sensors-logo

Journal Browser

Journal Browser

Security of Sensor Network Systems and Circuits from a Hardware Perspective

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Intelligent Sensors".

Deadline for manuscript submissions: 25 August 2024 | Viewed by 6334

Special Issue Editors


E-Mail Website
Guest Editor
School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore
Interests: hardware security; AI security; biometric security; trustworthy sensing and hardware accelerators for post-quantum cryptography and edge computational intelligence
School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore
Interests: hardware security; fault injection attack; machine learning accelerator; VLSI design

E-Mail Website
Guest Editor
Chair of Computer Engineering, University of Passau, 94032 Passau, Germany
Interests: cryptographic protocols (design, analysis); cryptographic techniques for noisy and fuzzy data; secure critical infrastructures and railway security; physically unclonable functions; privacy enhancing technologies; watermarking; steganography and covert channels

Special Issue Information

Dear Colleagues,

Recent advances in Internet of Things (IoT) have launched a new generation of edge applications. A large amount of data, including audio, image, temperature, pressure and biometrics, need to be collected, processed and analyzed directly to a certain extent on the endpoint nodes. These emerging near-sensor and in-sensor computing paradigms mandate efficient hardware implementation for intelligence integration, amalgamating smart sensing and data analytics at the circuit and network level. As sensor data are the entry point of network systems, they are subject to more attack vectors and pose security and privacy threats to the connected systems and their users. There is a dire need to enhance the trustworthiness of intelligent sensing by integrating preventative and protective countermeasures into circuits and networks nearest to the sensors, if not directly from where the data are generated. Lightweight hardware roots of trust, embedded cryptography, efficient secure processors or co-processors and hardware-assisted authentication are promising directions in this light. Distributed intelligent sensor systems, especially artificially intelligent circuits and systems for networked computer vision applications, have also become attractive targets for physical attacks such as fault injection and side-channel attacks. Hardware-oriented local and remote attacks on distributed sensor networks and circuits are unique and require special countermeasures and protections. Securing sensor systems from a hardware perspective is therefore essential to establish reliable and trustworthy ubiquitous sensor networks (USN).

This Special Issue therefore aims to put together original research and review articles on recent advances, technologies, solutions, applications, and new challenges in the field of sensor network systems and circuits.

Potential topics include, but are not limited to:

  • Trustworthy sensing;
  • Hardware-enabled security on sensor systems or prototypes;
  • Security of in-sensor, near-sensor and approximate computing;
  • Security and privacy of smart sensor networks;
  • Secure systems, circuits and architectures;
  • Hardware security primitives;
  • Cryptographic circuits;
  • Embedded processors/co-processor for security;
  • Hardware-assisted authentication/communication;
  • Physical attacks (e.g., fault, side-channel);
  • Adversarial intrusion detection and countermeasures;
  • Emerging technologies for secure architecture and applications;
  • Design and verification of hardware for security.

Prof. Dr. Chip Hong Chang
Dr. Wenye Liu
Prof. Dr. Stefan Katzenbeisser
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • trustworthy sensing
  • hardware enabled security on sensor systems or prototypes
  • security of in-sensor, near-sensor and approximate computing
  • security and privacy of smart sensor networks
  • secure systems, circuits and architectures
  • hardware security primitives
  • cryptographic circuits
  • embedded processors/co-processor for security
  • hardware-assisted authentication/communications
  • physical attacks (e.g., fault, side-channel)
  • adversarial intrusion detection and countermeasures
  • emerging technologies for secure architecture and applications
  • design and verification of hardware for security

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

15 pages, 525 KiB  
Article
Deep Neural Network Quantization Framework for Effective Defense against Membership Inference Attacks
by Azadeh Famili and Yingjie Lao
Sensors 2023, 23(18), 7722; https://doi.org/10.3390/s23187722 - 07 Sep 2023
Viewed by 1014
Abstract
Machine learning deployment on edge devices has faced challenges such as computational costs and privacy issues. Membership inference attack (MIA) refers to the attack where the adversary aims to infer whether a data sample belongs to the training set. In other words, user [...] Read more.
Machine learning deployment on edge devices has faced challenges such as computational costs and privacy issues. Membership inference attack (MIA) refers to the attack where the adversary aims to infer whether a data sample belongs to the training set. In other words, user data privacy might be compromised by MIA from a well-trained model. Therefore, it is vital to have defense mechanisms in place to protect training data, especially in privacy-sensitive applications such as healthcare. This paper exploits the implications of quantization on privacy leakage and proposes a novel quantization method that enhances the resistance of a neural network against MIA. Recent studies have shown that model quantization leads to resistance against membership inference attacks. Existing quantization approaches primarily prioritize performance and energy efficiency; we propose a quantization framework with the main objective of boosting the resistance against membership inference attacks. Unlike conventional quantization methods whose primary objectives are compression or increased speed, our proposed quantization aims to provide defense against MIA. We evaluate the effectiveness of our methods on various popular benchmark datasets and model architectures. All popular evaluation metrics, including precision, recall, and F1-score, show improvement when compared to the full bitwidth model. For example, for ResNet on Cifar10, our experimental results show that our algorithm can reduce the attack accuracy of MIA by 14%, the true positive rate by 37%, and F1-score of members by 39% compared to the full bitwidth network. Here, reduction in true positive rate means the attacker will not be able to identify the training dataset members, which is the main goal of the MIA. Full article
Show Figures

