Key propagation in wireless sensor networks
G Dini, L Lopriore - Computers & Electrical Engineering, 2015 - Elsevier
With reference to a network consisting of sensor nodes connected by wireless links, we
approach the problem of the distribution of the cryptographic keys. We present a solution …
approach the problem of the distribution of the cryptographic keys. We present a solution …
Design of a tailor-made memory protection unit for low power microcontrollers
O Stecklina, P Langendörfer… - 2013 8th IEEE …, 2013 - ieeexplore.ieee.org
Low power microcontrollers are becoming more and more considered for a wide variety of
application scenarios. In modern industrial automation, medical systems, critical …
application scenarios. In modern industrial automation, medical systems, critical …
Hardware support for memory protection in sensor nodes
L Lopriore - Microprocessors and Microsystems, 2014 - Elsevier
With reference to the typical hardware configuration of a sensor node, we present the
architecture of a memory protection unit (MPU) designed as a low-complexity addition to the …
architecture of a memory protection unit (MPU) designed as a low-complexity addition to the …
Towards a secure address space separation for low power sensor nodes
O Stecklina, P Langendörfer, H Menzel - International Conference on …, 2011 - scitepress.org
Wireless sensor networks are becoming more and more considered for application in real
world systems such as automation control, critical infrastructure protection and the like. By …
world systems such as automation control, critical infrastructure protection and the like. By …
Privileged mode methods and circuits for processor systems
H Van Antwerpen - US Patent 9,262,340, 2016 - Google Patents
(57) ABSTRACT A system can include a processor coupled to a bus; a first memory coupled
to the bus, configured to limit access to a privileged portion according to at least protection …
to the bus, configured to limit access to a privileged portion according to at least protection …
DSR: a fair and efficient access protocol for ring-topology MANs
A Bondavalli, L Strigini - IEEE INFCOM'91-Communications Societies …, 1991 - computer.org
A new media access control (MAC) protocol for ring-topology metropolitan network (MANs)
is defined. The destination-stripping dual ring (DSDR) is defined for slotted-medium dual …
is defined. The destination-stripping dual ring (DSDR) is defined for slotted-medium dual …
A secure isolation of software activities in tiny scale systems
O Stecklina - 2015 IEEE International Conference on Pervasive …, 2015 - ieeexplore.ieee.org
All visions of pervasive computing share the idea of smart, small, and cheap devices that
improve our everyday life. Their applications typically fall under sensor-based …
improve our everyday life. Their applications typically fall under sensor-based …