Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices

被引:4
|
作者
Bang, A. O. [1 ]
Rao, Udai Pratap [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Comp Sci & Engn Dept, Surat 395007, Gujarat, India
来源
JOURNAL OF SUPERCOMPUTING | 2022年 / 78卷 / 08期
关键词
Security; IoT; White-box cryptography (WBC); Elliptic curve cryptography; Elliptic curve Diffie-Hellman key exchange (ECDH); Message queuing telemetry transport for sensor networks (MQTT-SN); Residue number system (RNS); SECURITY NOTIONS; CRYPTOGRAPHY; AES; IMPLEMENTATION;
D O I
10.1007/s11227-022-04322-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Along with significant benefits to the end-users, the Internet-of-Things (IoT) technology also brings unprecedented security challenges. IoT requires many embedded and resource-constrained devices that are usually deployed in an insecure and remote environment. This is where a White-box (WB) attack paradigm, where the attacker has complete control over the execution environment, comes into the picture. Accordingly, the possible capture of these devices makes the entire built-in cryptosystem visible to the adversary. Thus, the adversary gains complete control over the system and can potentially hinder the used cryptographic implementation. A White-box cryptographic (WBC) encryption scheme is employed to counter such WB attacks. Accordingly, we provide a scheme for hiding the private key used in the Elliptic curve encryption scheme considering the WB attack context. Precisely, we use Residue Number System (RNS)-based lookup tables to hide the private key. To show the practicality of the proposed scheme, we deploy it over a widely adopted Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) protocol. Further, we discuss the WB security goals and analyze the security and performance of the proposed scheme using the Cooja simulator. We demonstrate the feasibility of the proposed approach by comparing it with the traditional Elliptic curve encryption scheme over parameters like end-to-end delay, network throughput, average power consumption, and computational time. The obtained simulation results show that the proposed scheme provides a consistent computational cost and network efficiency, which is practical in deployments demanding a higher level of security.
引用
收藏
页码:11111 / 11137
页数:27
相关论文
共 50 条
  • [41] Toward Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices
    Nunes, Ivan De Oliveira
    Jakkamsetti, Sashidhar
    Rattanavipanon, Norrathep
    Tsudik, Gene
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (07) : 58 - 64
  • [42] Asymmetric Autoencoders: An NN alternative for resource-constrained devices in IoT networks
    Gilbert, Mateus S.
    de Campos, Marcello L. R.
    Campista, Miguel Elias M.
    AD HOC NETWORKS, 2024, 156
  • [43] Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT Devices
    Sekizawa, Toshifusa
    Mikoshi, Taiju
    Nagura, Masataka
    Watanabe, Ryo
    Chen, Qian
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [44] AES-8: A Lightweight AES for Resource-Constrained IoT Devices
    Dhanda, Sumit Singh
    Singh, Brahmjit
    Jindal, Poonam
    Kumar, Vinod
    Gupta, Sachin Kumar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2025, 36 (03):
  • [45] A Practical Performance Comparison of ECC and RSA for Resource-Constrained IoT Devices
    Suarez-Albela, Manuel
    Fernandez-Carames, Tiago M.
    Fraga-Lamas, Paula
    Castedo, Luis
    2018 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2018, : 246 - 251
  • [46] SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices
    Bejder, Emil
    Mathiasen, Adam Krog
    De Donno, Michele
    Dragoni, Nicola
    Fafoutis, Xenofon
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [47] An efficient and compromise-resilient image encryption scheme for resource-constrained environments
    Khan, Abdul Nasir
    Mehmood, Abid
    Bhutta, Muhammad Nasir Mumtaz
    Khan, Iftikhar Ahmed
    Khan, Atta ur Rehman
    PLOS ONE, 2024, 19 (04):
  • [48] RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices
    Lee, Sangjae
    Oh, Mi-Kyung
    Kang, Yousung
    Choi, Dooho
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 275 - 285
  • [49] A Full-Healing Key Distribution Scheme for Resource-Constrained Devices
    Messai, Sarra
    Messai, Mohamed-Lamine
    Seba, Hamida
    Aliouat, Zibouda
    2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 2019,
  • [50] Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices
    Yasmin N.
    Gupta R.
    International Journal of Information Technology, 2024, 16 (4) : 2647 - 2659