AES算法实现对物联网设备攻击的不变性

N. Ansari, R. Hussain, Syed Sajjad Hussain, Sheeraz Arif
{"title":"AES算法实现对物联网设备攻击的不变性","authors":"N. Ansari, R. Hussain, Syed Sajjad Hussain, Sheeraz Arif","doi":"10.1109/ICCOINS49721.2021.9497174","DOIUrl":null,"url":null,"abstract":"Internet-of-Things (IoT) establish connection between billions of smart devices, performing a diverse range of purposes. These devices embedded with sensors, software and network to exchange and collect data with each other. In IoT hardware security is the main task for researchers because large number of devices connected day by day with each other. As researchers concern, latest research is now focused on seeing attack and defensive site of IoT devices. Side channel attacks are one of the major concerns for researchers who work on IoT. This paper presents an implementation of AES algorithm with proposed false key mechanism and power reduction technique against SCA in IoT devices.","PeriodicalId":245662,"journal":{"name":"2021 International Conference on Computer & Information Sciences (ICCOINS)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Invariant of AES algorithm implementations against Attacks in IoT Devices\",\"authors\":\"N. Ansari, R. Hussain, Syed Sajjad Hussain, Sheeraz Arif\",\"doi\":\"10.1109/ICCOINS49721.2021.9497174\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet-of-Things (IoT) establish connection between billions of smart devices, performing a diverse range of purposes. These devices embedded with sensors, software and network to exchange and collect data with each other. In IoT hardware security is the main task for researchers because large number of devices connected day by day with each other. As researchers concern, latest research is now focused on seeing attack and defensive site of IoT devices. Side channel attacks are one of the major concerns for researchers who work on IoT. This paper presents an implementation of AES algorithm with proposed false key mechanism and power reduction technique against SCA in IoT devices.\",\"PeriodicalId\":245662,\"journal\":{\"name\":\"2021 International Conference on Computer & Information Sciences (ICCOINS)\",\"volume\":\"216 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computer & Information Sciences (ICCOINS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCOINS49721.2021.9497174\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computer & Information Sciences (ICCOINS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCOINS49721.2021.9497174","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)在数十亿智能设备之间建立连接,执行各种各样的目的。这些设备嵌入传感器、软件和网络,相互交换和收集数据。在物联网中,硬件安全是研究人员的主要任务,因为大量设备每天都在相互连接。正如研究人员所关注的,最新的研究现在集中在观察物联网设备的攻击和防御位置。侧信道攻击是研究物联网的研究人员主要关注的问题之一。本文提出了一种在物联网设备中采用伪密钥机制和防SCA降功耗技术实现AES算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Invariant of AES algorithm implementations against Attacks in IoT Devices
Internet-of-Things (IoT) establish connection between billions of smart devices, performing a diverse range of purposes. These devices embedded with sensors, software and network to exchange and collect data with each other. In IoT hardware security is the main task for researchers because large number of devices connected day by day with each other. As researchers concern, latest research is now focused on seeing attack and defensive site of IoT devices. Side channel attacks are one of the major concerns for researchers who work on IoT. This paper presents an implementation of AES algorithm with proposed false key mechanism and power reduction technique against SCA in IoT devices.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Student Interest in Understanding European History Through the Museum Virtual Tour 360 Mobile Application for Student Handbook Based on the Android Operating System Factors Influencing Blockchain Adoption in Government Organization : A Proposed Framework Investigation on IoT Intrusion Detection in Wireless Environment Analysis User Interface: Mobile Application to Blended Learning Model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1