{"title":"Security primitives and protocols for ultra low power sensor systems","authors":"Saro Meguerdichian, M. Potkonjak","doi":"10.1109/ICSENS.2011.6127375","DOIUrl":null,"url":null,"abstract":"Security requirements in sensor systems include resiliency against physical and side-channel attacks, low energy for communication, storage, and computation, and the ability to realize a variety of public-key protocols. Furthermore, primitives and protocols that enable trusted remote operation in terms of data, time, and location are essential to guarantee secure sensing. By integrating physically unclonable functions (PUFs) directly into sensor hardware and using device aging to securely match groups of sensors, we enable a variety of ultra low power security protocols for trusted remote sensing, including authentication and public key communication.","PeriodicalId":201386,"journal":{"name":"2011 IEEE SENSORS Proceedings","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE SENSORS Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSENS.2011.6127375","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
Security requirements in sensor systems include resiliency against physical and side-channel attacks, low energy for communication, storage, and computation, and the ability to realize a variety of public-key protocols. Furthermore, primitives and protocols that enable trusted remote operation in terms of data, time, and location are essential to guarantee secure sensing. By integrating physically unclonable functions (PUFs) directly into sensor hardware and using device aging to securely match groups of sensors, we enable a variety of ultra low power security protocols for trusted remote sensing, including authentication and public key communication.