2016 IEEE International Symposium on Circuits and Systems (ISCAS) 2016
DOI: 10.1109/iscas.2016.7538981
|View full text |Cite
|
Sign up to set email alerts
|

Hardware security assurance in emerging IoT applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(28 citation statements)
references
References 9 publications
0
27
0
Order By: Relevance
“…In addition to above-mentioned methods, Jaya et al [36] propose a lightweight dynamic permutation technique to protect integrated circuits from both Trojan and side-channel attacks by dynamically changing the real order of data coming from sensors.…”
Section: Hardware Trojan Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to above-mentioned methods, Jaya et al [36] propose a lightweight dynamic permutation technique to protect integrated circuits from both Trojan and side-channel attacks by dynamically changing the real order of data coming from sensors.…”
Section: Hardware Trojan Detectionmentioning
confidence: 99%
“…• Prevent revealing critical information: This guideline suggests that each IoT object should be shielded with specific techniques such as a side-channel analysis to prevent unauthorized attempts to reveal its critical information. Different patterns like power analysis can be used by an attacker to expose sensitive information of an object, even when its messages are encrypted [36]. • Use hardware identifier and authentication: This guideline suggests that each IoT object should be integrated with a unique unforgettable identity not separable from its hardware [10].…”
mentioning
confidence: 99%
“…Prevent unwanted IC modifications [3] An IoT object should be armed with a mechanism to detect malicious modifications on its IC Side channel analysis (e.g., dynamic permutation [43])and hardware-based solutions Table 11. A summary of the suggested guidelines for communication layer along with their countermeasures…”
Section: Cryptographic Schemesmentioning
confidence: 99%
“…It must be noted that the inputs and the outputs of the AES and ECC functions are based on radix-2 8 and radix-2 32 representations, respectively. Radix-2 8 is used since the AES algorithm performs 8-bit operations, while, radix-2 32 is considered for ECC algorithms not only because the ARM is a 32-bit microprocessor but also for the AXI 32-bit bus where data/instruction are transferred digit-by-digit in serial mode. The representation of large numbers in radix 2 8 and radix 2 32 is performed in Python based on the ctypes.c_int library.…”
Section: Software Developmentmentioning
confidence: 99%