2022
DOI: 10.3389/fsens.2022.850056
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Security in Sensor and its Networks

Abstract: Sensor networks and IoT systems have been widely deployed in monitoring and controlling system. With its increasing utilization, the functionality and performance of sensor networks and their applications are not the only design aims; security issues in sensor networks attract more and more attentions. Security threats in sensor and its networks could be originated from various sectors: users in cyber space, security-weak protocols, obsolete network infrastructure, low-end physical devices, and global supply c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…The prediction of possible noisy trend is important also to find possible hardware analog Trojans [33][34][35].…”
Section: Intentional Manumissionmentioning
confidence: 99%
“…The prediction of possible noisy trend is important also to find possible hardware analog Trojans [33][34][35].…”
Section: Intentional Manumissionmentioning
confidence: 99%
“…From the security point of view, the SN begins at sensors. If data reliability shall be guaranteed then all sensors have to be secured from the HW and SW point of view [6]. The HW security is essential in order to prevent any unauthorized change of parts containing the SW, which could possibly compromise the measured data.…”
Section: Environmentmentioning
confidence: 99%
“…The embedding of Hardware Trojans, backdoors, and other malicious circuits within counterfeit integrated circuits (ICs) poses a significant threat, endangering the security, confidentiality, and availability of electronic systems [22]. This underscores the critical need for rigorous hardware security measures, including supply chain oversight, secure manufacturing processes, and state-of-the-art counterfeit detection technologies, to forestall unauthorized access [23], data breaches [24], or system malfunctions [25].…”
Section: Hardware Securitymentioning
confidence: 99%