More secure Internet of Things using robust encryption algorithms against side channel attacks

L. Tawalbeh, T. Al-Somani
{"title":"More secure Internet of Things using robust encryption algorithms against side channel attacks","authors":"L. Tawalbeh, T. Al-Somani","doi":"10.1109/AICCSA.2016.7945813","DOIUrl":null,"url":null,"abstract":"There are many recent revolutionary advances in information technology that include: wireless communication, the spread of mobile devices, and the Internet-of-Things (IoT). IoT will have an important role in connecting almost everything (mobile devices, cameras, home appliances, healthcare devices, military equipments, …, etc) to the Internet via different communication technologies such as Wi-Fi. This connection will have impact on many sectors of our life such as industry, economy, social life, and ICT sector. Moreover, there will be huge amounts of data (including financial and medical records for example) transmitted between those devices and the non-secure Internet. Some of these data might be very sensitive and their privacy and security must not be compromised. Here comes the need for Cryptographic systems to protect the vital data. There are many hardware and software implementations for the symmetric and asymmetric cryptographic algorithms such as AES, Elliptic Curve Cryptography, and RSA. And since we are talking about protecting physical devices connected to the Internet, we think that the hardware cryptosystems are more useful to be used in this case. In this paper, we introduce the IoT concept, applications, and challenges facing IoT. Then, we present the recent timing and fault Side Channel Attacks on cryptosystem implementations for the most secure encryption algorithms (AES, ECC, and RSA). Also, the countermeasures to protect these cryptosystems from such attacks are also presented.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICCSA.2016.7945813","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23

Abstract

There are many recent revolutionary advances in information technology that include: wireless communication, the spread of mobile devices, and the Internet-of-Things (IoT). IoT will have an important role in connecting almost everything (mobile devices, cameras, home appliances, healthcare devices, military equipments, …, etc) to the Internet via different communication technologies such as Wi-Fi. This connection will have impact on many sectors of our life such as industry, economy, social life, and ICT sector. Moreover, there will be huge amounts of data (including financial and medical records for example) transmitted between those devices and the non-secure Internet. Some of these data might be very sensitive and their privacy and security must not be compromised. Here comes the need for Cryptographic systems to protect the vital data. There are many hardware and software implementations for the symmetric and asymmetric cryptographic algorithms such as AES, Elliptic Curve Cryptography, and RSA. And since we are talking about protecting physical devices connected to the Internet, we think that the hardware cryptosystems are more useful to be used in this case. In this paper, we introduce the IoT concept, applications, and challenges facing IoT. Then, we present the recent timing and fault Side Channel Attacks on cryptosystem implementations for the most secure encryption algorithms (AES, ECC, and RSA). Also, the countermeasures to protect these cryptosystems from such attacks are also presented.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
更安全的物联网使用强大的加密算法对抗侧信道攻击
最近在信息技术方面有许多革命性的进步,包括:无线通信、移动设备的普及和物联网(IoT)。物联网将在通过不同的通信技术(如Wi-Fi)将几乎所有东西(移动设备、相机、家用电器、医疗设备、军事设备等)连接到互联网方面发挥重要作用。这种连接将对我们生活的许多领域产生影响,如工业、经济、社会生活和信息通信技术领域。此外,在这些设备和不安全的互联网之间将传输大量数据(例如包括财务和医疗记录)。其中一些数据可能非常敏感,他们的隐私和安全绝不能受到损害。这就需要加密系统来保护重要数据。有许多硬件和软件实现对称和非对称加密算法,如AES、椭圆曲线加密和RSA。既然我们讨论的是保护连接到互联网的物理设备,我们认为硬件加密系统在这种情况下更有用。本文介绍了物联网的概念、应用以及物联网面临的挑战。然后,我们介绍了最近对最安全的加密算法(AES, ECC和RSA)的密码系统实现的定时和故障侧信道攻击。同时,提出了保护密码系统免受此类攻击的对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Foreword — Message from the general chairs Towards a framework for customer emotion detection Development of a thematic and structural elements grid for e-government strategies: Case study of Swiss cantons Complementary features for traffic sign detection and recognition Priority-MAC: A priority based medium access control solution with QoS for WSN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1