RoSym Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.1145/3560826.3563381
Internet of Things (IoT) firmware upgrade has turned out to be a challenging task with respect to security. While Over-The-Air (OTA) software upgrade possibility is an essential feature to achieve security, it is also most sensitive to attacks and lots of different firmware upgrade attacks have been presented in the literature. Several security solutions exist to tackle these problems. We observe though that most prior art solutions are public key-based, they are not flexible with respect to firmware image distribution principles and it is challenging to make a design with good Denial-Of-Service (DoS) attacks resistance. Apart from often being rather resource demanding, a limitation with current public key-based solutions is that they are not quantum computer resistant. Hence, in this paper, we take a new look into the firmware upgrade problem and propose RoSym, a secure, firmware distribution principle agnostic, and DoS protected upgrade mechanism purely based on symmetric cryptography. We present an experimental evaluation on a real testbed environment for the scheme. The results show that the scheme is efficient in comparison to other state of the art solutions. We also make a formal security verification of RoSym showing that it is robust against different attacks.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1145/3560826.3563381
- https://dl.acm.org/doi/pdf/10.1145/3560826.3563381
- OA Status
- gold
- Cited By
- 3
- References
- 29
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4308219324
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4308219324Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1145/3560826.3563381Digital Object Identifier
- Title
-
RoSymWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-11-04Full publication date if available
- Authors
-
Pegah Nikbakht Bideh, Christian GehrmannList of authors in order
- Landing page
-
https://doi.org/10.1145/3560826.3563381Publisher landing page
- PDF URL
-
https://dl.acm.org/doi/pdf/10.1145/3560826.3563381Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://dl.acm.org/doi/pdf/10.1145/3560826.3563381Direct OA link when available
- Concepts
-
Upgrade, Firmware, Computer science, Computer security, Testbed, Cryptography, Key (lock), Public-key cryptography, Operating system, Encryption, Computer networkTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 1, 2023: 2Per-year citation counts (last 5 years)
- References (count)
-
29Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4308219324 |
|---|---|
| doi | https://doi.org/10.1145/3560826.3563381 |
| ids.doi | https://doi.org/10.1145/3560826.3563381 |
| ids.openalex | https://openalex.org/W4308219324 |
| fwci | 0.58739646 |
| type | article |
| title | RoSym |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 46 |
| biblio.first_page | 35 |
| topics[0].id | https://openalex.org/T10237 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9991999864578247 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptography and Data Security |
| topics[1].id | https://openalex.org/T10951 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9987000226974487 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Cryptographic Implementations and Security |
| topics[2].id | https://openalex.org/T11424 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.998199999332428 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Security and Verification in Computing |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2780615140 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8744906187057495 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q920419 |
| concepts[0].display_name | Upgrade |
| concepts[1].id | https://openalex.org/C67212190 |
| concepts[1].level | 2 |
| concepts[1].score | 0.8315379023551941 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q104851 |
| concepts[1].display_name | Firmware |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.768985390663147 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.6333185434341431 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C31395832 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5811879634857178 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1318674 |
| concepts[4].display_name | Testbed |
| concepts[5].id | https://openalex.org/C178489894 |
| concepts[5].level | 2 |
| concepts[5].score | 0.52346271276474 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[5].display_name | Cryptography |
