| Literature DB >> 27128925 |
Goran Panić1, Oliver Stecklina2, Zoran Stamenković3.
Abstract
Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed.Entities:
Keywords: cryptography; processor; security; sensor node; system-on-chip
Year: 2016 PMID: 27128925 PMCID: PMC4883298 DOI: 10.3390/s16050607
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Attacks will try to compromise the security on all communication layers.
Security attacks and countermeasures in wireless sensor networks.
| Network Layer | Security Attack | Countermeasure |
|---|---|---|
| Physical | Jamming | Spread-spectrum, frequency hopping |
| Tampering | Tamper-proof design | |
| Link | Collisions | Error-correcting codes |
| Exhaustion | Data rate limits, time division multiplexing | |
| Unfairness | Short frames | |
| Network and Routing | Spoofing, altering, replaying | Authentication, link-layer encryption |
| Sinkholes | Authentication, link-layer encryption | |
| Wormholes | Authentication, geographic routing, tight synchronisation | |
| Sybil | Authentication, public key cryptography | |
| Selective forwarding | Authentication, link-layer encryption, multipath routing | |
| HELLO attack | Authentication, bidirectional link and identity verification | |
| Acknowledge spoofing | Authentication | |
| Transport | Flooding | Client puzzles, authenticated broadcast |
| Desynchronization | Authentication | |
| Application | Stimuli attack | Authentication |
| Packet injection | Authentication |
Figure 2Architecture of TNODE5 microcontroller.
Comparison of different ECC implementations.
| Architecture | Binary Field | Frequency (MHz) | Technology Node (nm) | Runtime (Cycles) | Power (µW) | Energy (µJ) | |
|---|---|---|---|---|---|---|---|
| [ | Dedicated Hardware | ECC-133 | 0.5 | 130 | 57,720 | 30 | 3.46 |
| [ | Dedicated Hardware | ECC-163 | 0.5 | 130 | 95,159 | n.a. | n.a. |
| [ | Software | ECC-163 | 1 | 130 | 7,216,905 | 49.1 | 354.35 |
| [ | Dedicated Hardware | ECC-163 | 1 | 130 | 54,376 | 181.7 | 9.9 |
| [ | Drop-in Module | ECC-163 | 1 | 130 | 182,130 | 70 | 12.8 |
| This Work | Dedicated Hardware | ECC-233 | 20 | 250 | 13,164 | 6230 | 4.1 |
Figure 3Hash generation flow.
Cell area of TNODE5 components estimated after synthesis.
| Chip Component | Cell Area (mm2) | Percent (%) |
|---|---|---|
| Flash | 5 | 37.6 |
| RAM | 3.3 | 24.8 |
| ECC | 1.45 | 10.9 |
| ADC | 1.23 | 9.2 |
| Baseband | 0.53 | 3.9 |
| Uart1 + Uart2 | 0.4 | 3 |
| SHA-1 | 0.37 | 2.8 |
| CPU | 0.3 | 2.3 |
| AES | 0.25 | 1.9 |
| Flash Controller | 0.12 | 0.9 |
| Timer (32 bit) | 0.11 | 0.8 |
| Timer (16 bit) | 0.075 | 0.6 |
| SPI1 + SPI2 | 0.048 | 0.4 |
| P1 + P2 | 0.048 | 0.4 |
| P3 + P4 | 0.022 | 0.2 |
| DCO | 0.024 | 0.2 |
| Bus Control | 0.018 | 0.1 |
Figure 4Layout of the TNODE5 chip.
Figure 5TNODE5 testbench: (1) Test execution from Flash; (2) Test execution via I2C debug port.
Post-layout power estimation of TNODE5 microcontroller.
| Operation | Logic (mW) | ADC (mW) | Flash (mW) | Total (mW) |
|---|---|---|---|---|
| SHA-1 Calculation | 0.98 | 6 | 7.6 | 14.58 |
| AES Decryption | 1.18 | 6 | 7.6 | 14.78 |
| AES Encryption | 1.25 | 6 | 7.6 | 14.85 |
| ECC Point Multiplication | 2.68 | 6 | 7.6 | 16.28 |
| ECC First Point Inversion | 2.11 | 6 | 7.6 | 15.71 |
| ECC Second Point Inversion | 2.06 | 6 | 7.6 | 15.66 |
| Transmit Mode | 0.69 | 6 | 7.6 | 14.29 |
| Receive Mode | 0.71 | 6 | 7.6 | 14.31 |
| SPI | 0.98 | 6 | 7.6 | 14.58 |
Post-production power measurements of TNODE5 chip at a frequency of 1 MHz.
| Test @ 1 MHz | PVDDCORE (mW) | PVDDPAD (mW) | PVDDA (mW) | PVDDM (mW) | PTOTAL (mW) |
|---|---|---|---|---|---|
| Rx | 7.5954 | 3.3426 | 1.7194 | 2.2422 | 14.8996 |
| Tx | 7.2630 | 3.0922 | 1.7236 | 2.2540 | 14.3328 |
| Crypto | 7.6204 | 2.8366 | 1.7292 | 2.2747 | 14.4609 |
| SPI | 6.0176 | 3.2306 | 1.7163 | 2.2625 | 13.2270 |
Post-production power measurements of TNODE5 chip at a frequency of 10 MHz.
| Test @ 10 MHz | PVDDCORE (mW) | PVDDPAD (mW) | PVDDA (mW) | PVDDM (mW) | PTOTAL (mW) |
|---|---|---|---|---|---|
| Rx | 13.5437 | 3.3492 | 1.0595 | 2.2430 | 20.1954 |
| Tx | 13.8279 | 3.2426 | 1.0635 | 2.2525 | 20.3865 |
| Crypto | 26.582 | 3.3108 | 1.0602 | 2.1442 | 33.0972 |
| SPI | 14.0432 | 4.6625 | 1.0572 | 2.2842 | 22.0471 |