation of OSCORE on real resource-constrained IoT devices, using the operating system Contiki-NG as IoT software platform. In particular, we experimentally evaluated the efficiency of our OSCORE implementation on resource-constrained devices running Contiki-NG, in comparison with the DTLS implementation TinyDTLS maintained by the Eclipse Foundation. The evaluation results show that our OSCORE implementation displays moderately better performance than TinyDTLS, in terms of per-message network overhead, memory usage, message round-trip time and energy efficiency, thus providing the security improvements of OSCORE with no additional performance penalty.

Keywords
Security, OSCORE, CoAP, Internet of things, Constrained devices, End-to-end security
National Category
Communication Systems Computer Systems Embedded Systems
Identifiers
urn:nbn:se:ri:diva-52779 (URN)10.1016/j.iot.2020.100333 (DOI)
Projects
EU FP7 SEGRID (Grant agreement 607109)EIT-Digital High Impact Initiative ACTIVEVINNOVA/Celtic-Plus CyberWIVINNOVA/Celtic-Next CRITISECEU H2020 SIFIS-Home (Grant agreement 952652)SSF SEC4Factory (Grant agreement RIT17-0032)Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation
Available from: 2021-04-02 Created: 2021-04-02 Last updated: 2023-05-25Bibliographically approved
Paladi, N., Tiloca, M., Nikbakht Bideh, P. & Hell, M. (2021). Flowrider: Fast On-Demand Key Provisioning for Cloud Networks. In: International Conference on Security and Privacy in Communication SystemsSecureComm 2021: Security and Privacy in Communication Networks pp 207-228: . Paper presented at International Conference on Security and Privacy in Communication SystemsSecureComm 2021. 6 September 2021 through 9 September 2021 (pp. 207-228). Springer Science and Business Media Deutschland GmbH
Open this publication in new window or tab >>Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
2021 (English)In: International Conference on Security and Privacy in Communication SystemsSecureComm 2021: Security and Privacy in Communication Networks pp 207-228, Springer Science and Business Media Deutschland GmbH , 2021, p. 207-228Conference paper, Published paper (Refereed)
Abstract [en]

Increasingly fine-grained cloud billing creates incentives to review the software execution footprint in virtual environments. For example, virtual execution environments move towards lower overhead: from virtual machines to containers, unikernels, and serverless cloud computing. However, the execution footprint of security components in virtualized environments has either remained the same or even increased. We present Flowrider, a novel key provisioning mechanism for cloud networks that unlocks scalable use of symmetric keys and significantly reduces the related computational load on network endpoints. We describe the application of Flowrider to common transport security protocols, the results of its formal verification, and its prototype implementation. Our evaluation shows that Florwider uses up to an order of magnitude less CPU to establish a TLS session while preventing by construction some known attacks.

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2021
Keywords
Cloud security, Key management, Network security, Secure communication, Software defined networking, Cloud computing, Cloud data security, Virtual reality, Cloud networks, Cloud securities, Fine grained, Key-management, Low overhead, Networks security, On demands, Software execution, Software-defined networkings, Virtual execution environments
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-57358 (URN)10.1007/978-3-030-90022-9_11 (DOI)2-s2.0-85120078340 (Scopus ID)9783030900212 (ISBN)
Conference
International Conference on Security and Privacy in Communication SystemsSecureComm 2021. 6 September 2021 through 9 September 2021
Note

Funding details: 952652; Funding details: Horizon 2020 Framework Programme, H2020; Funding details: Stiftelsen för Strategisk Forskning, SSF, RIT17-0035; Funding details: VINNOVA; Funding text 1: Acknowledgments. This work was financially supported in part by the Swedish Foundation for Strategic Research, with the grant RIT17-0035; by the H2020 project SIFIS-Home (Grant agreement 952652); VINNOVA and the CelticNext project CRI-TISEC and by the Wallenberg AI, Autonomous Systems and Software Program (WASP).

Available from: 2021-12-29 Created: 2021-12-29 Last updated: 2023-05-25Bibliographically approved
Paladi, N., Tiloca, M., Bideh, P. & Hell, M. (2021). On-demand Key Distribution for Cloud Networks. In: 2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops, ICIN 2021: . Paper presented at 24th Conference on Innovation in Clouds, Internet and Networks and Workshops, ICIN 2021, 1 March 2021 through 4 March 2021 (pp. 80-82). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>On-demand Key Distribution for Cloud Networks
2021 (English)In: 2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops, ICIN 2021, Institute of Electrical and Electronics Engineers Inc. , 2021, p. 80-82Conference paper, Published paper (Refereed)
Abstract [en]

Emerging fine-grained cloud resource billing creates incentives to review the software execution footprint in virtual environments. Operators can use novel virtual execution environments with ever lower overhead: from virtual machines to containers, to unikernels and serverless functions. However, the execution footprint of security mechanisms in virtualized deployments has either remained the same or even increased. In this demo, we present a novel key provisioning mechanism for cloud networks that unlocks scalable use of symmetric keys and significantly reduces the related computational load on network endpoints

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2021
Keywords
Computer networks, Information systems, Cloud networks, Computational loads, Fine grained, Key distribution, Security mechanism, Software execution, Symmetric keys, Virtual execution environments, Network security
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-53021 (URN)10.1109/ICIN51074.2021.9385528 (DOI)2-s2.0-85104189111 (Scopus ID)9781728177052 (ISBN)
Conference
24th Conference on Innovation in Clouds, Internet and Networks and Workshops, ICIN 2021, 1 March 2021 through 4 March 2021
Note

Funding details: 826093, 952652; Funding details: Horizon 2020 Framework Programme, H2020; Funding details: Stiftelsen för Strategisk Forskning, SSF, RTT17-0035; Funding details: VINNOVA; Funding text 1: This work was supported in part by the Swedish Foundation for Strategic Research, grant RTT17-0035; by VINNOVA and the Celtic-Next project C.RITISEC; by the H2020 projects SIFIS-Homc and ASC.LEPIOS (Grant agreements 952652 and 826093); and by the Wallenberg AI, Autonomous Systems and Software Program (WASP)

Available from: 2021-05-25 Created: 2021-05-25 Last updated: 2023-05-25Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-8842-9810

Search in DiVA

Show all publications