Figure 1

18 pages, 1741 KiB  
Article
A Circuit-Level Solution for Secure Temperature Sensor
by Mashrafi Alam Kajol, Mohammad Mezanur Rahman Monjur and Qiaoyan Yu
Sensors 2023, 23(12), 5685; https://doi.org/10.3390/s23125685 - 18 Jun 2023
Viewed by 1165
Abstract
Temperature sensors play an important role in modern monitoring and control applications. When more and more sensors are integrated into internet-connected systems, the integrity and security of sensors become a concern and cannot be ignored anymore. As sensors are typically low-end devices, there [...] Read more.
Temperature sensors play an important role in modern monitoring and control applications. When more and more sensors are integrated into internet-connected systems, the integrity and security of sensors become a concern and cannot be ignored anymore. As sensors are typically low-end devices, there is no built-in defense mechanism in sensors. It is common that system-level defense provides protection against security threats on sensors. Unfortunately, high-level countermeasures do not differentiate the root of cause and treat all anomalies with system-level recovery processes, resulting in high-cost overhead on delay and power consumption. In this work, we propose a secure architecture for temperature sensors with a transducer and a signal conditioning unit. The proposed architecture estimates the sensor data with statistical analysis and generates a residual signal for anomaly detection at the signal conditioning unit. Moreover, complementary current–temperature characteristics are exploited to generate a constant current reference for attack detection at the transducer level. Anomaly detection at the signal conditioning unit and attack detection at the transducer unit make the temperature sensor attack resilient to intentional and unintentional attacks. Simulation results show that our sensor is capable of detecting an under-powering attack and analog Trojan from a significant signal vibration in the constant current reference. Furthermore, the anomaly detection unit detects anomalies at the signal conditioning level from the generated residual signal. The proposed detection system is resilient against any intentional and unintentional attacks, with a detection rate of 97.73%. Full article
Show Figures

Figure 1

21 pages, 951 KiB  
Article
A PUF-Based Key Storage Scheme Using Fuzzy Vault
by Jinrong Yang, Shuai Chen and Yuan Cao
Sensors 2023, 23(7), 3476; https://doi.org/10.3390/s23073476 - 26 Mar 2023
Cited by 1 | Viewed by 1661
Abstract
Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret [...] Read more.
Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in traditional security schemes. In contrast, this work shows that the fuzzy responses of both weak and strong PUFs can be used to secretly store the important data (e.g., the distributed keys) directly by an error-tolerant algorithm, Fuzzy Vault, without the traditional encryption algorithm and helper data scheme. The locking and unlocking methods of our proposal are designed to leverage the feature of weak and strong PUFs relatively. For the strong PUFs, our proposal is a new train of thought about how to leverage the advantage of strong PUFs (exponential number of challenge–response pairs) when used in the field. The evaluation was performed on existing weak PUF and strong PUF designs. The unlocking rate and runtime are tested under different parameters and environments. The test results demonstrate that our proposal can reach a 100% unlocking rate by parameter adjustment with less than 1 second of locking time and a few seconds of unlocking time. Finally, the tradeoff between security, reliability, and overhead of the new proposal is discussed. Full article
Show Figures

Figure 1

Review

Jump to: Research

34 pages, 594 KiB  
Review
A Review on Immune-Inspired Node Fault Detection in Wireless Sensor Networks with a Focus on the Danger Theory
by Dominik Widhalm , Karl M. Goeschka  and Wolfgang Kastner 
Sensors 2023, 23(3), 1166; https://doi.org/10.3390/s23031166 - 19 Jan 2023
Cited by 3 | Viewed by 1905
Abstract
The use of fault detection and tolerance measures in wireless sensor networks is inevitable to ensure the reliability of the data sources. In this context, immune-inspired concepts offer suitable characteristics for developing lightweight fault detection systems, and previous works have shown promising results. [...] Read more.
The use of fault detection and tolerance measures in wireless sensor networks is inevitable to ensure the reliability of the data sources. In this context, immune-inspired concepts offer suitable characteristics for developing lightweight fault detection systems, and previous works have shown promising results. In this article, we provide a literature review of immune-inspired fault detection approaches in sensor networks proposed in the last two decades. We discuss the unique properties of the human immune system and how the found approaches exploit them. With the information from the literature review extended with the findings of our previous works, we discuss the limitations of current approaches and consequent future research directions. We have found that immune-inspired techniques are well suited for lightweight fault detection, but there are still open questions concerning the effective and efficient use of those in sensor networks. Full article
Show Figures

Figure 1

Back to TopTop