Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices

被引:4
|
作者
Bang, A. O. [1 ]
Rao, Udai Pratap [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Comp Sci & Engn Dept, Surat 395007, Gujarat, India
来源
JOURNAL OF SUPERCOMPUTING | 2022年 / 78卷 / 08期
关键词
Security; IoT; White-box cryptography (WBC); Elliptic curve cryptography; Elliptic curve Diffie-Hellman key exchange (ECDH); Message queuing telemetry transport for sensor networks (MQTT-SN); Residue number system (RNS); SECURITY NOTIONS; CRYPTOGRAPHY; AES; IMPLEMENTATION;
D O I
10.1007/s11227-022-04322-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Along with significant benefits to the end-users, the Internet-of-Things (IoT) technology also brings unprecedented security challenges. IoT requires many embedded and resource-constrained devices that are usually deployed in an insecure and remote environment. This is where a White-box (WB) attack paradigm, where the attacker has complete control over the execution environment, comes into the picture. Accordingly, the possible capture of these devices makes the entire built-in cryptosystem visible to the adversary. Thus, the adversary gains complete control over the system and can potentially hinder the used cryptographic implementation. A White-box cryptographic (WBC) encryption scheme is employed to counter such WB attacks. Accordingly, we provide a scheme for hiding the private key used in the Elliptic curve encryption scheme considering the WB attack context. Precisely, we use Residue Number System (RNS)-based lookup tables to hide the private key. To show the practicality of the proposed scheme, we deploy it over a widely adopted Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) protocol. Further, we discuss the WB security goals and analyze the security and performance of the proposed scheme using the Cooja simulator. We demonstrate the feasibility of the proposed approach by comparing it with the traditional Elliptic curve encryption scheme over parameters like end-to-end delay, network throughput, average power consumption, and computational time. The obtained simulation results show that the proposed scheme provides a consistent computational cost and network efficiency, which is practical in deployments demanding a higher level of security.
引用
收藏
页码:11111 / 11137
页数:27
相关论文
共 50 条
  • [1] Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices
    A. O. Bang
    Udai Pratap Rao
    The Journal of Supercomputing, 2022, 78 : 11111 - 11137
  • [2] An Ultra-Lightweight White-Box Encryption Scheme for Securing Resource-constrained IoT Devices
    Shi, Yang
    Wei, Wujing
    He, Zongjian
    Fan, Hongfei
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 16 - 29
  • [3] Design Prototype and Security Analysis of a Lightweight Joint Compression and Encryption Scheme for Resource-Constrained IoT Devices
    Kuldeep, Gajraj
    Zhang, Qi
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 165 - 181
  • [4] Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices
    Noura, Hassan
    Couturier, Raphael
    Pham, Congduc
    Chehab, Ali
    2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [5] An Efficient Container Management Scheme for Resource-Constrained Intelligent IoT Devices
    Chhikara, Prateek
    Tekchandani, Rajkumar
    Kumar, Neeraj
    Obaidat, Mohammad S.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12597 - 12609
  • [6] A Lightweight XMPP Publish/Subscribe Scheme for Resource-Constrained IoT Devices
    Wang, Heng
    Xiong, Daijin
    Wang, Ping
    Liu, Yuqiang
    IEEE ACCESS, 2017, 5 : 16393 - 16405
  • [7] White-Box cryptography based data encryption-decryption scheme for IoT environment
    Saha, Arunima
    Srinivasan, Chungath
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 637 - 641
  • [8] Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices
    Ince, Cemile
    Ince, Kenan
    Hanbay, Davut
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (29) : 72789 - 72817
  • [9] A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices
    Shi, Yang
    Wei, Wujing
    Fan, Hongfei
    Au, Man Ho
    Luo, Xiapu
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (10) : 1411 - 1427
  • [10] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18