{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:41:52Z","timestamp":1774021312509,"version":"3.50.1"},"reference-count":107,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:00Z","timestamp":1633651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union and Greek national funds","award":["T1EDK-03389"],"award-info":[{"award-number":["T1EDK-03389"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,12,31]]},"abstract":"<jats:p>The devices forming Internet of Things (IoT) networks need to be re-programmed over the air, so that new features are added, software bugs or security vulnerabilities are resolved, and their applications can be re-purposed. The limitations of IoT devices, such as installation in locations with limited physical access, resource-constrained nature, large scale, and high heterogeneity, should be taken into consideration for designing an efficient and reliable pipeline for over-the-air programming (OTAP). In this work, we present a survey of OTAP techniques, which can be applied to IoT networks. We highlight the main challenges and limitations of OTAP for IoT devices and analyze the essential steps of the firmware update process, along with different approaches and techniques that implement them. In addition, we discuss schemes that focus on securing the OTAP process. Finally, we present a collection of state-of-the-art open-source and commercial platforms that integrate secure and reliable OTAP.<\/jats:p>","DOI":"10.1145\/3472292","type":"journal-article","created":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T22:02:57Z","timestamp":1633730577000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Firmware Over-the-air Programming Techniques for IoT Networks - A Survey"],"prefix":"10.1145","volume":"54","author":[{"given":"Konstantinos","family":"Arakadakis","sequence":"first","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology-Hellas, Heraklion, Greece"}]},{"given":"Pavlos","family":"Charalampidis","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology-Hellas, Heraklion, Greece"}]},{"given":"Antonis","family":"Makrogiannakis","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology-Hellas, Heraklion, Greece"}]},{"given":"Alexandros","family":"Fragkiadakis","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology-Hellas, Heraklion, Greece"}]}],"member":"320","published-online":{"date-parts":[[2021,10,8]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2006. Tmote Sky. Retrieved September 15 2020 from https:\/\/insense.cs.st-andrews.ac.uk\/files\/2013\/04\/tmote-sky-datasheet.pdf.  2006. Tmote Sky. Retrieved September 15 2020 from https:\/\/insense.cs.st-andrews.ac.uk\/files\/2013\/04\/tmote-sky-datasheet.pdf."},{"key":"e_1_2_1_2_1","volume-title":"Retrieved","year":"2020","unstructured":"2020. Amazon Web Services IoT . Retrieved September 15, 2020 , from https:\/\/aws.amazon.com\/iot. 2020. Amazon Web Services IoT. Retrieved September 15, 2020, from https:\/\/aws.amazon.com\/iot."},{"key":"e_1_2_1_3_1","volume-title":"Retrieved","year":"2020","unstructured":"2020. Arm Pelion IoT Platform . Retrieved September 15, 2020 , from https:\/\/www.pelion.com. 2020. Arm Pelion IoT Platform. Retrieved September 15, 2020, from https:\/\/www.pelion.com."},{"key":"e_1_2_1_4_1","volume-title":"Retrieved","author":"Balena","year":"2020","unstructured":"2020. Balena - The complete IoT fleet management platform . Retrieved September 15, 2020 , from https:\/\/www.balena.io. 2020. Balena - The complete IoT fleet management platform. Retrieved September 15, 2020, from https:\/\/www.balena.io."},{"key":"e_1_2_1_5_1","volume-title":"Retrieved","author":"RTOS","year":"2020","unstructured":"2020. Free RTOS - Real-time operating system for microcontrollers . Retrieved September 15, 2020 , from https:\/\/www.freertos.org\/. 2020. FreeRTOS - Real-time operating system for microcontrollers. Retrieved September 15, 2020, from https:\/\/www.freertos.org\/."},{"key":"e_1_2_1_6_1","volume-title":"Retrieved","year":"2020","unstructured":"2020. Map files GNU . Retrieved September 15, 2020 , from https:\/\/ftp.gnu.org\/old-gnu\/Manuals\/ld-2.9.1\/html_node\/ld_3.html. 2020. Map files GNU. Retrieved September 15, 2020, from https:\/\/ftp.gnu.org\/old-gnu\/Manuals\/ld-2.9.1\/html_node\/ld_3.html."},{"key":"e_1_2_1_7_1","volume-title":"Retrieved","author":"Mender","year":"2020","unstructured":"2020. Mender - Open source over-the-air software updates for Linux devices . Retrieved September 15, 2020 , from https:\/\/mender.io\/. 2020. Mender - Open source over-the-air software updates for Linux devices. Retrieved September 15, 2020, from https:\/\/mender.io\/."},{"key":"e_1_2_1_8_1","unstructured":"2020. MICAz. Retrieved September 15 2020 from http:\/\/www.openautomation.net\/uploadsproductos\/micaz_datasheet.pdf.  2020. MICAz. Retrieved September 15 2020 from http:\/\/www.openautomation.net\/uploadsproductos\/micaz_datasheet.pdf."},{"key":"e_1_2_1_9_1","volume-title":"Retrieved","year":"2020","unstructured":"2020. Particle . Retrieved September 15, 2020 , from https:\/\/www.particle.io\/. 2020. Particle. Retrieved September 15, 2020, from https:\/\/www.particle.io\/."},{"key":"e_1_2_1_10_1","unstructured":"2020. Yocto Project. Retrieved September 15 2020 from https:\/\/www.yoctoproject.org\/.  2020. Yocto Project. Retrieved September 15 2020 from https:\/\/www.yoctoproject.org\/."