Skip to main content

Novel Approach for Power Analysis in Microcontrollers

  • Chapter
  • First Online:
International Conference on Communication, Computing and Electronics Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 637))

  • 1048 Accesses

Abstract

Security showcases a major breakthrough in the history of the embedded systems, as the connections move beyond computing devices, from intelligent traffic management systems to missile control system. The drift of Internet protocol from version 4 to version 6 has greatly expanded the number of devices that could be connected over the Internet and it is estimated that it could accommodate three times the number of devices currently existing in the world. With this growing pace in embedded systems, security issues are an area of great concern. Objective of this approach examines the vulnerability of the commonly used ARM processor to a simple distributive embedded security—power analysis attack for difference and also making the role of service provider active by modifying the conventional security model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Balasch, J., Gierlichs, B., Verbauwhede, I.: An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs. In: FDTC, 2011, pp. 105–114. IEEE (2011)

    Google Scholar 

  2. Hutter, M., Schmidt, J.M.: The temperature side-channel and heating fault attacks. In: CARDIS. Springer (2013)

    Google Scholar 

  3. Moro, N., Dehbaoui, A., Heydemann, K., Robisson, B., Encrenaz, E.: Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller. In: FDTC, pp. 77–88. IEEE (2013)

    Google Scholar 

  4. Skorobogatov, S.P.: Semi-invasive attacks—a new approach to hardware security analysis. PhD thesis, University of Cambridge, Computer Laboratory (2005)

    Google Scholar 

  5. Zhai, X., Appiah, K., Ehsan, S., Howells, G., Hu, H., Gu, D., McDonald-Maier, K.D.: A method for detecting abnormal program behavior on embedded devices. IEEE Trans. Inf. Forensics Secur. 10(8), 327–345 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Muthu Subramanian, P., Rajeswari, A. (2020). Novel Approach for Power Analysis in Microcontrollers. In: Bindhu, V., Chen, J., Tavares, J. (eds) International Conference on Communication, Computing and Electronics Systems. Lecture Notes in Electrical Engineering, vol 637. Springer, Singapore. https://doi.org/10.1007/978-981-15-2612-1_50

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2612-1_50

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2611-4

  • Online ISBN: 978-981-15-2612-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics