Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices

被引:4
|
作者
Bang, A. O. [1 ]
Rao, Udai Pratap [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Comp Sci & Engn Dept, Surat 395007, Gujarat, India
关键词
Security; IoT; White-box cryptography (WBC); Elliptic curve cryptography; Elliptic curve Diffie-Hellman key exchange (ECDH); Message queuing telemetry transport for sensor networks (MQTT-SN); Residue number system (RNS); SECURITY NOTIONS; CRYPTOGRAPHY; AES; IMPLEMENTATION;
D O I
10.1007/s11227-022-04322-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Along with significant benefits to the end-users, the Internet-of-Things (IoT) technology also brings unprecedented security challenges. IoT requires many embedded and resource-constrained devices that are usually deployed in an insecure and remote environment. This is where a White-box (WB) attack paradigm, where the attacker has complete control over the execution environment, comes into the picture. Accordingly, the possible capture of these devices makes the entire built-in cryptosystem visible to the adversary. Thus, the adversary gains complete control over the system and can potentially hinder the used cryptographic implementation. A White-box cryptographic (WBC) encryption scheme is employed to counter such WB attacks. Accordingly, we provide a scheme for hiding the private key used in the Elliptic curve encryption scheme considering the WB attack context. Precisely, we use Residue Number System (RNS)-based lookup tables to hide the private key. To show the practicality of the proposed scheme, we deploy it over a widely adopted Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) protocol. Further, we discuss the WB security goals and analyze the security and performance of the proposed scheme using the Cooja simulator. We demonstrate the feasibility of the proposed approach by comparing it with the traditional Elliptic curve encryption scheme over parameters like end-to-end delay, network throughput, average power consumption, and computational time. The obtained simulation results show that the proposed scheme provides a consistent computational cost and network efficiency, which is practical in deployments demanding a higher level of security.
引用
收藏
页码:11111 / 11137
页数:27
相关论文
共 50 条
  • [1] Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices
    A. O. Bang
    Udai Pratap Rao
    The Journal of Supercomputing, 2022, 78 : 11111 - 11137
  • [2] An Ultra-Lightweight White-Box Encryption Scheme for Securing Resource-constrained IoT Devices
    Shi, Yang
    Wei, Wujing
    He, Zongjian
    Fan, Hongfei
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 16 - 29
  • [3] Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices
    Noura, Hassan
    Couturier, Raphael
    Pham, Congduc
    Chehab, Ali
    2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [4] Attacks on Resource-Constrained IoT Devices and Security Solutions
    Sharma, Ravi
    Sharma, Nonita
    INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [5] A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
    Kumar, Sunil
    Kumar, Dilip
    Dangi, Ramraj
    Choudhary, Gaurav
    Dragoni, Nicola
    You, Ilsun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 31 - 63
  • [6] A New Feistel-Type White-Box Encryption Scheme
    Lin, Ting-Ting
    Lai, Xue-Jia
    Xue, Wei-Jia
    Jia, Yin
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2017, 32 (02) : 386 - 395
  • [7] An Efficient Container Management Scheme for Resource-Constrained Intelligent IoT Devices
    Chhikara, Prateek
    Tekchandani, Rajkumar
    Kumar, Neeraj
    Obaidat, Mohammad S.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12597 - 12609
  • [8] End-to-End Encryption in Resource-Constrained IoT Device
    Alluhaidan, Ala Saleh D.
    Prabu, P.
    IEEE ACCESS, 2023, 11 : 70040 - 70051
  • [9] Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices
    Radhakrishnan, Indu
    Jadon, Shruti
    Honnavalli, Prasad B.
    SENSORS, 2024, 24 (12)
  • [10] A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices
    Shi, Yang
    Wei, Wujing
    Fan, Hongfei
    Au, Man Ho
    Luo, Xiapu
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (10) : 1411 - 1427