},{"key":"e_1_2_1_11_1","volume-title":"Proceedingsof theMediterraneanElectrotechnicalConference(MELECON\u201910)","author":"Adly I.","unstructured":"I. Adly , H. F. Ragai , A. El-Hennawy , and K. A. Shehata . 2010. Over-the-air programming of PSoC sensor interface in wireless sensor networks . In Proceedingsof theMediterraneanElectrotechnicalConference(MELECON\u201910) . 997\u20131002. I. Adly, H. F. Ragai, A. El-Hennawy, and K. A. Shehata. 2010. Over-the-air programming of PSoC sensor interface in wireless sensor networks. In Proceedingsof theMediterraneanElectrotechnicalConference(MELECON\u201910). 997\u20131002."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of(MILCOM\u201995)","volume":"1","author":"Alagar S.","unstructured":"S. Alagar , S. Venkatesan , and J. Cleveland . 1995. Reliable broadcast in mobile wireless networks . In Proceedings of(MILCOM\u201995) , Vol. 1 . 236\u2013240. S. Alagar, S. Venkatesan, and J. Cleveland. 1995. Reliable broadcast in mobile wireless networks. In Proceedings of(MILCOM\u201995), Vol. 1. 236\u2013240."},{"key":"e_1_2_1_13_1","volume-title":"Understanding the Mirai Botnet. In 26th USENIX Security Symposium (Usenix\u201917)","author":"Antonakakis M.","unstructured":"M. Antonakakis , T. April , M. Bailey , M. Bernhard , E. Bursztein , J. Cochran , Z. Durumeric , J. Halderman , L. Invernizzi , M. Kallitsis , D. Kumar , C. Lever , Z. Ma , J. Mason , D. Menscher , C. Seaman , N. Sullivan , K. Thomas , and Y. Zhou . 2017 . Understanding the Mirai Botnet. In 26th USENIX Security Symposium (Usenix\u201917) . 1093\u20131110. M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (Usenix\u201917). 1093\u20131110."},{"key":"e_1_2_1_14_1","volume-title":"2012 21st International Conference on Computer Communications and Networks (ICCCN\u201912)","author":"Aschenbruck N.","unstructured":"N. Aschenbruck , J. Bauer , J. Bieling , A. Bothe , and M. Schwamborn . 2012. Selective and secure over-the-air programming for wireless sensor networks . In 2012 21st International Conference on Computer Communications and Networks (ICCCN\u201912) . 1\u20136. N. Aschenbruck, J. Bauer, J. Bieling, A. Bothe, and M. Schwamborn. 2012. Selective and secure over-the-air programming for wireless sensor networks. In 2012 21st International Conference on Computer Communications and Networks (ICCCN\u201912). 1\u20136."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2858422"},{"key":"e_1_2_1_16_1","volume-title":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops\u201918)","author":"Baccelli E.","unstructured":"E. Baccelli , J. Doerr , S. Kikuchi , F. Padilla , K. Schleiser , and I. Thomas . 2018. Scripting over-the-air: towards containers on low-end devices in the internet of things . In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops\u201918) . IEEE, 504\u2013507. E. Baccelli, J. Doerr, S. Kikuchi, F. Padilla, K. Schleiser, and I. Thomas. 2018. Scripting over-the-air: towards containers on low-end devices in the internet of things. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops\u201918). IEEE, 504\u2013507."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2019.2915203"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900125"},{"key":"e_1_2_1_19_1","volume-title":"Retrieved","author":"Bormann C.","year":"2020","unstructured":"C. Bormann , M. Ersue , and A. Keranen . 2020. RFC 7228 - Terminology for Constrained-Node Networks . Retrieved September 15, 2020 , from https:\/\/datatracker.ietf.org\/doc\/rfc7228\/. C. Bormann, M. Ersue, and A. Keranen. 2020. RFC 7228 - Terminology for Constrained-Node Networks. Retrieved September 15, 2020, from https:\/\/datatracker.ietf.org\/doc\/rfc7228\/."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan2040717"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285258"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.21015\/vtse.v9i1.406"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1122877.1122881"},{"key":"e_1_2_1_24_1","volume-title":"Deluge: Data dissemination for network reprogramming at scale. Class Project","author":"Chlipala A.","year":"2004","unstructured":"A. Chlipala , J. Hui , and G. Tolle . 2004 . Deluge: Data dissemination for network reprogramming at scale. Class Project , Berkeley, University of California . A. Chlipala, J. Hui, and G. Tolle. 2004. Deluge: Data dissemination for network reprogramming at scale. Class Project, Berkeley, University of California."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1227161.1402296"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2408339"},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"K. Doddapaneni R. Lakkundi S. Rao S. G. Kulkarni and B. Bhat. 2017. Secure FoTA object for IoT. In 2017IEEE42ndConferenceonLocalComputerNetworksWorkshops(LCNWorkshops). 154\u2013159.  K. Doddapaneni R. Lakkundi S. Rao S. G. Kulkarni and B. Bhat. 2017. Secure FoTA object for IoT. In 2017IEEE42ndConferenceonLocalComputerNetworksWorkshops(LCNWorkshops). 154\u2013159.","DOI":"10.1109\/LCN.Workshops.2017.78"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.08.017"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.161"},{"key":"e_1_2_1_30_1","volume-title":"ProceedingsoftheACMSIGMETRICSInternational Conference onMeasurementand Modeling of Computer Systems SIGMETRICS(SIGMETRICS\u201910)","author":"Dong W.","unstructured":"W. Dong , Y. Liu , X. Wu , L. Gu , and C. Chen . 