EU - TAMPRES - TAMper Resistant Sensor node

  • Hutter, Michael (Co-Investigator (CoI))
  • Kirschbaum, Mario (Co-Investigator (CoI))
  • Plos, Thomas (Co-Investigator (CoI))
  • Korak, Thomas (Co-Investigator (CoI))
  • Wenger, Erich (Co-Investigator (CoI))
  • Schmidt, Jörn-Marc (Principal Investigator (PI))

Project: Research project

Project Details

Description

As the Internet of Things becomes a reality the trustworthiness of all its components assumes the utmost importance. The trustworthiness of any system in the definition of call 5 i.e. security, reliability etc. depends on its weakest part. When wireless sensor nodes (WSN) are included in the Internet of Things then it is likely that one of the more vulnerable parts will be the wireless sensor nodes themselves. These devices can be attacked by standard network based approaches but also by physical means if they are left unattended in remote sites which is, after all, the preferred application for WSN. While much research effort has been spent on improving the network security of WSN, the protection of the nodes and especially their protection against physical attacks has been, until now, neglected. We are convinced that protecting the wireless sensor nodes is essential since compromised nodes put the whole system at risk. TAMPRES aims to significantly improve the trustworthiness of wireless sensor nodes. To achieve this goal we will investigate protection mechanisms in the following areas: Prevention of side-channel and fault-injection attacks: evaluation and development of appropriate counter measures while also considering the severe constraints of energy and silicon area. Provision of flawless implementation of light-weight cryptographic cores: development of secure and properly implemented light-weight cryptographic cores to provide uncompromised cryptographic strength to higher layers. Attack resistant system architecture: secure integration and partitioning of the whole system including hardware components and secure low level services. The range of protection mechanisms available will be evaluated by experiments with existing and recently manufactured ASICs. To ensure manufacturer independence, both the NXP and the IHP technology will be used to evaluate the results. TAMPRES will also integrate its findings in a methodology which supports system designers to select the correct means to protect their new devices.
Coordinator: IHP GmbH/ Leibniz Institut für innovative Mikroelektronik
StatusFinished
Effective start/end date1/10/1030/09/13

Fingerprint

Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
  • 8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors

    Wenger, E., Unterluggauer, T. & Werner, M., 2013, Progress in Cryptology - INDOCRYPT 2013, 14th International Conference on Cryptology in India, Mumbai, India, December 2013, Proceedings. Berlin Heidelberg: Springer, p. 244-261 (Lecture Notes in Computer Science; vol. 8250).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware

    Wenger, E., Korak, T. & Kirschbaum, M., 2013, RFID Security - RFIDSec 2013, 9th Workshop, Graz, Austria, July 9-11, 2013, Proceedings. Berlin, Heidelberg: Springer, p. 128-144 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • A Security-Enhanced UHF RFID Tag Chip

    Ertl, J., Plos, T., Feldhofer, M., Felber, N. & Henzen, L., 2013, (Accepted/In press) 16th Euromicro Conference on Digital System Design, DSD 2013. Heidelberg: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review