{"id":"https://openalex.org/W4395696423","doi":"https://doi.org/10.1007/s43926-024-00056-7","title":"A novel trusted hardware-based scalable security framework for IoT edge devices","display_name":"A novel trusted hardware-based scalable security framework for IoT edge devices","publication_year":2024,"publication_date":"2024-04-27","ids":{"openalex":"https://openalex.org/W4395696423","doi":"https://doi.org/10.1007/s43926-024-00056-7"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-024-00056-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-024-00056-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00056-7.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00056-7.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038286170","display_name":"Mohd Sajid Khan","orcid":"https://orcid.org/0000-0002-0883-5200"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohd Khan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, 13902, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, 13902, USA","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083689182","display_name":"Mohsen Hatami","orcid":"https://orcid.org/0009-0000-9124-5633"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohsen Hatami","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, 13902, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, 13902, USA","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087651642","display_name":"Wenfeng Zhao","orcid":"https://orcid.org/0000-0002-2933-750X"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenfeng Zhao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, 13902, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, 13902, USA","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100402109","display_name":"Yu Chen","orcid":"https://orcid.org/0000-0003-1880-0586"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yu Chen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, 13902, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY, 13902, USA","institution_ids":["https://openalex.org/I123946342"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5038286170"],"corresponding_institution_ids":["https://openalex.org/I123946342"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":6.9513,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.97292893,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"4","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7209012508392334},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6987547874450684},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5909687280654907},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5801137089729309},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5719641447067261},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5422857403755188},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4547530710697174},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.43424665927886963},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4222824275493622},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2624831795692444},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24294573068618774},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.11513584852218628},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10610029101371765}],"concepts":[{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7209012508392334},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6987547874450684},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5909687280654907},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5801137089729309},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5719641447067261},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5422857403755188},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4547530710697174},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.43424665927886963},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4222824275493622},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2624831795692444},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24294573068618774},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.11513584852218628},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10610029101371765}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-024-00056-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-024-00056-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00056-7.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6ddec26ba8d64437bbb48d171cfa1190","is_oa":false,"landing_page_url":"https://doaj.org/article/6ddec26ba8d64437bbb48d171cfa1190","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 4, Iss 1, Pp 1-26 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-024-00056-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-024-00056-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-024-00056-7.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4395696423.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W2030337280","https://openalex.org/W2276715143","https://openalex.org/W2605883969","https://openalex.org/W2611626082","https://openalex.org/W2613098895","https://openalex.org/W2613137163","https://openalex.org/W2706591630","https://openalex.org/W2765928069","https://openalex.org/W2768918001","https://openalex.org/W2801749867","https://openalex.org/W2808493188","https://openalex.org/W2907164519","https://openalex.org/W2917849969","https://openalex.org/W2926643494","https://openalex.org/W2938814935","https://openalex.org/W2962816341","https://openalex.org/W2963504866","https://openalex.org/W2993659480","https://openalex.org/W2995321153","https://openalex.org/W3006191871","https://openalex.org/W3019197601","https://openalex.org/W3036557299","https://openalex.org/W3044256878","https://openalex.org/W3088527522","https://openalex.org/W3094904521","https://openalex.org/W3098688077","https://openalex.org/W3125771644","https://openalex.org/W3137458555","https://openalex.org/W3181455672","https://openalex.org/W4237872687"],"related_works":["https://openalex.org/W3189674571","https://openalex.org/W4313339048","https://openalex.org/W4386004629","https://openalex.org/W3176734149","https://openalex.org/W3201779876","https://openalex.org/W3113627641","https://openalex.org/W4238142035","https://openalex.org/W2918879532","https://openalex.org/W2885461866","https://openalex.org/W2901937988"],"abstract_inverted_index":{"Abstract":[0],"The":[1,146],"Internet":[2],"of":[3,22,42,49,67,100,192],"Things":[4],"(IoT)":[5],"devices":[6,24,73,151],"are":[7,105],"pervasively":[8],"deployed":[9],"and":[10,44,61,139,190],"embedded":[11],"into":[12],"our":[13],"daily":[14],"lives.":[15],"Over":[16],"several":[17,87],"years,":[18],"the":[19,47,55,64,94,98,188],"massive":[20],"assimilation":[21],"IoT":[23,72,102,110,124,174],"has":[25,186],"given":[26],"rise":[27],"to":[28,84,143,152,165,172],"smart":[29,31,33],"cities,":[30],"factories,":[32],"farms,":[34],"etc.":[35],"While":[36],"IoTs":[37],"can":[38],"collect":[39],"immense":[40],"amounts":[41],"user":[43,158],"environmental":[45],"information,":[46],"lack":[48],"adequate":[50],"security":[51,60,99,111],"measures":[52],"is":[53,80],"among":[54],"major":[56],"concerns":[57],"about":[58],"information":[59,69],"privacy.":[62],"With":[63],"ever-increasing":[65],"presence":[66],"IoTs,":[68],"flow":[70],"between":[71],"in":[74],"a":[75,116,133],"single":[76],"or":[77,155],"multi-layered":[78],"network":[79],"becoming":[81],"increasingly":[82],"vulnerable":[83],"attacks.":[85],"Although":[86],"software-based":[88],"solutions":[89],"have":[90],"been":[91],"developed":[92],"over":[93],"years":[95],"that":[96],"improve":[97],"resource-constrained":[101],"devices,":[103],"there":[104],"limited":[106],"efforts":[107],"on":[108],"hardware-oriented":[109],"solutions.":[112],"This":[113],"paper":[114],"proposes":[115],"Trusted":[117],"HArdware-based":[118],"Scalable":[119],"Secure":[120],"Architecture":[121],"(THASSA)":[122],"for":[123,136,180],"Edge":[125],"systems.":[126],"Leveraging":[127],"standard":[128],"cryptographic":[129],"algorithms,":[130],"THASSA":[131,148,161],"provides":[132],"secure":[134,177],"mechanism":[135],"data":[137,178],"transfer":[138],"off-loads":[140],"cryptography":[141],"operations":[142],"trusted":[144,170],"hardware.":[145],"modularized":[147],"architecture":[149],"allows":[150],"be":[153,163],"added":[154],"removed":[156],"without":[157],"intervention.":[159],"Also,":[160],"could":[162],"scaled":[164],"multiple":[166,169],"subsystems":[167],"using":[168],"hardware":[171],"form":[173],"clusters":[175],"with":[176],"path(s)":[179],"mission-critical":[181],"applications.":[182],"An":[183],"experimental":[184],"study":[185],"verified":[187],"correctness":[189],"effectiveness":[191],"THASSA.":[193]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