2010. Elon: Enabling efficient and long-term reprogramming for wireless sensor networks . In ProceedingsoftheACMSIGMETRICSInternational Conference onMeasurementand Modeling of Computer Systems SIGMETRICS(SIGMETRICS\u201910) . ACM Press, 49. W. Dong, Y. Liu, X. Wu, L. Gu, and C. Chen. 2010. Elon: Enabling efficient and long-term reprogramming for wireless sensor networks. In ProceedingsoftheACMSIGMETRICSInternational Conference onMeasurementand Modeling of Computer Systems SIGMETRICS(SIGMETRICS\u201910). ACM Press, 49."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the IEEE INFOCOM (INFOCOM\u201913)","author":"Dong W.","unstructured":"W. Dong , B. Mo , C. Huang , Y. Liu , and C. Chen . 2013. R3: optimizing relocatable code for efficient reprogramming in networked embedded systems . In Proceedings of the IEEE INFOCOM (INFOCOM\u201913) . 315\u2013319. W. Dong, B. Mo, C. Huang, Y. Liu, and C. Chen. 2013. R3: optimizing relocatable code for efficient reprogramming in networked embedded systems. In Proceedings of the IEEE INFOCOM (INFOCOM\u201913). 315\u2013319."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 4th International Conference onEmbeddedNetworked Sensor Systems SenSys(SenSys\u201906)","author":"Dunkels A.","unstructured":"A. Dunkels , N. Finne , J. Eriksson , and T. Voigt . 2006. Run-time dynamic linking for reprogramming wireless sensor networks . In Proceedings of the 4th International Conference onEmbeddedNetworked Sensor Systems SenSys(SenSys\u201906) . ACM Press, 15. A. Dunkels, N. Finne, J. Eriksson, and T. Voigt. 2006. Run-time dynamic linking for reprogramming wireless sensor networks. In Proceedings of the 4th International Conference onEmbeddedNetworked Sensor Systems SenSys(SenSys\u201906). ACM Press, 15."},{"key":"e_1_2_1_33_1","volume-title":"29th Annual IEEE International Conference on Local Computer Networks (LCN\u201904)","author":"Dunkels A.","unstructured":"A. Dunkels , B. Gronvall , and T. Voigt . 2004. Contiki - a lightweight and flexible operating system for tiny networked sensors . In 29th Annual IEEE International Conference on Local Computer Networks (LCN\u201904) . 455\u2013462. A. Dunkels, B. Gronvall, and T. Voigt. 2004. Contiki - a lightweight and flexible operating system for tiny networked sensors. In 29th Annual IEEE International Conference on Local Computer Networks (LCN\u201904). 455\u2013462."},{"key":"e_1_2_1_34_1","doi-asserted-by":"crossref","unstructured":"P. Dutta J. Hui D. Chu and D. Culler. 2006. Securing the deluge network programming system. In IPSN.  P. Dutta J. Hui D. Chu and D. Culler. 2006. Securing the deluge network programming system. In IPSN.","DOI":"10.1145\/1127777.1127826"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of ACM WiSec (WiSec\u201917)","author":"Eldefrawy K.","unstructured":"K. Eldefrawy , N. Rattanavipanon , and G. Tsudik . 2017. HYDRA: hybrid design for remote attestation (using a formally verified microkernel) . In Proceedings of ACM WiSec (WiSec\u201917) . 99\u2013110. K. Eldefrawy, N. Rattanavipanon, and G. Tsudik. 2017. HYDRA: hybrid design for remote attestation (using a formally verified microkernel). In Proceedings of ACM WiSec (WiSec\u201917). 99\u2013110."},{"key":"e_1_2_1_36_1","unstructured":"J. Elson S. Bien N. Busek V. Bychkovskiy A. Cerpa D. Ganesan L. Girod B. Greenstein T. Schoellhammer T. Stathopoulos and D. Estrin. 2003. EmStar: an environment for developing wireless embedded systems software. Technical Report.  J. Elson S. Bien N. Busek V. Bychkovskiy A. Cerpa D. Ganesan L. Girod B. Greenstein T. Schoellhammer T. Stathopoulos and D. Estrin. 2003. EmStar: an environment for developing wireless embedded systems software. Technical Report."},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"M. Ersue D. Romascanu J. Schoenwaelder and A. Sehgal. 2015. Management of networks with constrained devices: Use cases RFC7548. Technical Report.  M. Ersue D. Romascanu J. Schoenwaelder and A. Sehgal. 2015. Management of networks with constrained devices: Use cases RFC7548. Technical Report.","DOI":"10.17487\/RFC7548"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/s110605900"},{"key":"e_1_2_1_39_1","doi-asserted-by":"crossref","unstructured":"A. Fragkiadakis and E. Tragos. 2016. A trust-based scheme employing evidence reasoning for iot architectures. In IEEE 3rd World Forum on Internet of Things (WF-IoT\u201916). 559\u2013564.  A. Fragkiadakis and E. Tragos. 2016. A trust-based scheme employing evidence reasoning for iot architectures. In IEEE 3rd World Forum on Internet of Things (WF-IoT\u201916). 559\u2013564.","DOI":"10.1109\/WF-IoT.2016.7845509"},{"key":"e_1_2_1_40_1","volume-title":"5th International Conference on Internet of Things, Big Data and Security. 101\u2013111","author":"Frimpong E.","unstructured":"E. Frimpong and A. Michalas . 2020. IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library Based on ECDH and ECDSA for the Development of Secure and Privacy-Preserving Protocols in Contiki-NG . In 5th International Conference on Internet of Things, Big Data and Security. 101\u2013111 . E. Frimpong and A. Michalas. 2020. IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library Based on ECDH and ECDSA for the Development of Secure and Privacy-Preserving Protocols in Contiki-NG. In 5th International Conference on Internet of Things, Big Data and Security. 101\u2013111."},{"key":"e_1_2_1_41_1","first-page":"12","volume-title":"the Twelfth International Conference on Systems and Networks Communications","author":"Frisch D.","year":"2017","unstructured":"D. Frisch , S. Rei\u00dfmann , and C. Pape . 