Tamper resistant sensor nodes
Wireless sensor nodes (WSN) are likely to be one of the more vulnerable parts of a sensor network. These devices can be attacked by "standard" network based approaches but also by physical means if they are left unattended in remote sites. While much research effort has been spent on improving the network security of WSN, the protection of the nodes and especially their protection against physical attacks has been, until now, neglected.
The objective of this project is to prevent physical attacks against sensor nodes, by developing means to improve the tamper resistance of these low cost devices without significantly increasing their cost. In a first phase that took place over the last 20 months, the project allowed defining cost effective countermeasures for the selected cryptographic primitives and designing a secure co-processor to be integrated in a sensor node prototype. The second phase will entail the analysis of the manufactured device's actual resistance against side-channel attacks and its integration in the prototype.
The research will take place in the framework of a European project involving high-level academic and industrial experts. The researcher will also benefit from the dynamic research environment of the UCL Crypto Group (Université catholique de Louvain), with strong interactions with researchers working on related subjects.
The candidate should hold a PhD in electronics, computer science or mathematics, with strong interests in algorithms and signal processing. A preliminary background in cryptology and side-channel attacks is an important asset.
Candidates are invited to send a resume and motivation letter to the following contact person:
Pr. Francois-Xavier Standaert -- fstandae at uclouvain.be