Download now Free registration required
Security requirements in sensor systems include resiliency against physical and side-channel attacks, low energy for communication, storage, and computation, and the ability to realize a variety of public-key protocols. Furthermore, primitives and protocols that enable trusted remote operation in terms of data, time, and location are essential to guarantee secure sensing. By integrating Physically Unclonable Functions (PUFs) directly into sensor hardware and using device aging to securely match groups of sensors, the authors enable a variety of ultra low power security protocols for trusted remote sensing, including authentication and public key communication.
- Format: PDF
- Size: 941.2 KB