2017. An over the air update mechanism for ESP8266 microcontrollers . In the Twelfth International Conference on Systems and Networks Communications , 2017 , 12 - 17 . D. Frisch, S. Rei\u00dfmann, and C. Pape. 2017. An over the air update mechanism for ESP8266 microcontrollers. In the Twelfth International Conference on Systems and Networks Communications, 2017, 12-17."},{"key":"e_1_2_1_42_1","volume-title":"E-trickle: Enhanced trickle algorithm for low-power and lossy networks. In 2015 IEEE International Conference on Computer and Information Technology","author":"Ghaleb B.","year":"2015","unstructured":"B. Ghaleb , A. Al-Dubai , and E. Ekonomou . 2015 . E-trickle: Enhanced trickle algorithm for low-power and lossy networks. In 2015 IEEE International Conference on Computer and Information Technology ; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE , 1123\u20131129. B. Ghaleb, A. Al-Dubai, and E. Ekonomou. 2015. E-trickle: Enhanced trickle algorithm for low-power and lossy networks. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, 1123\u20131129."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00009201"},{"key":"e_1_2_1_44_1","volume-title":"2008 International Conference on Information Processing in Sensor Networks (IPSN\u201908)","author":"Hagedorn A.","unstructured":"A. Hagedorn , D. Starobinski , and A. Trachtenberg . 2008. Rateless deluge: Over-the-air programming of wireless sensor networks using random linear codes . In 2008 International Conference on Information Processing in Sensor Networks (IPSN\u201908) . 457\u2013466. A. Hagedorn, D. Starobinski, and A. Trachtenberg. 2008. Rateless deluge: Over-the-air programming of wireless sensor networks using random linear codes. In 2008 International Conference on Information Processing in Sensor Networks (IPSN\u201908). 457\u2013466."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2505901"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of Mobisys (Mobisys\u201905)","author":"Han C.","unstructured":"C. Han , R. Kumar , R. Shea , E. Kohler , and M. Srivastava . 2005. SOS -a dynamic operating system for sensor networks . In Proceedings of Mobisys (Mobisys\u201905) . C. Han, R. Kumar, R. Shea, E. Kohler, and M. Srivastava. 2005. SOS -a dynamic operating system for sensor networks. In Proceedings of Mobisys (Mobisys\u201905)."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1134340"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360861"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"e_1_2_1_50_1","volume-title":"Proceedings of the 6th International Conference on Mobile Adhoc and Sensor Systems (MASS\u201909)","author":"Hu J.","unstructured":"J. Hu , Chun Jason Xue , Yi He , and Edwin H . -M. Sha. 2009. Reprogramming with minimal transferred data on wireless sensor network . In Proceedings of the 6th International Conference on Mobile Adhoc and Sensor Systems (MASS\u201909) . IEEE, 160\u2013167. J. Hu, Chun Jason Xue, Yi He, and Edwin H.-M. Sha. 2009. Reprogramming with minimal transferred data on wireless sensor network. In Proceedings of the 6th International Conference on Mobile Adhoc and Sensor Systems (MASS\u201909). IEEE, 160\u2013167."},{"key":"e_1_2_1_51_1","volume-title":"IEEE INFOCOM 2008 - The 27th Conference on Computer Communications. 574\u2013582","author":"Huang L.","unstructured":"L. Huang and S. Setia . 2008. CORD: Energy-efficient reliable bulk data dissemination in sensor networks . In IEEE INFOCOM 2008 - The 27th Conference on Computer Communications. 574\u2013582 . L. Huang and S. Setia. 2008. CORD: Energy-efficient reliable bulk data dissemination in sensor networks. In IEEE INFOCOM 2008 - The 27th Conference on Computer Communications. 574\u2013582."},{"key":"e_1_2_1_52_1","volume-title":"2008 International Conference on Information Processing in Sensor Networks (IPSN\u201908)","author":"Hyun S.","unstructured":"S. Hyun , P. Ning , A. Liu , and W. Du . 2008. Seluge: Secure and dos-resistant code dissemination in wireless sensor networks . In 2008 International Conference on Information Processing in Sensor Networks (IPSN\u201908) . 445\u2013456. S. Hyun, P. Ning, A. Liu, and W. Du. 2008. Seluge: Secure and dos-resistant code dissemination in wireless sensor networks. In 2008 International Conference on Information Processing in Sensor Networks (IPSN\u201908). 445\u2013456."},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON\u201904)","author":"Culler Jaein","unstructured":"Jaein J. and D. Culler . 2004. Incremental network programming for wireless sensors . In Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON\u201904) .25\u201333. Jaein J. and D. Culler. 2004. Incremental network programming for wireless sensors. In Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON\u201904).25\u201333."},{"key":"e_1_2_1_54_1","unstructured":"J. Jeong. 2003. Node-level Representation and System Support for Network Programming.  J. Jeong. 2003. Node-level Representation and System Support for Network Programming."},{"key":"e_1_2_1_55_1","volume-title":"Configurable Reprogramming Scheme for Over-the Air Updates in Networked Embedded Systems","author":"Kachman O.","unstructured":"O. Kachman . 2016. Configurable Reprogramming Scheme for Over-the Air Updates in Networked Embedded Systems . http:\/\/www.fit.vutbr.cz\/events\/pad2016\/download\/sbornik\/11-Kachman.pdf.Accessed: 2020-09-15. O. Kachman. 2016. Configurable Reprogramming Scheme for Over-the Air Updates in Networked Embedded Systems. http:\/\/www.fit.vutbr.cz\/events\/pad2016\/download\/sbornik\/11-Kachman.pdf.Accessed: 2020-09-15."