ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things

04/13/2020
by   Hadi Mardani Kamali, et al.
0

The resource-constrained nature of the Internet of Things (IoT) devices, poses a challenge in designing a secure, reliable, and particularly high-performance communication for this family of devices. Although side-channel resistant ciphers (either block cipher or stream cipher) are the well-suited solution to establish a guaranteed secure communication, the energy-intensive nature of these ciphers makes them undesirable for particularly lightweight IoT solutions. In this paper, we introduce ExTru, a novel encrypted communication protocol based on stream ciphers that adds a configurable switching toggling network (CSTN) to not only boost the performance of the communication in lightweight IoT devices, it also consumes far less energy compared with the conventional side-channel resistant ciphers. Although the overall structure of the proposed scheme is leaky against physical attacks, such as side-channel or new scan-based Boolean satisfiability (SAT) attack or algebraic attack, we introduce a dynamic encryption mechanism that removes this vulnerability. We demonstrate how each communicated message in the proposed scheme reduces the level of trust. Accordingly, since a specific number of messages, N, could break the communication and extract the key, by using the dynamic encryption mechanism, ExTru can re-initiate the level of trust periodically after T messages where T<N, to protect the communication against side-channel and scan-based attacks (e.g. SAT attack). Furthermore, we demonstrate that by properly configuring the value of T, ExTru not only increases the strength of security from per "device" to per "message", it also significantly improves energy consumption as well as throughput in comparison with an architecture that only uses a conventional side-channel resistant block/stream cipher.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/19/2021

The Impact of DoS Attacks onResource-constrained IoT Devices:A Study on the Mirai Attack

Mirai is a type of malware that creates a botnet of internet-connected d...
research
02/17/2021

LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

This paper presents LIRA-V, a lightweight system for performing remote a...
research
08/10/2018

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64

Simeck, a lightweight block cipher has been proposed to be one of the en...
research
08/25/2021

Correlation Differential Power Analysis Attack to Midori64

Today, Internet communication security has become more complex as techno...
research
11/11/2020

Energy Concealment based Compressive Sensing Encryption for Perfect Secrecy for IoT

Recent study has shown that compressive sensing (CS) based computational...
research
09/01/2019

COMA: Communication and Obfuscation Management Architecture

In this paper, we introduce a novel Communication and Obfuscation Manage...
research
09/02/2021

TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT

Message queuing brokers are a fundamental building block of the Internet...

Please sign up or login with your details

Forgot password? Click here to reset