- Cryptographic Implementations and Security
- Cryptography and Data Security
- Chaos-based Image/Signal Encryption
- Security and Verification in Computing
- Wireless Body Area Networks
- Coding theory and cryptography
- Energy Efficient Wireless Sensor Networks
- Complexity and Algorithms in Graphs
- Cryptography and Residue Arithmetic
- Cloud Data Security Solutions
- Physical Unclonable Functions (PUFs) and Hardware Security
- Privacy-Preserving Technologies in Data
- Embedded Systems Design Techniques
- Virtual Reality Applications and Impacts
- Interactive and Immersive Displays
- Advanced Malware Detection Techniques
- Augmented Reality Applications
- Low-power high-performance VLSI design
- Molecular Communication and Nanonetworks
- Air Quality Monitoring and Forecasting
- IoT and Edge/Fog Computing
- Energy Harvesting in Wireless Networks
- Distributed systems and fault tolerance
- Bluetooth and Wireless Communication Technologies
- Security in Wireless Sensor Networks
Kudelski (Switzerland)
2022-2023
CEA LETI
2021
CEA Grenoble
2021
Commissariat à l'Énergie Atomique et aux Énergies Alternatives
2021
Université Grenoble Alpes
2021
Radboud University Nijmegen
2014-2017
Vrije Universiteit Brussel
2010-2013
Vrije Universiteit Amsterdam
2013
In this manuscript, we present a survey of designs and implementations research sensor nodes that rely on FPGAs, either based upon standalone platforms or as combination microcontroller FPGA. Several current challenges in networks are distinguished linked to the features modern FPGAs. As it turns out, low-power optimized FPGAs able enhance computation several types algorithms terms speed power consumption comparison microcontrollers commercial nodes. We show architectures FPGA can play key...
Wireless Sensor Networks (WSNs) have permeated the entire fabric of academic disciplines that greatly rely on control and decision-making processes such as medical health care, agriculture, ecology industrial automation. In ecology, an infrastructure consisting networks interconnected sensors can provide in-situ high-precision monitoring natural phenomena at a large-scale. Moreover, WSNs number advantages to ecoinformatics possibility constructing quality datasets coupled machine...
In the last years, a number of research sensor nodes based on combination low-power microcontrollers and FPGAs have been proposed. these platforms, serve as accelerators complex algorithms, making it possible to process vast amount sensing data in real time. medical applications that rely sensors, both privacy security are utmost importance. However, execution cryptographic primitives solely upon clocked at low frequency can affect overall power consumption platform. this manuscript, we...
Measuring efficiency is difficult. In the last decades, several works have contributed in quest to successfully determine and compare of pairing-based attribute-based encryption (ABE) schemes. However, many these are limited: they use little no optimizations, or underlying pairingfriendly elliptic curves that do not provide sufficient security anymore. Hence, using benchmark ABE schemes does yield accurate results. Furthermore, most design papers focus on one important aspect. For instance,...
Typically, commercial sensor nodes are equipped with MCUsclocked at a low-frequency (i.e., within the 4-12 MHz range). Consequently, executing cryptographic algorithms in those MCUs generally requires huge amount of time. In this respect, required energy consumption can be higher than using separate accelerator based on Field-programmable Gate Array (FPGA) that is switched when needed. manuscript, we present design suitable for an FPGA-based node and compliant IEEE802.15.4 standard. All...
In this manuscript, we have explored how the use of DSP blocks in implementation two authenticated-encryption modes AES can optimize PAR figures. Our results reflect that a 20.98 % reduction slice utilization be achieved at throughput higher than 25 Mbps (12 MHz) Artix-7 XC7A200TL FPGA.
In this paper, we present the design of a baseband System-On-Chip for tracking applications in medical environment based on IEEE 802.15.4 standard which can be used to track patient location hospitals. It utilizes an ARM Cortex-M1 soft-core, 16 kb SRAM and bus architecture AHB-Lite specification. The MAC primitives are implemented Flash-ROM 32 kb. hardware verification was done Actel M1AFS1500 130 nm LVCMOS FPGA. total logic usage FPGA 81 % (31142 core cells). power consumption...
Attribute-based encryption (ABE) is a popular type of public-key that enforces access control cryptographically, and has spurred the proposal many use cases. To satisfy requirements setting, tailor-made schemes are often introduced. However, designing secure schemes---as well as verifying they secure---is notoriously hard. Several these have turned out to be broken, making them dangerous deploy in practice.
In this paper, we present the design of a cryptographic core compliant with IEEE 802.15.4 standard and based on FPGA. We have addressed several security problems that remain yet problematic concerning implementation suites access control list (ACL). The consists three components: compact AES-CCM architecture, content-addressable memory (CAM) implements an (ACL) modular exponentiation unit Montgomery arithmetic. can be used to perform key agreement variant Diffie-Hellman Key Exchange (DHKE)....
Field programmable gate arrays (FPGAs) are generally used in sensor networks for accelerating complex algorithms, either at node or gateway level. The apparition of FPGAs the market equipped with special blocks performing logic operations high-speed and reduced utilization platform fabric, allows implementation a number algorithms mainly based on these embedded resources. In this manuscript, we have focused Xilinx Artix-7 platform. We evaluated how replacing functions GF(2 <sup...
The Internet of Things (IoT) paradigm has been proposed in the last few years with goal addressing technical problems fields such as home and industrial automation, smart lighting systems traffic monitoring. However, due to very nature IoT devices (generally low-powered often lacking strong security functionalities), typical deployments pose a great risk terms privacy. In this respect, utilization both Trusted Execution Environment (TEE) Platform Module (TPM) can serve countermeasure against...