Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices

被引:4
|
作者
Bang, A. O. [1 ]
Rao, Udai Pratap [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Comp Sci & Engn Dept, Surat 395007, Gujarat, India
关键词
Security; IoT; White-box cryptography (WBC); Elliptic curve cryptography; Elliptic curve Diffie-Hellman key exchange (ECDH); Message queuing telemetry transport for sensor networks (MQTT-SN); Residue number system (RNS); SECURITY NOTIONS; CRYPTOGRAPHY; AES; IMPLEMENTATION;
D O I
10.1007/s11227-022-04322-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Along with significant benefits to the end-users, the Internet-of-Things (IoT) technology also brings unprecedented security challenges. IoT requires many embedded and resource-constrained devices that are usually deployed in an insecure and remote environment. This is where a White-box (WB) attack paradigm, where the attacker has complete control over the execution environment, comes into the picture. Accordingly, the possible capture of these devices makes the entire built-in cryptosystem visible to the adversary. Thus, the adversary gains complete control over the system and can potentially hinder the used cryptographic implementation. A White-box cryptographic (WBC) encryption scheme is employed to counter such WB attacks. Accordingly, we provide a scheme for hiding the private key used in the Elliptic curve encryption scheme considering the WB attack context. Precisely, we use Residue Number System (RNS)-based lookup tables to hide the private key. To show the practicality of the proposed scheme, we deploy it over a widely adopted Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) protocol. Further, we discuss the WB security goals and analyze the security and performance of the proposed scheme using the Cooja simulator. We demonstrate the feasibility of the proposed approach by comparing it with the traditional Elliptic curve encryption scheme over parameters like end-to-end delay, network throughput, average power consumption, and computational time. The obtained simulation results show that the proposed scheme provides a consistent computational cost and network efficiency, which is practical in deployments demanding a higher level of security.
引用
收藏
页码:11111 / 11137
页数:27
相关论文
共 50 条
  • [31] Toward Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices
    Nunes, Ivan De Oliveira
    Jakkamsetti, Sashidhar
    Rattanavipanon, Norrathep
    Tsudik, Gene
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (07) : 58 - 64
  • [32] Public Blockchains for Resource-Constrained IoT Devices-A State-of-the-Art Survey
    Khor, Jing Huey
    Sidorov, Michail
    Woon, Peh Yee
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15) : 11960 - 11982
  • [33] RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices
    Lee, Sangjae
    Oh, Mi-Kyung
    Kang, Yousung
    Choi, Dooho
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 275 - 285
  • [34] Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks
    Chauhan, Jagmohan
    Seneviratne, Suranga
    Hu, Yining
    Misra, Archan
    Seneviratne, Aruna
    Lee, Youngki
    COMPUTER, 2018, 51 (05) : 60 - 67
  • [35] Design, Implementation, and Practical Evaluation of a Voice Recognition Based IoT Home Automation System for Low-Resource Languages and Resource-Constrained Edge IoT Devices: A System for Galician and Mobile Opportunistic Scenarios
    Froiz-Miguez, Ivan
    Fraga-Lamas, Paula
    Fernandez-Carames, Tiago M.
    IEEE ACCESS, 2023, 11 : 63623 - 63649
  • [36] Soft Error Reliability Assessment of Neural Networks on Resource-constrained IoT Devices
    Abich, Geancarlo
    Gaya, Jonas
    Reis, Ricardo
    Ost, Luciano
    2020 27TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2020,
  • [37] A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices
    Lara, Evangelina
    Aguilar, Leocundo
    Garcia, Jesus A.
    Sanchez, Mauricio A.
    SENSORS, 2018, 18 (10)
  • [38] Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices
    Ullah, Shafi
    Zahilah, Raja
    CYBERSECURITY, 2021, 4 (01)
  • [39] A Performance Evaluation of Data Protection Mechanisms for Resource Constrained IoT Devices
    Lachner, Clemens
    Dustdar, Schahram
    2019 IEEE INTERNATIONAL CONFERENCE ON FOG COMPUTING (ICFC 2019), 2019, : 47 - 52
  • [40] Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices
    Hijawi, Ula
    Unal, Devrim
    Hamila, Ridha
    Gastli, Adel
    Ellabban, Omar
    IEEE ACCESS, 2021, 9 : 5640 - 5650