2023 IEEE International Symposium on Circuits and Systems (ISCAS) 2023
DOI: 10.1109/iscas46773.2023.10182133
|View full text |Cite
|
Sign up to set email alerts
|

Attack-Resilient Temperature Sensor Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Different operations within finite fields, such as multiplication, addition, inversion, and squaring, can be susceptible to error detection methods. While fault detection techniques have been investigated for cryptographic systems [20]- [33] there has been relatively little research dedicated to fault detection specifically at the algorithmic level of Montgomery ladder ECSM. Dominguez-Oviedo et al [34] and [35] presented fault detection schemes at the algorithm level for Montgomery ladder and double-and-add-always scalar multiplication.…”
Section: A Related Workmentioning
confidence: 99%
“…Different operations within finite fields, such as multiplication, addition, inversion, and squaring, can be susceptible to error detection methods. While fault detection techniques have been investigated for cryptographic systems [20]- [33] there has been relatively little research dedicated to fault detection specifically at the algorithmic level of Montgomery ladder ECSM. Dominguez-Oviedo et al [34] and [35] presented fault detection schemes at the algorithm level for Montgomery ladder and double-and-add-always scalar multiplication.…”
Section: A Related Workmentioning
confidence: 99%
“…In this work, a secured design for a temperature sensor is proposed to address the security issues affecting the BTMS of EVs. The proposed architecture consists of two secure units, one unit (transducer) sensing the temperature in a wide range and detecting fault attacks [ 19 ], and another unit leveraging a statistical method to generate an anomaly detection signal. Our secure architecture can identify and isolate the compromised sensing node based on these two secure units.…”
Section: Introductionmentioning
confidence: 99%