| concepts[6].id | https://openalex.org/C26517878 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4499368667602539 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[6].display_name | Key (lock) |
| concepts[7].id | https://openalex.org/C203062551 |
| concepts[7].level | 3 |
| concepts[7].score | 0.4296583831310272 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q201339 |
| concepts[7].display_name | Public-key cryptography |
| concepts[8].id | https://openalex.org/C111919701 |
| concepts[8].level | 1 |
| concepts[8].score | 0.26287898421287537 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[8].display_name | Operating system |
| concepts[9].id | https://openalex.org/C148730421 |
| concepts[9].level | 2 |
| concepts[9].score | 0.22227320075035095 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[9].display_name | Encryption |
| concepts[10].id | https://openalex.org/C31258907 |
| concepts[10].level | 1 |
| concepts[10].score | 0.2185450792312622 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[10].display_name | Computer network |
| keywords[0].id | https://openalex.org/keywords/upgrade |
| keywords[0].score | 0.8744906187057495 |
| keywords[0].display_name | Upgrade |
| keywords[1].id | https://openalex.org/keywords/firmware |
| keywords[1].score | 0.8315379023551941 |
| keywords[1].display_name | Firmware |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.768985390663147 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.6333185434341431 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/testbed |
| keywords[4].score | 0.5811879634857178 |
| keywords[4].display_name | Testbed |
| keywords[5].id | https://openalex.org/keywords/cryptography |
| keywords[5].score | 0.52346271276474 |
| keywords[5].display_name | Cryptography |
| keywords[6].id | https://openalex.org/keywords/key |
| keywords[6].score | 0.4499368667602539 |
| keywords[6].display_name | Key (lock) |
| keywords[7].id | https://openalex.org/keywords/public-key-cryptography |
| keywords[7].score | 0.4296583831310272 |
| keywords[7].display_name | Public-key cryptography |
| keywords[8].id | https://openalex.org/keywords/operating-system |
| keywords[8].score | 0.26287898421287537 |
| keywords[8].display_name | Operating system |
| keywords[9].id | https://openalex.org/keywords/encryption |
| keywords[9].score | 0.22227320075035095 |
| keywords[9].display_name | Encryption |
| keywords[10].id | https://openalex.org/keywords/computer-network |
| keywords[10].score | 0.2185450792312622 |
| keywords[10].display_name | Computer network |
| language | en |
| locations[0].id | doi:10.1145/3560826.3563381 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | |
| locations[0].pdf_url | https://dl.acm.org/doi/pdf/10.1145/3560826.3563381 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of the 4th Workshop on CPS & IoT Security and Privacy |
| locations[0].landing_page_url | https://doi.org/10.1145/3560826.3563381 |
| locations[1].id | pmh:oai:lup.lub.lu.se:a29d7402-e6b3-4978-8beb-8aefd0374d24 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400536 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Lund University Publications (Lund University) |
| locations[1].source.host_organization | https://openalex.org/I187531555 |
| locations[1].source.host_organization_name | Lund University |
| locations[1].source.host_organization_lineage | https://openalex.org/I187531555 |
| locations[1].license | other-oa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | text |
| locations[1].license_id | https://openalex.org/licenses/other-oa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://lup.lub.lu.se/record/a29d7402-e6b3-4978-8beb-8aefd0374d24 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5027563831 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-7756-3723 |
| authorships[0].author.display_name | Pegah Nikbakht Bideh |
| authorships[0].countries | SE |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I187531555 |
| authorships[0].affiliations[0].raw_affiliation_string | Lund University, Lund, Sweden |
| authorships[0].institutions[0].id | https://openalex.org/I187531555 |
| authorships[0].institutions[0].ror | https://ror.org/012a77v79 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I187531555 |
| authorships[0].institutions[0].country_code | SE |
| authorships[0].institutions[0].display_name | Lund University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Pegah Nikbakht Bideh |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Lund University, Lund, Sweden |
| authorships[1].author.id | https://openalex.org/A5044464349 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-8003-200X |