},{"key":"e_1_2_1_56_1","volume-title":"Retrieved","author":"Kachman O.","year":"2018","unstructured":"O. Kachman . 2018 . Effective Multiplatform Firmware Update Process for Embedded Low-Power Devices . Retrieved September 15, 2020, from http:\/\/acmbulletin.fiit.stuba.sk\/vol11num1\/kachman2019.pdf. O. Kachman. 2018. Effective Multiplatform Firmware Update Process for Embedded Low-Power Devices. Retrieved September 15, 2020, from http:\/\/acmbulletin.fiit.stuba.sk\/vol11num1\/kachman2019.pdf."},{"key":"e_1_2_1_57_1","volume-title":"2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS\u201916)","author":"Kachman O.","unstructured":"O. Kachman and M. Balaz . 2016. Optimized differencing algorithm for firmware updates of low-power devices . In 2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS\u201916) . IEEE, 1\u20134. O. Kachman and M. Balaz. 2016. Optimized differencing algorithm for firmware updates of low-power devices. In 2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS\u201916). IEEE, 1\u20134."},{"key":"e_1_2_1_58_1","volume-title":"Retrieved","author":"Kishore A.","year":"2017","unstructured":"A. Kishore . 2017 . Turning internet of things (IoT) into internet of vulnerabilities (IoV): IoT botnets . Retrieved September 15, 2020, from https:\/\/arxiv.org\/abs\/1702.03681v1. A. Kishore. 2017. Turning internet of things (IoT) into internet of vulnerabilities (IoV): IoT botnets. Retrieved September 15, 2020, from https:\/\/arxiv.org\/abs\/1702.03681v1."},{"key":"e_1_2_1_59_1","volume-title":"Published: RFC 3284.","author":"Korn D.","year":"2002","unstructured":"D. Korn , J. MacDonald , J. Mogul , and K. Vo . 2002 . The VCDIFF Generic Differencing and Compression Data Format. RFC Editor . Published: RFC 3284. D. Korn, J. MacDonald, J. Mogul, and K. Vo. 2002. The VCDIFF Generic Differencing and Compression Data Format. RFC Editor. Published: RFC 3284."},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the 2nd European Workshop on Wireless Sensor Networks","author":"Koshy J.","year":"2005","unstructured":"J. Koshy and R. Pandey . 2005. Remote incremental linking for energy-efficient reprogramming of sensor networks . In Proceedings of the 2nd European Workshop on Wireless Sensor Networks , 2005 (EWSN\u201905).IEEE, 354\u2013365. J. Koshy and R. Pandey. 2005. Remote incremental linking for energy-efficient reprogramming of sensor networks. In Proceedings of the 2nd European Workshop on Wireless Sensor Networks, 2005 (EWSN\u201905).IEEE, 354\u2013365."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/15501320500330760"},{"key":"e_1_2_1_62_1","volume-title":"25th IEEE International Conference on Distributed Computing Systems (ICDCS\u201905)","author":"Kulkarni S.","unstructured":"S. Kulkarni and L. Wang . 2005. MNP: Multihop network reprogramming service for sensor networks . In 25th IEEE International Conference on Distributed Computing Systems (ICDCS\u201905) . 7\u201316. S. Kulkarni and L. Wang. 2005. MNP: Multihop network reprogramming service for sensor networks. In 25th IEEE International Conference on Distributed Computing Systems (ICDCS\u201905). 7\u201316."},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of ADCOM (ADCOM\u201914)","author":"Lakkundi V.","unstructured":"V. Lakkundi and K. Singh . 2014. Lightweight DTLS implementation in CoAP-based internet of things . In Proceedings of ADCOM (ADCOM\u201914) . V. Lakkundi and K. Singh. 2014. Lightweight DTLS implementation in CoAP-based internet of things. In Proceedings of ADCOM (ADCOM\u201914)."},{"key":"e_1_2_1_64_1","volume-title":"26th IEEE International Conference on Distributed Computing Systems (ICDCS\u201906)","author":"Lanigan P.","unstructured":"P. Lanigan , R. Gandhi , and P. Narasimhan . 2006. Sluice: Secure dissemination of code updates in sensor networks . In 26th IEEE International Conference on Distributed Computing Systems (ICDCS\u201906) . P. Lanigan, R. Gandhi, and P. Narasimhan. 2006. Sluice: Secure dissemination of code updates in sensor networks. In 26th IEEE International Conference on Distributed Computing Systems (ICDCS\u201906)."},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the 8th International Conference on Sensor Networks. SCITEPRESS - Science and Technology Publications, 30\u201339","author":"Lehniger K.","unstructured":"K. Lehniger and S. Weidling . 2019. The impact of diverse execution strategies on incremental code updates for wireless sensor networks :. In Proceedings of the 8th International Conference on Sensor Networks. SCITEPRESS - Science and Technology Publications, 30\u201339 . K. Lehniger and S. Weidling. 2019. The impact of diverse execution strategies on incremental code updates for wireless sensor networks:. In Proceedings of the 8th International Conference on Sensor Networks. SCITEPRESS - Science and Technology Publications, 30\u201339."},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys\u201903)","author":"Levis P.","unstructured":"P. Levis , N. Lee , M. Welsh , and D. Culler . 2003. TOSSIM: Accurate and scalable simulation of entire TinyOS applications . In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys\u201903) . P. Levis, N. Lee, M. Welsh, and D. Culler. 2003. TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys\u201903)."},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation -","volume":"1","author":"Levis P.","unstructured":"P. Levis , N. Patel , D. Culler , and S. Shenker . 