메뉴 건너뛰기




Volumn 45 LNICST, Issue , 2010, Pages 229-242

Stealthy compromise of wireless sensor nodes with power analysis attacks

Author keywords

Node compromise; Power analysis attacks; Wireless sensor networks

Indexed keywords

CRITICAL ISSUES; MODERATE COMPLEXITY; NODE COMPROMISE; POWER ANALYSIS ATTACK; SECURITY OF WIRELESS SENSOR NETWORKS; SIDE CHANNEL ATTACK; SIDE-CHANNEL; WIRELESS SENSOR; WIRELESS SENSOR NODE;

EID: 84884133172     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-16644-0_21     Document Type: Conference Paper
Times cited : (30)

References (30)
  • 1
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. ACM Commun 47(6), 53-57 (2004)
    • (2004) ACM Commun , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 2
    • 55749099619 scopus 로고    scopus 로고
    • On handling insider attacks in wireless sensor networks
    • Krauß, C., Schneider, M., Eckert, C.: On handling insider attacks in wireless sensor networks. Inf. Secur. Tech. Rep. 13(3), 165-172 (2008)
    • (2008) Inf. Secur. Tech. Rep. , vol.13 , Issue.3 , pp. 165-172
    • Krauß, C.1    Schneider, M.2    Eckert, C.3
  • 6
    • 38149142765 scopus 로고    scopus 로고
    • Detecting node compromise in hybrid WSN using attestation techniques
    • Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007, Springer, Heidelberg
    • Krauß, C., Stumpf, F., Eckert, C.M.: Detecting node compromise in hybrid WSN using attestation techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203-217. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4572 , pp. 203-217
    • Krauß, C.1    Stumpf, F.2    Eckert, C.M.3
  • 7
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 51(5), 541-552 (2002) (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 8
    • 27244449350 scopus 로고    scopus 로고
    • EM analysis of Rijndael and ECC on a wireless Java-based PDA
    • Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop. Proceedings
    • Gebotys, C.H., Ho, S., Tiu, C.C.: EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 250-264. Springer, Heidelberg (2005) (Pubitemid 41520710)
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 250-264
    • Gebotys, C.H.1    Ho, S.2    Tiu, C.C.3
  • 9
    • 38049074796 scopus 로고    scopus 로고
    • Power and em attacks on passive 13.56 MHz RFID devices
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007, Springer, Heidelberg
    • Hutter, M., Mangard, S., Feldhofer, M.: Power and EM attacks on passive 13.56 MHz RFID devices. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 320-333. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 320-333
    • Hutter, M.1    Mangard, S.2    Feldhofer, M.3
  • 12
    • 84871015447 scopus 로고    scopus 로고
    • Portfolio
    • CrossBow. Wireless Sensor Networks Module Portfolio, http://www.xbow.com/ Products/productdetails.aspx?sid=156
    • Wireless Sensor Networks Module
  • 20
    • 67049146380 scopus 로고    scopus 로고
    • Partition vs. comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices
    • Lee, P.J., Cheon, J.H. (eds.), ICISC 2008, Springer, Heidelberg
    • Standaert, F.-X., Gierlichs, B., Verbauwhede, I.: Partition vs. Comparison Side- Channel Distinguishers:an Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 253-267. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5461 , pp. 253-267
    • Standaert, F.-X.1    Gierlichs, B.2    Verbauwhede, I.3
  • 23
    • 35048818034 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • Joye, M., Quisquater, J.-J. (eds.), CHES 2004, Springer, Heidelberg
    • Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 25
    • 70350645332 scopus 로고    scopus 로고
    • Template attacks on ECDSA
    • Chung, K.-I., Sohn, K., Yung, M. (eds.), WISA 2008, Springer, Heidelberg
    • Medwed, M., Oswald, E.: Template attacks on ECDSA. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 14-27. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5379 , pp. 14-27
    • Medwed, M.1    Oswald, E.2
  • 26
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • April
    • Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN, pp. 245-256 (April 2008)
    • (2008) IPSN , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 28
    • 70350585044 scopus 로고    scopus 로고
    • Energy-efficient implementation of ECDH key exchange for wireless sensor networks
    • Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.), Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Springer, Heidelberg
    • Lederer, C., Mader, R., Koschuch, M., Großschdl, J., Szekely, A., Tillich, S.: Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. LNCS, vol. 5746, pp. 112-127. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5746 , pp. 112-127
    • Lederer, C.1    Mader, R.2    Koschuch, M.3    Großschdl, J.4    Szekely, A.5    Tillich, S.6
  • 29
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: SP 2005: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 49-63 (2005) (Pubitemid 41543646)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 30
    • 78650238574 scopus 로고    scopus 로고
    • ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
    • Smart Card Programming and Security
    • Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200-210. Springer, Heidelberg (2001) (Pubitemid 33340056)
    • (2001) Lecture Notes in Computer Science , Issue.2140 , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.