• Aucun résultat trouvé

The goal of the thesis is to design and implement a consistent security solution for the deployable GreenNet technology

N/A
N/A
Protected

Academic year: 2022

Partager "The goal of the thesis is to design and implement a consistent security solution for the deployable GreenNet technology"

Copied!
1
0
0

Texte intégral

(1)

STMicroelectronics and Grenoble INP/LIG Laboratory invite applications for a CIFRE PhD Student position (36 months):

Secured communications in GreenNets, energy harvested wireless sensor networks

GreenNet nodes are composed of STM32 ULP microprocessors, 2.4Ghz radio, and various MEMS sensors. The nodes communicate over a wireless channel and form a multi-hop network. They harvest their energy by means of a photovoltaic cell. The protocol stack needs to take into account this requirement by close coupling with the underlying hardware to obtain the right balance between consumed and harvested energy.

The small size of the nodes and the distributed nature of the network make it vulnerable because it is relatively easy to physically grasp and control at least one node in the network.

So, security has to be addressed at all protocol levels starting from from the physical one, up to the TCP/IP transport level. Nodes are likely to have hardware support for encryption, decryption, and integrity check processing. The software above the link layer can use the hardware support.

The goal of the thesis is to design and implement a consistent security solution for the deployable GreenNet technology.

The thesis requires competence in existing building blocks, namely, IEEE 802.15.4 PHY and MAC layers, routing protocols for wireless sensor networks, open software such as Contiki Operating System, as well as a strong background in security.

Pay Grade: 1st year 2270, 2nd year 2490, 3rd year 2700 euros gross.

Applicants should send a detailed curriculum and the names of 3 references to

<mailto:Andrzej.Duda@imag.fr>

Closing date for applications: June 15th, 2012. Expected starting date: Ocrober 1, 2012.  

Références

Documents relatifs

The generated MiXiM source code from the protocol model is then used as the MAC protocol, and other modules (application/routing) are used to complete the node software architecture

Figure 4.11 – Generated intra-operative virtual bronchoscopies for 3 representative sketch sequences: images from Pareto front epochs in green frame and images from non-Pareto epochs

Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks.. Tahir Naeem 1.2 , Kok-Keong

Dans ce chapitre, nous proposons SR3 (Secure and Resilient Reputation-based Routing), un algorithme de routage s´ecuris´e et r´esilient pour le routage convergeant (tous-vers- un)

Chapters 2 and 3 propose two concepts of Adaptive Optics deformable mirrors, intended to be used as secondary corrector to compensate for manufacturing errors, gravity release

In (15), we have proposed a multi-path routing protocol (FEAR for Fair Energy Aware Routing) where each sensor node uses multiple paths to route its data to the sink.. Our protocol

The study attempts to confirm that the students of English Department, Mentouri University of Constantine are not aware of the strategies suggested by the theorists such as

de nœuds, avec un taux d’activité de 0.5 % (à gauche) et un taux d’activité de 1 % (à droite) lorsque la période de génération de trafic est de 5 s, pour les protocoles de