2014 International Conference on Collaboration Technologies and Systems (CTS) 2014
DOI: 10.1109/cts.2014.6867577
|View full text |Cite
|
Sign up to set email alerts
|

A secure wake-up scheme for low power wireless sensor nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…But, this solution is not the optimized solution as further delay trade off will come into play. Delay can be further reduced by using advanced software scheme which is used to manage the switching of receiver in wireless communication application (Stecklina et al, 2014). Low duty cycle protocols (LDCPs) can be used for efficiently implementations.…”
Section: B Duty Cyclementioning
confidence: 99%
“…But, this solution is not the optimized solution as further delay trade off will come into play. Delay can be further reduced by using advanced software scheme which is used to manage the switching of receiver in wireless communication application (Stecklina et al, 2014). Low duty cycle protocols (LDCPs) can be used for efficiently implementations.…”
Section: B Duty Cyclementioning
confidence: 99%
“…The TinyVLIW8 processor core was initially designed for the SWUR presented in [2]. We started the SWUR with a pure software implementation.…”
Section: Soft-core Integrationmentioning
confidence: 99%
“…In context of the research project [1], we have implemented a concept of an ultra low power secure wake-up receiver [2]. In particular a wake-up receiver (WUR) is vulnerable against depletion attacks, in which a wake-up signal is sent repeatedly to drain the mote's power supply.…”
Section: Introductionmentioning
confidence: 99%
“…During the project we developed a secure wake-up scheme based on the time-based one-time password (TOTP) algorithm. The work was presented on the International Workshop on Mobile Systems and Sensor Networks for Collaboration in 2014 [SKM14]. I used this application within my Ph.D. thesis as an example of a secured TSS.…”
Section: Publications Related To This Workmentioning
confidence: 99%
“…But wireless wake-up receivers are vulnerable against depletion attacks in which a wake-up signal is sent repeatedly to deplete the mote's power supply. For the prevention of a simple replay of a wake-up sequence we implemented a SWUR that extends a common wake-up receiver with a security module that features a modified TOTP algorithm [SKM14,MMPR11]. The system is illustrated in Figure 2.6.…”
Section: A Secure Wake-up Receiver (Swur)mentioning
confidence: 99%