Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices

被引:4
|
作者
Bang, A. O. [1 ]
Rao, Udai Pratap [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Comp Sci & Engn Dept, Surat 395007, Gujarat, India
来源
JOURNAL OF SUPERCOMPUTING | 2022年 / 78卷 / 08期
关键词
Security; IoT; White-box cryptography (WBC); Elliptic curve cryptography; Elliptic curve Diffie-Hellman key exchange (ECDH); Message queuing telemetry transport for sensor networks (MQTT-SN); Residue number system (RNS); SECURITY NOTIONS; CRYPTOGRAPHY; AES; IMPLEMENTATION;
D O I
10.1007/s11227-022-04322-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Along with significant benefits to the end-users, the Internet-of-Things (IoT) technology also brings unprecedented security challenges. IoT requires many embedded and resource-constrained devices that are usually deployed in an insecure and remote environment. This is where a White-box (WB) attack paradigm, where the attacker has complete control over the execution environment, comes into the picture. Accordingly, the possible capture of these devices makes the entire built-in cryptosystem visible to the adversary. Thus, the adversary gains complete control over the system and can potentially hinder the used cryptographic implementation. A White-box cryptographic (WBC) encryption scheme is employed to counter such WB attacks. Accordingly, we provide a scheme for hiding the private key used in the Elliptic curve encryption scheme considering the WB attack context. Precisely, we use Residue Number System (RNS)-based lookup tables to hide the private key. To show the practicality of the proposed scheme, we deploy it over a widely adopted Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) protocol. Further, we discuss the WB security goals and analyze the security and performance of the proposed scheme using the Cooja simulator. We demonstrate the feasibility of the proposed approach by comparing it with the traditional Elliptic curve encryption scheme over parameters like end-to-end delay, network throughput, average power consumption, and computational time. The obtained simulation results show that the proposed scheme provides a consistent computational cost and network efficiency, which is practical in deployments demanding a higher level of security.
引用
收藏
页码:11111 / 11137
页数:27
相关论文
共 50 条
  • [11] A New Feistel-Type White-Box Encryption Scheme
    Lin, Ting-Ting
    Lai, Xue-Jia
    Xue, Wei-Jia
    Jia, Yin
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2017, 32 (02) : 386 - 395
  • [12] A White-Box Encryption Scheme using Physically Unclonable Functions
    Rasoamiaramanana, Sandra
    Minier, Marine
    Macario-Rat, Gilles
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 279 - 286
  • [13] A New Feistel-Type White-Box Encryption Scheme
    Ting-Ting Lin
    Xue-Jia Lai
    Wei-Jia Xue
    Yin Jia
    Journal of Computer Science and Technology, 2017, 32 : 386 - 395
  • [14] Butterfly Encryption Scheme for Resource-Constrained Wireless Networks
    Sampangi, Raghav V.
    Sampalli, Srinivas
    SENSORS, 2015, 15 (09) : 23145 - 23167
  • [15] SIMECK-T: An Ultra-Lightweight Encryption Scheme for Resource-Constrained Devices
    Anton, Alin-Adrian
    Csereoka, Petra
    Capota, Eugenia-Ana
    Cioarga, Razvan-Dorel
    APPLIED SCIENCES-BASEL, 2025, 15 (03):
  • [16] Masked encryption algorithm mCrypton for resource-constrained devices
    Karpinskyy, M.
    Korkishko, L.
    Furmanyuk, A.
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 628 - +
  • [17] SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT
    Shi, Yang
    Wei, Wujing
    Zhang, Fangguo
    Luo, Xiapu
    He, Zongjian
    Fan, Hongfei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 1602 - 1616
  • [18] Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices
    Ibrahim, Nahla
    Agbinya, Johnson
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [19] End-to-End Encryption in Resource-Constrained IoT Device
    Alluhaidan, Ala Saleh D.
    Prabu, P.
    IEEE ACCESS, 2023, 11 : 70040 - 70051
  • [20] Ring-ExpLWE: A High-Performance and Lightweight Post-Quantum Encryption Scheme for Resource-Constrained IoT Devices
    Xu, Dongdong
    Wang, Xiang
    Hao, Yuanchao
    Zhang, Zhun
    Hao, Qiang
    Jia, Haoyu
    Dong, Haifeng
    Zhang, Longbing
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (23): : 24122 - 24134