| authorships[1].author.display_name | Christian Gehrmann |
| authorships[1].countries | SE |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I187531555 |
| authorships[1].affiliations[0].raw_affiliation_string | Lund University, Lund, Sweden |
| authorships[1].institutions[0].id | https://openalex.org/I187531555 |
| authorships[1].institutions[0].ror | https://ror.org/012a77v79 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I187531555 |
| authorships[1].institutions[0].country_code | SE |
| authorships[1].institutions[0].display_name | Lund University |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Christian Gehrmann |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Lund University, Lund, Sweden |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://dl.acm.org/doi/pdf/10.1145/3560826.3563381 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2022-11-09T00:00:00 |
| display_name | RoSym |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10237 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9991999864578247 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptography and Data Security |
| related_works | https://openalex.org/W2368672678, https://openalex.org/W2370626080, https://openalex.org/W2582981600, https://openalex.org/W4387467152, https://openalex.org/W2363739491, https://openalex.org/W29333886, https://openalex.org/W2352638015, https://openalex.org/W2945708474, https://openalex.org/W2403281104, https://openalex.org/W767161385 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2023 |
| counts_by_year[1].cited_by_count | 2 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1145/3560826.3563381 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3560826.3563381 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of the 4th Workshop on CPS & IoT Security and Privacy |
| best_oa_location.landing_page_url | https://doi.org/10.1145/3560826.3563381 |
| primary_location.id | doi:10.1145/3560826.3563381 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | |
| primary_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3560826.3563381 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of the 4th Workshop on CPS & IoT Security and Privacy |
| primary_location.landing_page_url | https://doi.org/10.1145/3560826.3563381 |
| publication_date | 2022-11-04 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W2901555957, https://openalex.org/W3207696788, https://openalex.org/W2051047973, https://openalex.org/W2883374116, https://openalex.org/W2033087562, https://openalex.org/W1967984328, https://openalex.org/W2129951290, https://openalex.org/W3156590941, https://openalex.org/W1844226267, https://openalex.org/W2084652510, https://openalex.org/W2079381088, https://openalex.org/W2088343455, https://openalex.org/W2166998733, https://openalex.org/W2163980921, https://openalex.org/W2011913310, https://openalex.org/W4226126549, https://openalex.org/W2130004027, https://openalex.org/W2565569045, https://openalex.org/W1964917228, https://openalex.org/W2121760255, https://openalex.org/W2279294692, https://openalex.org/W2054480450, https://openalex.org/W2624698494, https://openalex.org/W2686848947, https://openalex.org/W2096235262, https://openalex.org/W1855656922, https://openalex.org/W1656678770, https://openalex.org/W4241569882, https://openalex.org/W2242102996 |
| referenced_works_count | 29 |
| abstract_inverted_index.a | 11, 87, 102, 123, 134, 156, 183 |
| abstract_inverted_index.We | 59, 150, 180 |
| abstract_inverted_index.an | 25, 152 |
| abstract_inverted_index.be | 10 |
| abstract_inverted_index.in | 48, 118, 171 |
| abstract_inverted_index.is | 24, 32, 83, 109, 169, 192 |
| abstract_inverted_index.it | 31, 82, 191 |
| abstract_inverted_index.of | 1, 40, 176, 187 |
| abstract_inverted_index.on | 147, 155 |
| abstract_inverted_index.to | 9, 16, 28, 36, 55, 76, 85, 173 |
| abstract_inverted_index.we | 121 |
| abstract_inverted_index.DoS | 141 |
| abstract_inverted_index.The | 163 |
| abstract_inverted_index.and | 38, 81, 131, 140 |
| abstract_inverted_index.are | 67, 71, 112 |
| abstract_inverted_index.art | 65, 178 |
| abstract_inverted_index.for | 160 |
| abstract_inverted_index.has | 6 |
| abstract_inverted_index.new | 124 |
| abstract_inverted_index.not | 72, 113 |
| abstract_inverted_index.out | 8 |
| abstract_inverted_index.the | 49, 127, 161, 167, 177 |
| abstract_inverted_index.also | 33, 181 |
| abstract_inverted_index.been | 46 |
| abstract_inverted_index.from | 96 |
| abstract_inverted_index.good | 90 |
