메뉴 건너뛰기




Volumn , Issue , 2008, Pages 353-361

Securing sensor nodes against side channel attacks

Author keywords

[No Author keywords available]

Indexed keywords

OPEN ENVIRONMENTS; POWER GRIDS; SENSOR NODE (SN); SIDE CHANNEL ATTACK (SCA); SIDE CHANNELS; VOLCANO MONITORING;

EID: 58449135149     PISSN: 15302059     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HASE.2008.26     Document Type: Conference Paper
Times cited : (32)

References (39)
  • 1
    • 84868867635 scopus 로고    scopus 로고
    • http://www.home.agilent.com/agilent/home.jspx.
  • 2
    • 84868871881 scopus 로고    scopus 로고
    • http://www.moteiv.com.
  • 8
    • 0017792448 scopus 로고    scopus 로고
    • A. Avizienis and L. Chen. On the implementation of N-version programming for software fault-tolerance during program execution. In Proceedings of Intl. Computer software and Appl. Conf, pages 145-155, 1977
    • A. Avizienis and L. Chen. On the implementation of N-version programming for software fault-tolerance during program execution. In Proceedings of Intl. Computer software and Appl. Conf., pages 145-155, 1977.
  • 12
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • D. Boneh, R. A. DeMillo, and R. J. Lipton. On the importance of checking cryptographic protocols for faults, volume 1233, pages 37-51, 1997.
    • (1997) , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 13
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum. Blind signatures for untraceable payments. CRYPTO 82: Advances in Cryptology, pages 199-203, 1982.
    • (1982) CRYPTO 82: Advances in Cryptology , pp. 199-203
    • Chaum, D.1
  • 14
    • 3042527150 scopus 로고    scopus 로고
    • B. Chevallier-Mames, M. Ciet, and M. Joye. Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity, 53, pages 760-768, Los Alamitos, CA, USA, 2004. IEEE Computer Society.
    • B. Chevallier-Mames, M. Ciet, and M. Joye. Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity, volume 53, pages 760-768, Los Alamitos, CA, USA, 2004. IEEE Computer Society.
  • 15
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Technical Report 148, July
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, July 1997.
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 17
    • 0004777155 scopus 로고    scopus 로고
    • Resistance against implementation attacks: A comparative study of the ales proposals
    • Gaithersburg, MD, National Institute of Standards and Technology
    • J. Daemen and V. Rijmen. Resistance against implementation attacks: A comparative study of the ales proposals. In The Second AES Candidate Conference, pages 122-132, Gaithersburg, MD, 1999. National Institute of Standards and Technology.
    • (1999) The Second AES Candidate Conference , pp. 122-132
    • Daemen, J.1    Rijmen, V.2
  • 21
    • 58449097014 scopus 로고    scopus 로고
    • Blind attacks on engineering samples. Cryptology ePrint Archive
    • Report 2005/468
    • V. Gratzer and D. Naccache. Blind attacks on engineering samples. Cryptology ePrint Archive, Report 2005/468, 2005.
    • (2005)
    • Gratzer, V.1    Naccache, D.2
  • 24
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • Y. Ishai, A. Sahai, and D. Wagner. Private circuits: Securing hardware against probing attacks. In Proceedings of CRYPTO, pages 463-481, 2003.
    • (2003) Proceedings of CRYPTO , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 26
    • 67650658687 scopus 로고    scopus 로고
    • Design and validation strategies for obtaining assurance in countermeasures to power analysis and related attacks
    • sept
    • P. C. Kocher. Design and validation strategies for obtaining assurance in countermeasures to power analysis and related attacks. In NIST Physical Security workshop, sept 2005.
    • (2005) NIST Physical Security workshop
    • Kocher, P.C.1
  • 27
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In CRYPTO, pages 388-397, 1999.
    • (1999) CRYPTO , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 28
    • 84859015303 scopus 로고    scopus 로고
    • Soft tempest: Hidden data transmission using electromagnetic emanations
    • M. G. Kuhn and R. J. Anderson. Soft tempest: Hidden data transmission using electromagnetic emanations. In Information Hiding, pages 124-142, 1998.
    • (1998) Information Hiding , pp. 124-142
    • Kuhn, M.G.1    Anderson, R.J.2
  • 30
    • 1242304439 scopus 로고    scopus 로고
    • Protecting Java code via code obfuscation
    • D. Low. Protecting Java code via code obfuscation. Crossroads, 4(3):21-23, 1998.
    • (1998) Crossroads , vol.4 , Issue.3 , pp. 21-23
    • Low, D.1
  • 32
    • 77957948240 scopus 로고    scopus 로고
    • Improving smart-card security using self-timed circuit technology
    • S. Moore, R. Anderson, and M. Kuhn. Improving smart-card security using self-timed circuit technology. In Fourth ACiD-WG Workshop, Grenoble, pages 211-218, 2002.
    • (2002) Fourth ACiD-WG Workshop, Grenoble , pp. 211-218
    • Moore, S.1    Anderson, R.2    Kuhn, M.3
  • 33
    • 84962341811 scopus 로고    scopus 로고
    • Side channel attacks on message authentication codes
    • K. Okeya and T. Iwata. Side channel attacks on message authentication codes. IPSJ Digital Courier, 2:478-488, 2006.
    • (2006) IPSJ Digital Courier , vol.2 , pp. 478-488
    • Okeya, K.1    Iwata, T.2
  • 35
    • 58449118585 scopus 로고    scopus 로고
    • Acoustic cryptanalysis: On nosy people and noisy machines
    • A. Shamir and E. tromer. Acoustic cryptanalysis: on nosy people and noisy machines. In Proceedings of EURO-CRYPT, 2004.
    • (2004) Proceedings of EURO-CRYPT
    • Shamir, A.1    tromer, E.2
  • 36
    • 35248813476 scopus 로고    scopus 로고
    • Optical fault induction attacks
    • S. P. Skorobogatov and R. J. Anderson. Optical fault induction attacks. In CHES, pages 2-12, 2002.
    • (2002) CHES , pp. 2-12
    • Skorobogatov, S.P.1    Anderson, R.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.