{"id":"https://openalex.org/W2276715143","doi":"https://doi.org/10.1109/iecon.2015.7392493","title":"Hardware-security technologies for industrial IoT: TrustZone and security controller","display_name":"Hardware-security technologies for industrial IoT: TrustZone and security controller","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2276715143","doi":"https://doi.org/10.1109/iecon.2015.7392493","mag":"2276715143"},"language":"en","primary_location":{"id":"doi:10.1109/iecon.2015.7392493","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iecon.2015.7392493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IECON 2015 - 41st Annual Conference of the IEEE Industrial Electronics Society","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072908528","display_name":"Christian Lesjak","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131793","display_name":"Infineon Technologies (Austria)","ror":"https://ror.org/03msng824","country_code":"AT","type":"company","lineage":["https://openalex.org/I137594350","https://openalex.org/I4210131793"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Christian Lesjak","raw_affiliation_strings":["Design Center Graz, Infineon Technologies Austria AG, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Design Center Graz, Infineon Technologies Austria AG, Graz, Austria","institution_ids":["https://openalex.org/I4210131793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003471349","display_name":"Daniel Hein","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Daniel Hein","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074766089","display_name":"Johannes Winter","orcid":"https://orcid.org/0000-0001-9580-4172"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Johannes Winter","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072908528"],"corresponding_institution_ids":["https://openalex.org/I4210131793"],"apc_list":null,"apc_paid":null,"fwci":5.3595,"has_fulltext":false,"cited_by_count":59,"citation_normalized_percentile":{"value":0.95903369,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"002589","last_page":"002595"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.688799262046814},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.6055724024772644},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6018616557121277},{"id":"https://openalex.org/keywords/control-system-security","display_name":"Control system security","score":0.5973588228225708},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.49852514266967773},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.4477531611919403},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.43074357509613037},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.42873620986938477},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4216601848602295},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.41965746879577637},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.3391197919845581},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.26060348749160767},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.2094014585018158},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.18792766332626343},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1550743281841278},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11003673076629639}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.688799262046814},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.6055724024772644},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6018616557121277},{"id":"https://openalex.org/C172862783","wikidata":"https://www.wikidata.org/wiki/Q5165888","display_name":"Control system security","level":5,"score":0.5973588228225708},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.49852514266967773},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.4477531611919403},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.43074357509613037},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.42873620986938477},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4216601848602295},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.41965746879577637},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3391197919845581},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26060348749160767},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2094014585018158},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.18792766332626343},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1550743281841278},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11003673076629639},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iecon.2015.7392493","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iecon.2015.7392493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IECON 2015 - 41st Annual Conference of the IEEE Industrial Electronics Society","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W125730432","https://openalex.org/W137932992","https://openalex.org/W147819238","https://openalex.org/W301564525","https://openalex.org/W1554094768","https://openalex.org/W1607629465","https://openalex.org/W1619839421","https://openalex.org/W1633999684","https://openalex.org/W1788478135","https://openalex.org/W1987221145","https://openalex.org/W1992661913","https://openalex.org/W1998063700","https://openalex.org/W2001819211","https://openalex.org/W2014517322","https://openalex.org/W2020084077","https://openalex.org/W2029693536","https://openalex.org/W2095708839","https://openalex.org/W2123990969","https://openalex.org/W2128889976","https://openalex.org/W2165005140","https://openalex.org/W2165148376","https://openalex.org/W2168872572","https://openalex.org/W2175377689","https://openalex.org/W2188789433","https://openalex.org/W2295540253","https://openalex.org/W2537545643","https://openalex.org/W2540991247","https://openalex.org/W3124674604","https://openalex.org/W4230668220","https://openalex.org/W4248946777","https://openalex.org/W4293582973","https://openalex.org/W6633236901","https://openalex.org/W6636170892","https://openalex.org/W6637907812","https://openalex.org/W6650969844","https://openalex.org/W7033523746"],"related_works":["https://openalex.org/W3076529025","https://openalex.org/W3212933010","https://openalex.org/W2545311377","https://openalex.org/W2614996178","https://openalex.org/W3141555268","https://openalex.org/W4390610562","https://openalex.org/W3161627164","https://openalex.org/W2971541747","https://openalex.org/W3210361513","https://openalex.org/W2788972609"],"abstract_inverted_index":{"The":[0],"transition":[1,19],"from":[2],"product-centric":[3],"to":[4,12,78,95,101],"service-centric":[5],"business":[6],"models":[7],"presents":[8],"a":[9,80,117,124,135,177],"major":[10],"challenge":[11],"industrial":[13,24,26,86,185],"automation":[14],"and":[15,29,53,62,71,103,108,116,123,133,151,175],"manufacturing":[16],"systems.":[17],"This":[18],"increases":[20],"Machine-to-Machine":[21],"connectivity":[22],"among":[23],"devices,":[25],"controls":[27],"systems,":[28],"factory":[30],"floor":[31],"devices.":[32],"While":[33],"initiatives":[34],"like":[35],"Industry":[36],"4.0":[37],"or":[38],"the":[39,46,49,68,144,155,166,172,190,201],"Industrial":[40,203],"Internet":[41,50,204],"Consortium":[42],"motivate":[43],"this":[44,90],"transition,":[45],"emergence":[47],"of":[48,51,205],"Things":[52],"Cyber":[54],"Physical":[55],"Systems":[56],"are":[57],"key":[58],"enablers.":[59],"However,":[60],"automated":[61],"autonomous":[63],"processes":[64],"require":[65],"trust":[66],"in":[67],"communication":[69],"entities":[70],"transferred":[72],"data.":[73],"Therefore,":[74],"we":[75,131,192],"study":[76],"how":[77],"secure":[79],"smart":[81],"service":[82],"use":[83,91,173],"case":[84,174],"for":[85,183],"maintenance":[87],"scenarios.":[88],"In":[89],"case,":[92],"equipment":[93],"needs":[94],"securely":[96],"transmit":[97],"its":[98],"status":[99],"information":[100],"local":[102],"remote":[104],"recipients.":[105],"We":[106,163,187],"investigate":[107],"compare":[109,128],"two":[110],"security":[111,182,198],"technologies":[112,130],"that":[113,143,165,180,189],"provide":[114],"isolation":[115],"secured":[118],"execution":[119],"environment:":[120],"ARM":[121],"TrustZone":[122,145],"Security":[125,156],"Controller.":[126],"To":[127],"these":[129],"design":[132],"implement":[134],"device":[136],"snapshot":[137],"authentication":[138],"system.":[139],"Our":[140],"results":[141],"indicate":[142],"based":[146],"approach":[147,179],"promises":[148],"greater":[149],"flexibility":[150],"performance,":[152],"but":[153],"only":[154],"Controller":[157],"strongly":[158],"protects":[159],"against":[160],"physical":[161],"attacks.":[162],"argue":[164],"best":[167],"technology":[168],"actually":[169],"depends":[170],"on":[171],"propose":[176],"hybrid":[178],"maximizes":[181],"high-security":[184],"applications.":[186],"believe":[188],"insights":[191],"gained":[193],"will":[194],"help":[195],"introducing":[196],"advanced":[197],"mechanisms":[199],"into":[200],"future":[202],"Things.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
