{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T21:30:52Z","timestamp":1776202252958,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"H2020 SPARTA"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2919760","type":"journal-article","created":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T19:46:16Z","timestamp":1559159176000},"page":"71907-71920","source":"Crossref","is-referenced-by-count":110,"title":["Secure Firmware Updates for Constrained IoT Devices Using Open Standards: A Reality Check"],"prefix":"10.1109","volume":"7","author":[{"given":"Koen","family":"Zandberg","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kaspar","family":"Schleiser","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francisco","family":"Acosta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hannes","family":"Tschofenig","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6239-9983","authenticated-orcid":false,"given":"Emmanuel","family":"Baccelli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2778751"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031506"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2505901"},{"key":"ref31","author":"greenberg","year":"2017","journal-title":"Software Has a Serious Supply-Chain Security Problem"},{"key":"ref30","article-title":"An over the air update mechanism for ESP8266 microcontrollers","author":"frisch","year":"2017","journal-title":"Proc Int Conf Syst Netw Commun (ICSNC)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8032"},{"key":"ref36","author":"jian-band","year":"2016","journal-title":"YouBike Service Down in Taiwan"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381899"},{"key":"ref34","year":"2019","journal-title":"Trusted Execution Environment Provisioning (TEE) Working Group"},{"key":"ref60","first-page":"15","article-title":"BlackIoT: IoT botnet of high wattage devices can disrupt the power grid","author":"soltan","year":"2018","journal-title":"Proc 27th Symp Secur (USENIX)"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7925"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2013.6529563"},{"key":"ref63","author":"vaillant","year":"2019","journal-title":"Monocypher"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0087-1"},{"key":"ref64","author":"veillette","year":"2018","journal-title":"CoAp Management Interfaces"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.Workshops.2017.78"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2016.12.010"},{"key":"ref66","first-page":"49","article-title":"SPLIT: Smart Protocol loading for the IoT","author":"zimmermann","year":"2018","journal-title":"Proc EWSN"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182810"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134043"},{"key":"ref2","year":"2018","journal-title":"qDSA Package on RIOT"},{"key":"ref1","year":"2018","journal-title":"HACL Verified C Code"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7049"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7228"},{"key":"ref24","year":"2019","journal-title":"User Services Platform"},{"key":"ref23","year":"2019","journal-title":"TR-069 CPE WAN Management Protocol Version 1 4"},{"key":"ref26","first-page":"71","article-title":"How embedded applications using an RTOS can stay within on-chip memory limits","author":"davis","year":"2000","journal-title":"Proc 12th Euromicro Conf Real-Time Syst"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/jsan2040717"},{"key":"ref50","year":"2013"},{"key":"ref51","year":"2018","journal-title":"LwM2M Technical Specification Approved Version 1 0 2"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6704479"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref57","author":"schaad","year":"8152","journal-title":"CBOR Object Signing and Encryption (COSE)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.017"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_10"},{"key":"ref53","year":"2018","journal-title":"Lightweight Machine to Machine Technical Specification Transport Bindings Approved Version 1 1"},{"key":"ref52","year":"2018","journal-title":"Lightweight Machine to Machine Technical Specification Approved Version 1 0 1"},{"key":"ref10","year":"2018","journal-title":"TinyCrypt Cryptographic Library J"},{"key":"ref11","year":"2018","journal-title":"wolfSSL Embedded SSL\/TLS Library"},{"key":"ref40","year":"2019","journal-title":"MicroC\/OS"},{"key":"ref12","article-title":"The Future of IoT Software Must be Updated","author":"padilla","year":"2016","journal-title":"IAB Workshop on Internet of Things Software Update (IoTSU)"},{"key":"ref13","year":"2019","journal-title":"FreeRTOS"},{"key":"ref14","year":"2019","journal-title":"mbed OS"},{"key":"ref15","year":"2019","journal-title":"mbed TLS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2858422"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2018.8480277"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2815038"},{"key":"ref19","first-page":"64","article-title":"TweetNaCl: A crypto library in 100 tweets","author":"bernstein","year":"2014","journal-title":"Proc Int Conf Cryptol Inf Secur Latin Amer"},{"key":"ref4","year":"2018","journal-title":"The MCUboot Bootloader"},{"key":"ref3","year":"2018","journal-title":"SUIT-Compliant IoT Firmware Update Prototype"},{"key":"ref6","year":"2019","journal-title":"Zephyr Project"},{"key":"ref5","year":"2019","journal-title":"The Update Framework"},{"key":"ref8","year":"2017","journal-title":"Curve25519 and Ed25519 for Low-Memory Systems"},{"key":"ref7","year":"2016","journal-title":"WIRED Magazine The Botnet That Broke the Internet Isn&#x2019;t Going Away"},{"key":"ref49","year":"2018","journal-title":"Post-quantum crypto project"},{"key":"ref9","year":"2019","journal-title":"Libhydrogen"},{"key":"ref46","author":"moran","year":"2018","journal-title":"Firmware manifest format"},{"key":"ref45","author":"moran","year":"2019","journal-title":"A Firmwar Update Architecture for Internet of Things Devices"},{"key":"ref48","first-page":"1271","article-title":"CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds","author":"nikitin","year":"2017","journal-title":"Proc 26th Conf Secur Symp"},{"key":"ref47","author":"moran","year":"2019","journal-title":"Firmware updates for Internet of Things devices&#x2014;An information model for manifests"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132786"},{"key":"ref41","first-page":"85","article-title":"Mat&#x00E9;: A tiny virtual machine for sensor networks","author":"levis","year":"2002","journal-title":"Proc Int Conf Archit Support Program Lang Oper Syst"},{"key":"ref44","author":"merriam","year":"2016","journal-title":"Software update destroys $286 million Japanese satellite"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6090"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08725488.pdf?arnumber=8725488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:40:41Z","timestamp":1628624441000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8725488\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2919760","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}