Refine
Year of publication
- 2020 (23) (remove)
Document Type
- Article (19)
- Postprint (2)
- Doctoral Thesis (1)
- Other (1)
Language
- English (23) (remove)
Is part of the Bibliography
- yes (23) (remove)
Keywords
- Answer Set Programming (2)
- Fault tolerance (2)
- Internet of Things (2)
- MQTT (2)
- answer set programming (2)
- edge computing (2)
- firmware update (2)
- security (2)
- Android hybrid apps (1)
- Conformant Planning (1)
- DMR (1)
- DNA hairpin formation (1)
- Double cell upsets (DCUs) (1)
- EDC (1)
- Epistemic Logic Programs (1)
- FEDC (1)
- Fault tolerant systems (1)
- Hairpin completions (1)
- Hairpin reductions (1)
- Lindenmayer systems (1)
- Non-Monotonic (1)
- Reasoning (1)
- Semilinearity property (1)
- TMR (1)
- Triple modular redundancy (TMR) (1)
- UX (1)
- acyclicity properties (1)
- arousal (1)
- asynchrounous design (1)
- autism (1)
- bibliometric analysis (1)
- bundled data (1)
- circuit Faults (1)
- citation analysis (1)
- click controller (1)
- clocks (1)
- co-citation analysis (1)
- co-occurrence analysis (1)
- coherence relation (1)
- combinatorial optimization problems (1)
- competition (1)
- concession (1)
- concurrent checking (1)
- connective (1)
- context-free grammar (1)
- context-sensitive (1)
- contrast (1)
- corpus analysis (1)
- degree of non-context-freeness (1)
- degree of non-regularity (1)
- determinism (1)
- developmental systems (1)
- emission factor (1)
- ensemble methods (1)
- face tracking (1)
- facial expression (1)
- formal languages (1)
- gradient boosting (1)
- grammar (1)
- greenhouse gas (1)
- information flow control (1)
- latches (1)
- logic-based modeling (1)
- measure development (1)
- neural networks (1)
- on-farm evaluation (1)
- parallel rewriting (1)
- parity aggregate operator (1)
- perception (1)
- perception differences (1)
- random forest (1)
- regression (1)
- restricted parallelism (1)
- satisfiability (1)
- self-checking (1)
- soft errors (1)
- static analysis (1)
- support vector machines (1)
- timing (1)
- transient Faults (1)
- transient analysis (1)
- user experience (1)
Institute
- Institut für Informatik und Computational Science (23) (remove)
MUP
(2020)
Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires a firmware update procedure. In this paper, we propose a secure update protocol for MQTT-connected devices which ensures the freshness of the firmware, authenticates the new firmware and considers constrained devices. We show that the update protocol is easy to integrate in an MQTT-based IoT network using a semantic approach. The feasibility of our approach is demonstrated by a detailed performance analysis of our prototype implementation on a IoT device with 32 kB RAM. Thereby, we identify design issues in MQTT 5 which can help to improve the support of constrained devices.
MUP
(2020)
Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires a firmware update procedure. In this paper, we propose a secure update protocol for MQTT-connected devices which ensures the freshness of the firmware, authenticates the new firmware and considers constrained devices. We show that the update protocol is easy to integrate in an MQTT-based IoT network using a semantic approach. The feasibility of our approach is demonstrated by a detailed performance analysis of our prototype implementation on a IoT device with 32 kB RAM. Thereby, we identify design issues in MQTT 5 which can help to improve the support of constrained devices.
TrainTrap
(2020)