参考文献
[1]樊海华. 一种适用于物联网感知节点可信组网机制[J]. 信息安全研究, 2019, 5(12): 10961100[2]Ambrosin M, Conti M, Lazzeretti R, et al. Collective remote attestation at the Internet of things scale: Stateoftheart and future challenges[J]. IEEE Communications Surveys & Tutorials, 2020, 22(4): 24472461[3]Ammar M, Crispo B, Nunes I D O, et al. Delegated attestation: Scalable remote attestation of commodity CPS by blending proofs of execution with software attestation[C] Proc of the 14th ACM Conf on Security and Privacy in Wireless and Mobile Networks. New York: ACM, 2021: 3747[4]De O, Nunes I, Dessouky G, Ibrahim A, et al. Towards systematic design of collective remote attestation protocols[C] Proc of the 39th IEEE Int Conf on Distributed Computing Systems (ICDCS). Piscataway, NJ: IEEE, 2019: 11881198[5]Challener D, Yoder K, Catherman R, et al. A Practical Guide to Trusted Computing[M]. Englewood Cliffs, NJ: Prentice Hall, 2008: 98131[6]Trusted Computing Group (TCG). Summary of features under consideration for the next generation of TPM[EBOL]. [20200918]. http:www. trustedcomputinggroup.orgresourcessummary_of_features_under_consideration_for_the_next_generation_of_tpm[7]Sailer R, Zhang X, Jaeger T, et al. Design and implementation of a TCGbased integrity measurement architecture[C] Proc of the 13th USENIX Security Symp. Berkeley, CA: USENIX Association, 2004: 223238 [8]王群, 李馥娟. 可信计算技术及其进展研究[J]. 信息安全研究, 2016, 2(9): 834844[9]Jaeger T,Sailer R, Shankar U. Prima: Policyreduced integrity measurement architecture[C] Proc of ACM Symp on Access Control Models and Technologies. New York: ACM, 2006: 1928[10]Seshadri A, Luk M, Perrig A, et al. SCUBA: Secure code update by attestation in sensor networks[C] Proc of the 2006 ACM Workshop on Wireless Security. New York: ACM, 2006: 8594[11]Seshadri A, Luk M, Perrig A. SAKE: Software attestation for key establishment in sensor networks[C] Proc of the 4th IEEE Int Conf. Piscataway, NJ: IEEE, 2011: 10591067[12]Zhang D, Liu D. DataGuard: Dynamic data attestation in wireless sensor networks[C] Proc of the IEEEIFIP Int Conf on Dependable Systems & Networks. Piscataway, NJ: IEEE, 2010: 261270[13]Haldar V, Chandra D, Franz M. Semantic remote attestation—A virtual machine directed approach to trusted computing[C] Proc of the 3rd Conf on Virtual Machine Research and Technology Symp. Berkeley, CA: USENIX Association, 2004: 2941[14]Nair S K. Remote policy enforcement using java virtual machine[D]. Amsterdam: Vrije University Amsterdam, 2010[15]Carpent X, Rattanavipanon N, Tsudik G. Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware[C] Proc of the 2018 IEEE Int Symp on Hardware Oriented Security and Trust (HOST). Piscataway, NJ: IEEE, 2018: 916[16]Castro M, Liskov B. Practical byzantine fault tolerance[J]. ACM Trans on Computer Systems, 2002, 20(1): 398461[17]Dushku E, Rabbani M M, Conti M, et al. SARA: Secure asynchronous remote attestation for IoT systems[JOL]. IEEE Trans on Information Forensics and Security, 2020 [20211210]. https:ieeexplore.ieee.orgdocument9046860[18]Kuang B, Fu A, Yu S, et al. ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms[J]. Internet of Things Journal, 2019, 6(5): 83728383[19]Fu A, Kuang B, Zhou L, et al. DORA: DataOriented runtime attestation for IoT devices[J]. Computers & Security, 2020, 97(1): 101945[20]Ibrahim A,Sadeghi A R, Tsudik G. USAID: Unattended scalable attestation of IoT devices[C] Proc of the 37th IEEE Symp on Reliable Distributed Systems (SRDS). Piscataway, NJ: IEEE, 2018: 2130
|