An embedded sensor node microcontroller with crypto-processors

G Panić, O Stecklina, Z Stamenković - Sensors, 2016 - mdpi.com
Wireless sensor network applications range from industrial automation and control,
agricultural and environmental protection, to surveillance and medicine. In most …

Design of a tailor-made memory protection unit for low power microcontrollers

O Stecklina, P Langendörfer… - 2013 8th IEEE …, 2013 - ieeexplore.ieee.org
Low power microcontrollers are becoming more and more considered for a wide variety of
application scenarios. In modern industrial automation, medical systems, critical …

A methodology for designing low power sensor node hardware systems

G Panić - 2014 - opus4.kobv.de
The design of embedded sensor node hardware systems is a challenging task driven by the
increasing demands for low power, high efficiency, low cost and small size. These unique …

Design of a sensor node crypto processor for IEEE 802.15. 4 applications

G Panić, T Basmer, S Henry, S Peter… - 2012 IEEE …, 2012 - ieeexplore.ieee.org
The security emerges as a very important constraint for many wireless sensor network
applications. This paper presents the design of a sensor node processor supported by a …

TNODE: A low power sensor node processor for secure wireless networks

G Panić, O Schrape, T Basmer, F Vater… - … on System on Chip …, 2013 - ieeexplore.ieee.org
In this paper we describe a sensor node crypto processor designed for use in wireless
sensor networks with strong security demands. The presented system-on-chip is a mixed …

A tiny scale VLIW processor for real-time constrained embedded control tasks

O Stecklina, M Methfessel - 2014 17th Euromicro Conference …, 2014 - ieeexplore.ieee.org
In this paper we present the architectural design of the tiny scale very long instruction word
(VLIW) soft-core processor TinyVLIW8. The processor is designed to achieve a minimal …

Intrinsic code attestation by instruction chaining for embedded devices

O Stecklina, P Langendörfer, F Vater, T Kranz… - … Conference on Security …, 2015 - Springer
In this paper we present a novel approach to ensure that no malicious code can be executed
on resource constraint devices such as sensor nodes or embedded devices. The core idea …

Embedded low power clock generator for sensor nodes

O Schrape, F Vater - NORCHIP 2012, 2012 - ieeexplore.ieee.org
In this paper an embedded clock generation solution for low power sensor nodes is
presented. A design example of a Digitally Controlled Oscillator (DCO) is given and …

[PDF][PDF] A comprehensive and comparative study of elliptic curve cryptography hardware implementations for WSN

N Ghanmy, LC Fourati… - Int. J. RFID Secur …, 2014 - infonomics-society.org
Key management and authentication are essential modules for network security
provisioning especially for Wireless Sensor Networks (WSN). Make available these two …

A vehicle scheduling model and efficient algorithm for single bus line

J Xu, H Liu, J Teng - 2008 Workshop on Power Electronics and …, 2008 - ieeexplore.ieee.org
Based on analyzing the past research on vehicle scheduling in transit scheduling, a new
optimization model to minimize the total vehicle operation cost is proposed. This …