Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices

被引:4
|
作者
Bang, A. O. [1 ]
Rao, Udai Pratap [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Comp Sci & Engn Dept, Surat 395007, Gujarat, India
关键词
Security; IoT; White-box cryptography (WBC); Elliptic curve cryptography; Elliptic curve Diffie-Hellman key exchange (ECDH); Message queuing telemetry transport for sensor networks (MQTT-SN); Residue number system (RNS); SECURITY NOTIONS; CRYPTOGRAPHY; AES; IMPLEMENTATION;
D O I
10.1007/s11227-022-04322-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Along with significant benefits to the end-users, the Internet-of-Things (IoT) technology also brings unprecedented security challenges. IoT requires many embedded and resource-constrained devices that are usually deployed in an insecure and remote environment. This is where a White-box (WB) attack paradigm, where the attacker has complete control over the execution environment, comes into the picture. Accordingly, the possible capture of these devices makes the entire built-in cryptosystem visible to the adversary. Thus, the adversary gains complete control over the system and can potentially hinder the used cryptographic implementation. A White-box cryptographic (WBC) encryption scheme is employed to counter such WB attacks. Accordingly, we provide a scheme for hiding the private key used in the Elliptic curve encryption scheme considering the WB attack context. Precisely, we use Residue Number System (RNS)-based lookup tables to hide the private key. To show the practicality of the proposed scheme, we deploy it over a widely adopted Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) protocol. Further, we discuss the WB security goals and analyze the security and performance of the proposed scheme using the Cooja simulator. We demonstrate the feasibility of the proposed approach by comparing it with the traditional Elliptic curve encryption scheme over parameters like end-to-end delay, network throughput, average power consumption, and computational time. The obtained simulation results show that the proposed scheme provides a consistent computational cost and network efficiency, which is practical in deployments demanding a higher level of security.
引用
收藏
页码:11111 / 11137
页数:27
相关论文
共 50 条
  • [41] Analysis of Design space and Use case in IPv6 over NFC for Resource-constrained IoT devices
    Hong, YongGeun
    Choi, Younghwan
    Shin, Myungki
    Youn, Joosang
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1009 - 1012
  • [42] Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices
    Sethia, Divyashikha
    Shakya, Anadi
    Aggarwal, Ritik
    Bhayana, Saksham
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 951 - 957
  • [43] IoT-ID3PAKA: Efficient and Robust ID-3PAKA Protocol for Resource-Constrained IoT Devices
    Parai, Krittibas
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10304 - 10313
  • [44] Blockchain-Based Data Security and Sharing for Resource-Constrained Devices in Manufacturing IoT
    Tan, Jinbiao
    Shi, Jianhua
    Wan, Jiafu
    Dai, Hong-Ning
    Jin, Jiong
    Zhang, Rui
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25558 - 25567
  • [45] A Practical Self-Stabilizing Leader Election for Networks of Resource-Constrained IoT Devices
    Conard, Michael
    Ebnenasir, Ali
    2021 17TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2021), 2021, : 127 - 134
  • [46] Demystifying Blockchain Technology for Resource-Constrained IoT Devices: Parameters, Challenges and Future Perspective
    Romashkova, Inna
    Komarov, Mikhail
    Ometov, Aleksandr
    IEEE ACCESS, 2021, 9 : 129264 - 129277
  • [47] Lightweight Trust Management Scheme Based on Blockchain in Resource-Constrained Intelligent IoT Systems
    Deng, Min
    Lyu, Yuanlin
    Yang, Chunmeng
    Xu, Fang
    Ahmed, Manzoor
    Yang, Na
    Xu, Ze
    Ke, Can
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25706 - 25719
  • [48] A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network
    Akbar Morshed Aski
    Hamid Haj Seyyed Javadi
    Gholam Hassan Shirdel
    Wireless Personal Communications, 2020, 114 : 2079 - 2103
  • [49] A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network
    Aski, Akbar Morshed
    Javadi, Hamid Haj Seyyed
    Shirdel, Gholam Hassan
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (03) : 2079 - 2103
  • [50] LRBC: a lightweight block cipher design for resource constrained IoT devices
    Biswas, A.
    Majumdar, A.
    Nath, S.
    Dutta, A.
    Baishnab, K. L.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 14 (5) : 5773 - 5787