2019
DOI: 10.3390/s19081752
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Sensor Network Security with Improved Internal Hardware Design

Abstract: With the rapid development of the Internet-of-Things (IoT), sensors are being widely applied in industry and human life. Sensor networks based on IoT have strong Information transmission and processing capabilities. The security of sensor networks is progressively crucial. Cryptographic algorithms are widely used in sensor networks to guarantee security. Hardware implementations are preferred, since software implementations offer lower throughout and require more computational resources. Cryptographic chips sh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 43 publications
0
10
0
Order By: Relevance
“…(i) conditional probability of observing hamming weight of 9, 12, 23 or 24 at protected scan cells and (ii) conditional probability of observing hamming weight of 9, 12, 23, or 24 at unprotected scan cells. These two terms can be calculated by (3) and (4), respectively P(HW (9,12,23,24) HW ∈ protected cells) × P(protected cells)…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…(i) conditional probability of observing hamming weight of 9, 12, 23 or 24 at protected scan cells and (ii) conditional probability of observing hamming weight of 9, 12, 23, or 24 at unprotected scan cells. These two terms can be calculated by (3) and (4), respectively P(HW (9,12,23,24) HW ∈ protected cells) × P(protected cells)…”
Section: Security Analysismentioning
confidence: 99%
“…advanced encryption standard (AES) [10,[12][13][14], data encryption standard (DES) [9,11], and Rivest-Shamir-Adleman [15,16]. On the other hand, there are several countermeasures which attempt to protect crypto-chips against scan-based attacks in different ways such as mirror key register (MKR) [10], round register masking [14], state-dependent scan flip-flop (SDSFF) [15,16], dynamic obfuscation lock & key [17], on-chip key comparison [18,19], physically unclonable function (PUF)-based lock & key [20], dynamic scan [21], dynamic-key [22], dynamic obfuscation scan (DOS) [23], and key masking [24,25]. However, such countermeasures for scan-based attack tolerance suffer from one or more drawbacks which are described in the next section.…”
Section: Introductionmentioning
confidence: 99%
“…This can be reshuffled only after the system reset. Another countermeasure based on protection of cipher key is proposed in [30] for boundary scan design. These countermeasures in [28,29,30] are resistant to test-mode-only attack, but they also cause that the faults on the round key generation unit cannot be detected and thus reduce the reliability of cryptographic chips that pass the testing.…”
Section: Scan Design and Countermeasures Thwarting Scan Attacksmentioning
confidence: 99%
“…It is required that inserting the encryption hardware composed of the internal registers in the scan-chain architectures. The secure scan architecture of the cryptographic circuit reduces controllability and observability [ 11 , 12 ], reducing the accuracy of scan-chain diagnosis. Consequently, scan-chain diagnosis has become a crucial issue in semiconductor manufacturing for cryptographic circuits.…”
Section: Introductionmentioning
confidence: 99%