2016
DOI: 10.3390/s16050607
|View full text |Cite
|
Sign up to set email alerts
|

An Embedded Sensor Node Microcontroller with Crypto-Processors

Abstract: Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 53 publications
0
12
0
Order By: Relevance
“…Once a user becomes part of a logical group, it can generate all of the subgroup keys to access the subscribed resources. As shown in Figure 3, 3 in cluster 1 is subscribed to 1 , 2 , and , which Common Resources This article is accepted for the publication in "Cluster Computing-The Journal of Networks, Software Tools and Applications" ISSN: 1386-7857 (Print) 1573-7543 (Online) 5 indicates that 3 is part of one major group as well as three subgroups. When it leaves cluster 1 and joins cluster 2 as 4 , cluster 1 runs leave protocol while cluster 2 runs join protocol.…”
Section: A Reference Framework For Sgrsmentioning
confidence: 99%
See 3 more Smart Citations
“…Once a user becomes part of a logical group, it can generate all of the subgroup keys to access the subscribed resources. As shown in Figure 3, 3 in cluster 1 is subscribed to 1 , 2 , and , which Common Resources This article is accepted for the publication in "Cluster Computing-The Journal of Networks, Software Tools and Applications" ISSN: 1386-7857 (Print) 1573-7543 (Online) 5 indicates that 3 is part of one major group as well as three subgroups. When it leaves cluster 1 and joins cluster 2 as 4 , cluster 1 runs leave protocol while cluster 2 runs join protocol.…”
Section: A Reference Framework For Sgrsmentioning
confidence: 99%
“…Various protocols have been proposed for securely and efficiently establishing a secret cryptographic key among group members. The protocols developed thus far can be categorized into three broad categories, as follows: 1) Centralized key distribution and management systems, 2) decentralized key distribution and management systems, and 3) distributed key distribution and management systems [2][3][4][5]. In the centralized approach [11,12], the overall key management complexity is low from the standpoint of a group participant; however, the centralized key management entity is associated with heavy computational and communicational complexity.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors were concerned with memory consumption and the use of computational resources, with the main objective of evaluating the feasibility of the implementation. Panić et al [29] presented a micro-controller specifically designed to support WSN applications with severe security demands. The authors tested the developed chip with known cryptographic algorithms (ECC, AES and SHA-1), observing the execution time, security level and power consumption.…”
Section: Related Workmentioning
confidence: 99%