Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices

被引:4
|
作者
Bang, A. O. [1 ]
Rao, Udai Pratap [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Comp Sci & Engn Dept, Surat 395007, Gujarat, India
关键词
Security; IoT; White-box cryptography (WBC); Elliptic curve cryptography; Elliptic curve Diffie-Hellman key exchange (ECDH); Message queuing telemetry transport for sensor networks (MQTT-SN); Residue number system (RNS); SECURITY NOTIONS; CRYPTOGRAPHY; AES; IMPLEMENTATION;
D O I
10.1007/s11227-022-04322-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Along with significant benefits to the end-users, the Internet-of-Things (IoT) technology also brings unprecedented security challenges. IoT requires many embedded and resource-constrained devices that are usually deployed in an insecure and remote environment. This is where a White-box (WB) attack paradigm, where the attacker has complete control over the execution environment, comes into the picture. Accordingly, the possible capture of these devices makes the entire built-in cryptosystem visible to the adversary. Thus, the adversary gains complete control over the system and can potentially hinder the used cryptographic implementation. A White-box cryptographic (WBC) encryption scheme is employed to counter such WB attacks. Accordingly, we provide a scheme for hiding the private key used in the Elliptic curve encryption scheme considering the WB attack context. Precisely, we use Residue Number System (RNS)-based lookup tables to hide the private key. To show the practicality of the proposed scheme, we deploy it over a widely adopted Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) protocol. Further, we discuss the WB security goals and analyze the security and performance of the proposed scheme using the Cooja simulator. We demonstrate the feasibility of the proposed approach by comparing it with the traditional Elliptic curve encryption scheme over parameters like end-to-end delay, network throughput, average power consumption, and computational time. The obtained simulation results show that the proposed scheme provides a consistent computational cost and network efficiency, which is practical in deployments demanding a higher level of security.
引用
收藏
页码:11111 / 11137
页数:27
相关论文
共 50 条
  • [21] Efficient Elliptic Curve Diffie-Hellman Key Exchange for Resource-Constrained IoT Devices
    Tanksale, Vinayak
    ELECTRONICS, 2024, 13 (18)
  • [22] Information management for trust computation on resource-constrained IoT devices
    Bradbury, Matthew
    Jhumka, Arshad
    Watson, Tim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 135 : 348 - 363
  • [23] Privacy Preservation in Resource-Constrained IoT Devices Using Blockchain-A Survey
    Iftikhar, Zainab
    Javed, Yasir
    Zaidi, Syed Yawar Abbas
    Shah, Munam Ali
    Khan, Zafar Iqbal
    Mussadiq, Shafaq
    Abbasi, Kamran
    ELECTRONICS, 2021, 10 (14)
  • [24] A Novel Revocable Lightweight Authentication Scheme for Resource-Constrained Devices in Cyber-Physical Power Systems
    Li, Xue
    Jiang, Cheng
    Du, Dajun
    Fei, Minrui
    Wu, Lei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 5280 - 5292
  • [25] Encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads
    Boakye-Boateng, Kwasi
    Kuada, Eric
    Antwi-Boasiako, Emmanuel
    Djaba, Emmanuel
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 3925 - 3933
  • [26] An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices
    Wu, Xin-Wen
    Farag, Waleed
    Ali, Sanwar
    Kulkarni, Siddhivinayak
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 679 - 685
  • [27] Performance evaluation of Attribute-Based Encryption on constrained IoT devices*
    Perazzo, Pericle
    Righetti, Francesca
    La Manna, Michele
    Vallati, Carlo
    COMPUTER COMMUNICATIONS, 2021, 170 : 151 - 163
  • [28] Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices
    Mursi, Khalid T.
    Zhuang, Yu
    Alkatheiri, Mohammed Saeed
    Aseeri, Ahmad O.
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 135 - 143
  • [29] Area and power efficient post-quantum cryptosystem for IoT resource-constrained devices
    Shahbazi, Karim
    Ko, Seok-Bum
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 84
  • [30] Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices
    Zhou, Lei
    Fu, Anmin
    Yang, Guomin
    Gao, Yansong
    Yu, Shui
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4325 - 4342