2019
DOI: 10.3390/s19204598
|View full text |Cite
|
Sign up to set email alerts
|

Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications

Abstract: Wireless sensor networks (WSN) have deeply influenced the working and living styles of human beings. Information security and privacy for WSN is particularly crucial. Cryptographic algorithms are extensively exploited in WSN applications to ensure the security. They are usually implemented in specific chips to achieve high data throughout with less computational resources. Cryptographic hardware should be rigidly tested to guarantee the correctness of encryption operation. Scan design improves significantly th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 48 publications
0
5
0
Order By: Relevance
“…[48][49][50] Thus, covert channels can be used as a countermeasure for transmitting confidential information in unsecure mobile networks. [51][52][53][54][55][56] Covert channels can outmenuver network security measures and stealthily transmit a covert message. 57,58 CTCs are constructed on features like inter-packet delays, packet sequence, and transmission schedule.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…[48][49][50] Thus, covert channels can be used as a countermeasure for transmitting confidential information in unsecure mobile networks. [51][52][53][54][55][56] Covert channels can outmenuver network security measures and stealthily transmit a covert message. 57,58 CTCs are constructed on features like inter-packet delays, packet sequence, and transmission schedule.…”
Section: Discussionmentioning
confidence: 99%
“…IoT has brought numerous benefits, but they also present significant privacy threats 48–50 . Thus, covert channels can be used as a countermeasure for transmitting confidential information in unsecure mobile networks 51–56 . Covert channels can outmenuver network security measures and stealthily transmit a covert message 57,58 .…”
Section: Related Workmentioning
confidence: 99%
“…A policy-based file access control scheme is proposed in References. 26,27 This scheme implements confidential data exchange, shared data access control, and resolve conflicts. And the data access in this scheme can be audited and verified.…”
Section: Related Workmentioning
confidence: 99%
“…In Table 6, the proposed method is compared with other protecting methods including, MKR [10], round register masking [14], SDFF_100 [16], dynamic obfuscation lock & key [17], onchip comparison [18], PUF-based lock & key [20], dynamic-key [22], DOS [23], and key masking lock & key (ISSATCU) [25] in terms of probability of a successful attack and area overhead. As can be seen in Table 6, the proposed method offers the highest achieved security with the lowest imposed area overhead.…”
Section: Security Analysismentioning
confidence: 99%
“…advanced encryption standard (AES) [10,[12][13][14], data encryption standard (DES) [9,11], and Rivest-Shamir-Adleman [15,16]. On the other hand, there are several countermeasures which attempt to protect crypto-chips against scan-based attacks in different ways such as mirror key register (MKR) [10], round register masking [14], state-dependent scan flip-flop (SDSFF) [15,16], dynamic obfuscation lock & key [17], on-chip key comparison [18,19], physically unclonable function (PUF)-based lock & key [20], dynamic scan [21], dynamic-key [22], dynamic obfuscation scan (DOS) [23], and key masking [24,25]. However, such countermeasures for scan-based attack tolerance suffer from one or more drawbacks which are described in the next section.…”
Section: Introductionmentioning
confidence: 99%