2004. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks . In Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation - Volume 1 (NSDI\u201904). USENIX Association. P. Levis, N. Patel, D. Culler, and S. Shenker. 2004. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation - Volume 1 (NSDI\u201904). USENIX Association."},{"key":"e_1_2_1_68_1","unstructured":"L. Li Z. Xi Y. Zhu and S. Wang. 2018. Improvement and implementation of RPL routing protocol in wireless sensor networks. In WiCOM.  L. Li Z. Xi Y. Zhu and S. Wang. 2018. Improvement and implementation of RPL routing protocol in wireless sensor networks. In WiCOM."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"e_1_2_1_70_1","volume-title":"2008 International Conference on Information Processing in Sensor Networks (IPSN\u201908)","author":"Liu A.","unstructured":"A. Liu and P. Ning . 2008. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks . In 2008 International Conference on Information Processing in Sensor Networks (IPSN\u201908) . 245\u2013256. A. Liu and P. Ning. 2008. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In 2008 International Conference on Information Processing in Sensor Networks (IPSN\u201908). 245\u2013256."},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSYS\u201904)","author":"Liu T.","unstructured":"T. Liu , C. Sadler , P. Zhang , and M. Martonosi . 2004. Implementing software on resource-constrained mobile sensors: Experiences with impala and zebranet . In Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSYS\u201904) . ACM Press, 256. T. Liu, C. Sadler, P. Zhang, and M. Martonosi. 2004. Implementing software on resource-constrained mobile sensors: Experiences with impala and zebranet. In Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSYS\u201904). ACM Press, 256."},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the 2013 International Conference on Embedded Software (EMSOFT\u201913)","author":"Mazumder B.","unstructured":"B. Mazumder and J. O. Hallstrom . 2013. An efficient code update solution for wireless sensor network reprogramming . In Proceedings of the 2013 International Conference on Embedded Software (EMSOFT\u201913) . 1\u201310. B. Mazumder and J. O. Hallstrom. 2013. An efficient code update solution for wireless sensor network reprogramming. In Proceedings of the 2013 International Conference on Embedded Software (EMSOFT\u201913). 1\u201310."},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the 2012 IEEE International Conference on Communications (ICC\u201912)","author":"Mo B.","unstructured":"B. Mo , W. Dong , C. Chen , J. Bu , and Q. Wang . 2012. An efficient differencing algorithm based on suffix array for reprogramming wireless sensor networks . In Proceedings of the 2012 IEEE International Conference on Communications (ICC\u201912) . 773\u2013777. B. Mo, W. Dong, C. Chen, J. Bu, and Q. Wang. 2012. An efficient differencing algorithm based on suffix array for reprogramming wireless sensor networks. In Proceedings of the 2012 IEEE International Conference on Communications (ICC\u201912). 773\u2013777."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844406"},{"key":"e_1_2_1_75_1","volume-title":"26th IEEE International Real-Time Systems Symposium (RTSS\u201905)","author":"Naik V.","unstructured":"V. Naik , A. Arora , P. Sinha , and Hongwei Z . 2005. Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices . In 26th IEEE International Real-Time Systems Symposium (RTSS\u201905) . 777\u2013789. V. Naik, A. Arora, P. Sinha, and Hongwei Z.2005. Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices. In 26th IEEE International Real-Time Systems Symposium (RTSS\u201905). 777\u2013789."},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1325651.1325652"},{"key":"e_1_2_1_77_1","volume-title":"Proceedings of the 2014 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES\u201914)","author":"Pallister J.","unstructured":"J. Pallister , K. Eder , S. Hollis , and J. Bennett . 2014. A high-level model of embedded flash energy consumption . In Proceedings of the 2014 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES\u201914) . Association for Computing Machinery. J. Pallister, K. Eder, S. Hollis, and J. Bennett. 2014. A high-level model of embedded flash energy consumption. In Proceedings of the 2014 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES\u201914). Association for Computing Machinery."},{"key":"e_1_2_1_78_1","volume-title":"IEEE INFOCOM 2009 - The 28th Conference on Computer Communications (INFOCOM\u201909)","author":"Panta R.","unstructured":"R. Panta and S. Bagchi . 2009. Hermes: fast and energy efficient incremental code updates for wireless sensor networks . In IEEE INFOCOM 2009 - The 28th Conference on Computer Communications (INFOCOM\u201909) . IEEE, 639\u2013647. R. Panta and S. Bagchi. 2009. Hermes: fast and energy efficient incremental code updates for wireless sensor networks. In IEEE INFOCOM 2009 - The 28th Conference on Computer Communications (INFOCOM\u201909). IEEE, 639\u2013647."},{"key":"e_1_2_1_79_1","volume-title":"Zephyr: Efficient incremental reprogramming of sensor nodes using function call indirections and difference computation. In USENIX.","author":"Panta R.","year":"2009","unstructured":"R. Panta , S. Bagchi , and S. Midkiff . 2009 . Zephyr: Efficient incremental reprogramming of sensor nodes using function call indirections and difference computation. In USENIX. R. Panta, S. Bagchi, and S. Midkiff. 