SCA security verification on wireless sensor network node

He, Wei and Pizarro, Carlos and Torre Arnanz, Eduardo de la and Portilla Berrueco, Jorge and Riesgo Alcaide, Teresa (2011). SCA security verification on wireless sensor network node. In: "Microtechnologies for the New Millennium 2011 (SPIE)", 18/04/2011 - 22/04/2011, Praga, República Checa. pp. 1-15.

Description

Title: SCA security verification on wireless sensor network node
Author/s:
  • He, Wei
  • Pizarro, Carlos
  • Torre Arnanz, Eduardo de la
  • Portilla Berrueco, Jorge
  • Riesgo Alcaide, Teresa
Item Type: Presentation at Congress or Conference (Article)
Event Title: Microtechnologies for the New Millennium 2011 (SPIE)
Event Dates: 18/04/2011 - 22/04/2011
Event Location: Praga, República Checa
Title of Book: Proceedings of Microtechnologies for the New Millennium 2011 (SPIE)
Date: 2011
Subjects:
Faculty: E.T.S.I. Industriales (UPM)
Department: Automática, Ingeniería Electrónica e Informática Industrial [hasta 2014]
Creative Commons Licenses: Recognition - No derivative works - Non commercial

Full text

[img]
Preview
PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (2MB) | Preview

Abstract

Side Channel Attack (SCA) differs from traditional mathematic attacks. It gets around of the exhaustive mathematic calculation and precisely pin to certain points in the cryptographic algorithm to reveal confidential information from the running crypto-devices. Since the introduction of SCA by Paul Kocher et al [1], it has been considered to be one of the most critical threats to the resource restricted but security demanding applications, such as wireless sensor networks. In this paper, we focus our work on the SCA-concerned security verification on WSN (wireless sensor network). A detailed setup of the platform and an analysis of the results of DPA (power attack) and EMA (electromagnetic attack) is presented. The setup follows the way of low-cost setup to make effective SCAs. Meanwhile, surveying the weaknesses of WSNs in resisting SCA attacks, especially for the EM attack. Finally, SCA-Prevention suggestions based on Differential Security Strategy for the FPGA hardware implementation in WSN will be given, helping to get an improved compromise between security and cost.

More information

Item ID: 13561
DC Identifier: http://oa.upm.es/13561/
OAI Identifier: oai:oa.upm.es:13561
Official URL: http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1351135
Deposited by: Memoria Investigacion
Deposited on: 16 Oct 2012 11:49
Last Modified: 21 Apr 2016 12:53
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM