Low-power and area-optimized VLSI implementation of AES coprocessor for Zigbee system

Published on Jan 1, 2009
Li1
Estimated H-index: 1
,
Zhen-rong1
Estimated H-index: 1
+ 5 AuthorsGang1
Estimated H-index: 1
Source
Abstract
一个低力量、便宜的先进加密标准(AES ) 协处理器为 Zigbee system-on-a-chip (SoC ) 被建议设计。建议 AES 协处理器的费用和电源消费被优化 SubBytes/InvSubBytes 和 MixColumns/InvMixColumns 的体系结构更加减少,由资源分享的方法一起集成加密和解密过程,并且基于有限州的机器( FSM )和钟使用层次电源管理策略 gating ( CG )技术。把 m 基于 SMIC 0.18 互补金属氧化物半导体(互补金属氧化物半导体) 技术, AES 协处理器的规模仅仅是大约 10.5 kgate,相应电源消费是 69.1 W/MHz,和产量是 32 Mb/s,它为 Zigbee 合理、足够系统。与另外的图案相比,建议体系结构消费更少的电源和少数硬件资源,它对 Zigbee 系统和另外的便携式的设备导致。
📖 Papers frequently viewed together
2006
9 Authors (Wang, ..., Jiang)
2 Authors (H. Mangalam)
References0
Newest
Cited By4
Newest
Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
#1Benni PurnamaH-Index: 3
#2SharipuddinH-Index: 1
Last. Darmawijoyo HanapiH-Index: 1
view all 6 authors...
Internet of Things (IoT) networks operators may not be fully aware whether each IoT device in their network is functioning safe enough from cyber-attacks. This paper develops an IoT traffic dataset with the purpose of of network traffic analytics to characterize IoT devices, including their typical behaviour mode. We set up an IoT environment/testbed consists of several sensors/nodes and uses Zigbee communication protocol to collect and synthesize traffic traces. Normal dataset and anomaly/attac...
Source
A new architecture for encrypting and decrypting the confidential data using Advanced Encryption Standard algorithm is presented in this article. This structure combines the folded structure with parallel architecture to increase the throughput. The whole architecture achieved high throughput with less power. The proposed architecture is implemented in 0.13-µm Complementary metal–oxide–semiconductor (CMOS) technology. The proposed structure is compared with different existing structures, and fro...
Source
#1Siwei Peng (Beijing University of Posts and Telecommunications)H-Index: 1
#2Baojiang Cui (Beijing University of Posts and Telecommunications)H-Index: 1
Last. Yiying Zhang (Beijing University of Posts and Telecommunications)H-Index: 1
view all 5 authors...
Due to the hostile environment, open communication and implementation vulnerability, ZigBee is vulnerable to various attacks. But there are few effective vulnerability detection methods. In this paper, we design the ZigBee Border Conditions Based Tester ZBCBT to detect vulnerabilities on MAC layer. It generates elaborated frames test cases transmitting to the target nodes. Based on ZBCBT, we present a ZigBee Border Conditions Algorithm ZBCA and a hostile test framework HTF for better test perfor...
Source
#1Ao Luo (THU: Tsinghua University)H-Index: 2
#2Shouyi Yin (THU: Tsinghua University)H-Index: 22
Last. Shaojun Wei (THU: Tsinghua University)H-Index: 21
view all 5 authors...
This article presents the hardware software co-optimized implementation of the IEEE 802.15.4 protocol for a Wireless image Sensor Network (WiSN) node SoC. In order to to minimize the power consumption and hardware software implementation cost, a power and cost aware partition scheme is introduced. Then the optimized hardware accelerator is designed and validated with software driver/stack based on TinyOS platform. The IP is integrated and verified in the SoC for wireless image sensor network. Th...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.