2009. Zephyr: Efficient incremental reprogramming of sensor nodes using function call indirections and difference computation. In USENIX."},{"key":"e_1_2_1_80_1","volume-title":"Proceedings of IEEE INFOCOM (INFOCOM\u201907)","author":"Panta R.","unstructured":"R. Panta , I. Khalil , and S. Bagchi . 2007. Stream: low overhead wireless reprogramming for sensor networks . In Proceedings of IEEE INFOCOM (INFOCOM\u201907) . 928\u2013936. R. Panta, I. Khalil, and S. Bagchi. 2007. Stream: low overhead wireless reprogramming for sensor networks. In Proceedings of IEEE INFOCOM (INFOCOM\u201907). 928\u2013936."},{"key":"e_1_2_1_81_1","volume-title":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct Publication (UbiComp\u201914 Adjunct). ACM Press, 147\u2013150","author":"Park H.","unstructured":"H. Park , J. Jeong , and P. Mah . 2014. Non-invasive rapid and efficient firmware update for wireless sensor networks . In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct Publication (UbiComp\u201914 Adjunct). ACM Press, 147\u2013150 . H. Park, J. Jeong, and P. Mah. 2014. Non-invasive rapid and efficient firmware update for wireless sensor networks. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct Publication (UbiComp\u201914 Adjunct). ACM Press, 147\u2013150."},{"key":"e_1_2_1_82_1","volume-title":"Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc\u201904)","author":"Park S.","unstructured":"S. Park , R. Vedantham , R. Sivakumar , and I. Akyildiz . 2004. A scalable approach for reliable downstream data delivery in wireless sensor networks . In Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc\u201904) . S. Park, R. Vedantham, R. Sivakumar, and I. Akyildiz. 2004. A scalable approach for reliable downstream data delivery in wireless sensor networks. In Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc\u201904)."},{"key":"e_1_2_1_83_1","volume-title":"2010 43rd Hawaii International Conference on System Sciences (HICSS\u201910)","author":"Parthasarathy R.","unstructured":"R. Parthasarathy , N. Peterson , W. Song , A. Hurson , and B. Shirazi . 2010. Over the air programming on Imote2-Based sensor networks . In 2010 43rd Hawaii International Conference on System Sciences (HICSS\u201910) . 1\u20139. R. Parthasarathy, N. Peterson, W. Song, A. Hurson, and B. Shirazi. 2010. Over the air programming on Imote2-Based sensor networks. In 2010 43rd Hawaii International Conference on System Sciences (HICSS\u201910). 1\u20139."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_2_1_85_1","volume-title":"Fourth International Symposium on Information Processing in Sensor Networks","author":"Grimmer Prabal D., M.","year":"2005","unstructured":"Prabal D., M. Grimmer , A. Arora , S. Bibyk , and D. Culler . 2005. Design of a wireless sensor network platform for detecting rare, random, and ephemeral events . In Fourth International Symposium on Information Processing in Sensor Networks , 2005 (IPSN\u201905).497\u2013502. Prabal D., M. Grimmer, A. Arora, S. Bibyk, and D. Culler. 2005. Design of a wireless sensor network platform for detecting rare, random, and ephemeral events. In Fourth International Symposium on Information Processing in Sensor Networks, 2005 (IPSN\u201905).497\u2013502."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637932"},{"key":"e_1_2_1_87_1","volume-title":"Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA\u201903)","author":"Reijers N.","unstructured":"N. Reijers and K. Langendoen . 2003. Efficient code distribution in wireless sensor networks . In Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA\u201903) . Association for Computing Machinery, 60\u201367. N. Reijers and K. Langendoen. 2003. Efficient code distribution in wireless sensor networks. In Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA\u201903). Association for Computing Machinery, 60\u201367."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.2004319"},{"key":"e_1_2_1_90_1","volume-title":"Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON\u201912)","author":"Shafi N.","unstructured":"N. Shafi , K. Ali , and H. Hassanein . 2012. No-reboot and zero-flash over-the-air programming for wireless sensor networks . In Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON\u201912) . 371\u2013379. N. Shafi, K. Ali, and H. Hassanein. 2012. No-reboot and zero-flash over-the-air programming for wireless sensor networks. In Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON\u201912). 371\u2013379."},{"key":"e_1_2_1_91_1","volume-title":"Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP\u201911)","author":"Shi J.","unstructured":"J. Shi , J. Wan , H. Yan , and H. Suo . 2011. A survey of cyber-physical systems . In Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP\u201911) . 1\u20136. J. Shi, J. Wan, H. Yan, and H. Suo. 2011. A survey of cyber-physical systems. In Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP\u201911). 1\u20136."},{"key":"e_1_2_1_92_1","volume-title":"Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS\u201910)","author":"Shoufan A.","unstructured":"A. Shoufan and N. Huber . 2010. A fast hash tree generator for Merkle signature scheme . In Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS\u201910) . 3945\u20133948. A. Shoufan and N. Huber. 2010. A fast hash tree generator for Merkle signature scheme. In Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS\u201910). 3945\u20133948."},{"key":"e_1_2_1_93_1","volume-title":"Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA\u201903)","author":"Stann F.","unstructured":"F. Stann and J. Heidemann . 