| abstract_inverted_index.have | 45 |
| abstract_inverted_index.into | 126 |
| abstract_inverted_index.look | 125 |
| abstract_inverted_index.lots | 39 |
| abstract_inverted_index.make | 86, 182 |
| abstract_inverted_index.most | 34, 63 |
| abstract_inverted_index.real | 157 |
| abstract_inverted_index.show | 165 |
| abstract_inverted_index.take | 122 |
| abstract_inverted_index.task | 13 |
| abstract_inverted_index.that | 62, 110, 166, 190 |
| abstract_inverted_index.they | 70, 111 |
| abstract_inverted_index.this | 119 |
| abstract_inverted_index.with | 14, 74, 89, 104 |
| abstract_inverted_index.(DoS) | 92 |
| abstract_inverted_index.(IoT) | 3 |
| abstract_inverted_index.(OTA) | 20 |
| abstract_inverted_index.Apart | 95 |
| abstract_inverted_index.RoSym | 188 |
| abstract_inverted_index.While | 18 |
| abstract_inverted_index.based | 146 |
| abstract_inverted_index.being | 98 |
| abstract_inverted_index.exist | 54 |
| abstract_inverted_index.image | 78 |
| abstract_inverted_index.often | 97 |
| abstract_inverted_index.other | 174 |
| abstract_inverted_index.prior | 64 |
| abstract_inverted_index.state | 175 |
| abstract_inverted_index.these | 57 |
| abstract_inverted_index.Hence, | 117 |
| abstract_inverted_index.RoSym, | 133 |
| abstract_inverted_index.Things | 2 |
| abstract_inverted_index.design | 88 |
| abstract_inverted_index.formal | 184 |
| abstract_inverted_index.paper, | 120 |
| abstract_inverted_index.public | 68, 106 |
| abstract_inverted_index.purely | 145 |
| abstract_inverted_index.rather | 99 |
| abstract_inverted_index.robust | 193 |
| abstract_inverted_index.scheme | 168 |
| abstract_inverted_index.tackle | 56 |
| abstract_inverted_index.though | 61 |
| abstract_inverted_index.turned | 7 |
| abstract_inverted_index.Several | 51 |
| abstract_inverted_index.achieve | 29 |
| abstract_inverted_index.against | 194 |
| abstract_inverted_index.attacks | 37, 44, 93 |
| abstract_inverted_index.current | 105 |
| abstract_inverted_index.feature | 27 |
| abstract_inverted_index.observe | 60 |
| abstract_inverted_index.present | 151 |
| abstract_inverted_index.problem | 130 |
| abstract_inverted_index.propose | 132 |
| abstract_inverted_index.quantum | 114 |
| abstract_inverted_index.respect | 15, 75 |
| abstract_inverted_index.results | 164 |
| abstract_inverted_index.scheme. | 162 |
| abstract_inverted_index.secure, | 135 |
| abstract_inverted_index.showing | 189 |
| abstract_inverted_index.testbed | 158 |
| abstract_inverted_index.upgrade | 5, 22, 43, 129, 143 |
| abstract_inverted_index.Internet | 0 |
| abstract_inverted_index.attacks. | 196 |
| abstract_inverted_index.computer | 115 |
| abstract_inverted_index.firmware | 4, 42, 77, 128, 136 |
| abstract_inverted_index.flexible | 73 |
| abstract_inverted_index.resource | 100 |
| abstract_inverted_index.security | 52, 185 |
| abstract_inverted_index.software | 21 |
| abstract_inverted_index.agnostic, | 139 |
| abstract_inverted_index.different | 41, 195 |
| abstract_inverted_index.efficient | 170 |
| abstract_inverted_index.essential | 26 |
| abstract_inverted_index.key-based | 107 |
| abstract_inverted_index.mechanism | 144 |
| abstract_inverted_index.presented | 47 |
| abstract_inverted_index.principle | 138 |
| abstract_inverted_index.problems. | 58 |
| abstract_inverted_index.protected | 142 |
| abstract_inverted_index.security, | 30 |
| abstract_inverted_index.security. | 17 |
| abstract_inverted_index.sensitive | 35 |
| abstract_inverted_index.solutions | 53, 66, 108 |
| abstract_inverted_index.symmetric | 148 |
| abstract_inverted_index.comparison | 172 |
| abstract_inverted_index.demanding, | 101 |
| abstract_inverted_index.evaluation | 154 |
| abstract_inverted_index.key-based, | 69 |
| abstract_inverted_index.limitation | 103 |
| abstract_inverted_index.principles | 80 |
| abstract_inverted_index.resistant. | 116 |
| abstract_inverted_index.solutions. | 179 |
| abstract_inverted_index.challenging | 12, 84 |
| abstract_inverted_index.environment | 159 |
| abstract_inverted_index.literature. | 50 |
| abstract_inverted_index.possibility | 23 |
| abstract_inverted_index.resistance. | 94 |
| abstract_inverted_index.Over-The-Air | 19 |
| abstract_inverted_index.distribution | 79, 137 |
| abstract_inverted_index.experimental | 153 |
| abstract_inverted_index.verification | 186 |
| abstract_inverted_index.cryptography. | 149 |
| abstract_inverted_index.Denial-Of-Service | 91 |
| cited_by_percentile_year.max | 96 |
| cited_by_percentile_year.min | 90 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.68976077 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |