Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices

05/26/2023
by   Rahul Vishwakarma, et al.
0

The Global Wearable market is anticipated to rise at a considerable rate in the next coming years and communication is a fundamental block in any wearable device. In communication, encryption methods are being used with the aid of microcontrollers or software implementations, which are power-consuming and incorporate complex hardware implementation. Internet of Things (IoT) devices are considered as resource-constrained devices that are expected to operate with low computational power and resource utilization criteria. At the same time, recent research has shown that IoT devices are highly vulnerable to emerging security threats, which elevates the need for low-power and small-size hardware-based security countermeasures. Chaotic encryption is a method of data encryption that utilizes chaotic systems and non-linear dynamics to generate secure encryption keys. It aims to provide high-level security by creating encryption keys that are sensitive to initial conditions and difficult to predict, making it challenging for unauthorized parties to intercept and decode encrypted data. Since the discovery of chaotic equations, there have been various encryption applications associated with them. In this paper, we comprehensively analyze the physical and encryption attacks on continuous chaotic systems in resource-constrained devices and their potential remedies. To this aim, we introduce different categories of attacks of chaotic encryption. Our experiments focus on chaotic equations implemented using Chua's equation and leverages circuit architectures and provide simulations proof of remedies for different attacks. These remedies are provided to block the attackers from stealing users' information (e.g., a pulse message) with negligible cost to the power and area of the design.

READ FULL TEXT

page 1

page 2

page 3

page 5

research
06/05/2020

Graph Layer Security: Encrypting Information via Common Networked Physics

The proliferation of low cost Internet of Things (IoT) devices demands n...
research
07/09/2020

A Secure Back-up and Restore for Resource-Constrained IoT based on Nanotechnology

With the emergence of IoT (Internet of things), huge amounts of sensitiv...
research
01/19/2022

Enhancing the Security Privacy of Wearable Brain-Computer Interfaces

Brain computing interfaces (BCI) are used in a plethora of safety/privac...
research
05/31/2019

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT

As the Internet of Things (IoT) emerges over the next decade, developing...
research
07/10/2020

Hardware Implementation of Keyless Encryption Scheme for Internet of Things Based on Image of Memristors

The Internet of Things (IoT) is rapidly increasing the number of connect...
research
01/13/2023

An RTL Implementation of the Data Encryption Standard (DES)

Data Encryption Standard (DES) is based on the Feistel block cipher, dev...
research
07/21/2020

Authentication against Man-in-the-Middle Attack with a Time-variant Reconfigurable Dual-LFSR-based Arbiter PUF

With the expansion of the Internet of Things industry, the information s...

Please sign up or login with your details

Forgot password? Click here to reset