2003. RMST: Reliable data transport in sensor networks . In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA\u201903) .102\u2013112. F. Stann and J. Heidemann. 2003. RMST: Reliable data transport in sensor networks. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA\u201903).102\u2013112."},{"key":"e_1_2_1_94_1","doi-asserted-by":"crossref","unstructured":"T. Stathopoulos J. Heidemann and D. Estrin. 2004. A Remote Code Update Mechanism for Wireless Sensor Networks. Technical Report.  T. Stathopoulos J. Heidemann and D. Estrin. 2004. A Remote Code Update Mechanism for Wireless Sensor Networks. Technical Report.","DOI":"10.21236\/ADA482630"},{"key":"e_1_2_1_95_1","volume-title":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops\u201913)","author":"Stolikj M.","unstructured":"M. Stolikj , P. J. Cuijpers , and J. Lukkien . 2013. Efficient reprogramming of wireless sensor networks using incremental updates . In 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops\u201913) . 584\u2013589. M. Stolikj, P. J. Cuijpers, and J. Lukkien. 2013. Efficient reprogramming of wireless sensor networks using incremental updates. In 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops\u201913). 584\u2013589."},{"key":"e_1_2_1_96_1","doi-asserted-by":"crossref","unstructured":"R. Szewczyk J. Polastre A. Mainwaring and D. Culler. 2004. Lessons from a sensor network expedition. In EWSN.  R. Szewczyk J. Polastre A. Mainwaring and D. Culler. 2004. Lessons from a sensor network expedition. In EWSN.","DOI":"10.1007\/978-3-540-24606-0_21"},{"key":"e_1_2_1_97_1","unstructured":"A. Tal. 2002. White paper two flash technologies compared: NOR vs NAND.  A. Tal. 2002. White paper two flash technologies compared: NOR vs NAND."},{"key":"e_1_2_1_98_1","volume-title":"Mote In-Network Programming User Reference Version 20030315. Crossbow Technology","author":"Technology Crossbow","unstructured":"Crossbow Technology . 2003. Mote In-Network Programming User Reference Version 20030315. Crossbow Technology , Inc . Crossbow Technology. 2003. Mote In-Network Programming User Reference Version 20030315. Crossbow Technology, Inc."},{"key":"e_1_2_1_99_1","doi-asserted-by":"crossref","unstructured":"E. Tragos A. Fragkiadakis V. Angelakis and H. Pohls. 2017. Designing secure iot architectures for smart city applications. In Designing Developing and Facilitating Smart Cities: Urban Design and IoT Solutions. Springer.  E. Tragos A. Fragkiadakis V. Angelakis and H. Pohls. 2017. Designing secure iot architectures for smart city applications. In Designing Developing and Facilitating Smart Cities: Urban Design and IoT Solutions. Springer.","DOI":"10.1007\/978-3-319-44924-1_5"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013763825347"},{"key":"e_1_2_1_102_1","doi-asserted-by":"crossref","unstructured":"B. Wang Y. Chen H. Gu J. Yang and T. Zhao. 2005. Two energy-efficient timesaving improvement mechanisms of network reprogramming in wireless sensor network. In Embedded Software and Systems. Springer Berlin 473\u2013483.  B. Wang Y. Chen H. Gu J. Yang and T. Zhao. 2005. Two energy-efficient timesaving improvement mechanisms of network reprogramming in wireless sensor network. In Embedded Software and Systems. Springer Berlin 473\u2013483.","DOI":"10.1007\/11599555_45"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"e_1_2_1_104_1","first-page":"322","article-title":"Sensors in medicine","volume":"171","author":"Wilson C.","year":"1999","unstructured":"C. Wilson . 1999 . Sensors in medicine . Western Journal of Medicine 171 (1999), 322 \u2013 325 . C. Wilson. 1999. Sensors in medicine. Western Journal of Medicine 171 (1999), 322\u2013325.","journal-title":"Western Journal of Medicine"},{"key":"e_1_2_1_105_1","volume-title":"The Definitive Guide to Arm Cortex-M0 and Cortex-M0+ Processors","author":"Yiu J.","unstructured":"J. Yiu . 2015. Introduction to embedded software development . In The Definitive Guide to Arm Cortex-M0 and Cortex-M0+ Processors . Elsevier , 55\u201386. J. Yiu. 2015. Introduction to embedded software development. In The Definitive Guide to Arm Cortex-M0 and Cortex-M0+ Processors. Elsevier, 55\u201386."},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919760"},{"key":"e_1_2_1_107_1","volume-title":"Proceedings of the 5th Non-Volatile Memory Systems and Applications Symposium (NVMSA\u201916)","author":"Zhang C.","unstructured":"C. Zhang , Wonsun Ahn , Youtao Zhang , and Bruce R. Childers . 2016. Live code update for IoT devices in energy harvesting environments . In Proceedings of the 5th Non-Volatile Memory Systems and Applications Symposium (NVMSA\u201916) . IEEE, 1\u20136. C. Zhang, Wonsun Ahn, Youtao Zhang, and Bruce R. Childers. 2016. Live code update for IoT devices in energy harvesting environments. In Proceedings of the 5th Non-Volatile Memory Systems and Applications Symposium (NVMSA\u201916). IEEE, 1\u20136."},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718815046"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:01Z","timestamp":1750183801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,8]]},"references-count":107,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,12,31]]}},"alternative-id":["10.1145\/3472292"],"URL":"https:\/\/doi.org\/10.1145\/3472292","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,8]]},"assertion":[{"value":"2020-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}