Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices

被引:4
|
作者
Bang, A. O. [1 ]
Rao, Udai Pratap [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Comp Sci & Engn Dept, Surat 395007, Gujarat, India
来源
JOURNAL OF SUPERCOMPUTING | 2022年 / 78卷 / 08期
关键词
Security; IoT; White-box cryptography (WBC); Elliptic curve cryptography; Elliptic curve Diffie-Hellman key exchange (ECDH); Message queuing telemetry transport for sensor networks (MQTT-SN); Residue number system (RNS); SECURITY NOTIONS; CRYPTOGRAPHY; AES; IMPLEMENTATION;
D O I
10.1007/s11227-022-04322-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Along with significant benefits to the end-users, the Internet-of-Things (IoT) technology also brings unprecedented security challenges. IoT requires many embedded and resource-constrained devices that are usually deployed in an insecure and remote environment. This is where a White-box (WB) attack paradigm, where the attacker has complete control over the execution environment, comes into the picture. Accordingly, the possible capture of these devices makes the entire built-in cryptosystem visible to the adversary. Thus, the adversary gains complete control over the system and can potentially hinder the used cryptographic implementation. A White-box cryptographic (WBC) encryption scheme is employed to counter such WB attacks. Accordingly, we provide a scheme for hiding the private key used in the Elliptic curve encryption scheme considering the WB attack context. Precisely, we use Residue Number System (RNS)-based lookup tables to hide the private key. To show the practicality of the proposed scheme, we deploy it over a widely adopted Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) protocol. Further, we discuss the WB security goals and analyze the security and performance of the proposed scheme using the Cooja simulator. We demonstrate the feasibility of the proposed approach by comparing it with the traditional Elliptic curve encryption scheme over parameters like end-to-end delay, network throughput, average power consumption, and computational time. The obtained simulation results show that the proposed scheme provides a consistent computational cost and network efficiency, which is practical in deployments demanding a higher level of security.
引用
收藏
页码:11111 / 11137
页数:27
相关论文
共 50 条
  • [21] SRAM-PUF-Based Entities Authentication Scheme for Resource-Constrained IoT Devices
    Farha, Fadi
    Ning, Huansheng
    Ali, Karim
    Chen, Liming
    Nugent, Christopher
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5904 - 5913
  • [22] A Survey on Federated Learning for Resource-Constrained IoT Devices
    Imteaj, Ahmed
    Thakker, Urmish
    Wang, Shiqiang
    Li, Jian
    Amini, M. Hadi
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 1 - 24
  • [23] Attacks on Resource-Constrained IoT Devices and Security Solutions
    Sharma, Ravi
    Sharma, Nonita
    INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [24] A Distributed Security Mechanism for Resource-Constrained IoT Devices
    King, James
    Awad, Ali Ismail
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 133 - 143
  • [25] Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices
    Radhakrishnan, Indu
    Jadon, Shruti
    Honnavalli, Prasad B.
    SENSORS, 2024, 24 (12)
  • [26] Light-Weight White-Box Encryption Scheme with Random Padding for Wearable Consumer Electronic Devices
    Shi, Yang
    Wang, Xiaoping
    Fan, Hongfei
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2017, 63 (01) : 44 - 52
  • [27] A lightweight encryption algorithm for resource-constrained IoT devices using quantum and chaotic techniques with metaheuristic optimization
    Amer Aljaedi
    Adel R. Alharbi
    Abdullah Aljuhni
    Moahd K. Alghuson
    Shafi Alassmi
    Arslan Shafique
    Scientific Reports, 15 (1)
  • [28] Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices
    Lee, Sangjae
    Oh, Mi-Kyung
    Kang, Yousung
    Choi, Dooho
    SENSORS, 2020, 20 (02)
  • [29] Efficient Online Classification and Tracking on Resource-constrained IoT Devices
    Aftab, Muhammad
    Chau, Sid Chi-Kin
    Shenoy, Prashant
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2020, 1 (03):
  • [30] Low Latency Implementations of CNN for Resource-Constrained IoT Devices
    Mujtaba, Ahmed
    Lee, Wai-Kong
    Hwang, Seong Oun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (12) : 5124 - 5128