Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications

被引:0
|
作者
Chhabra, Surbhi [1 ]
Lata, Kusum [1 ]
机构
[1] Department of ECE, The LNM Institute of Information Technology, Rajasthan, Jaipur, India
关键词
Data obfuscation - Semiconductor device manufacture - Malware - Data transfer - Hamming distance - Hardware security - System-on-chip - Timing circuits - Internet protocols - Reverse engineering;
D O I
暂无
中图分类号
学科分类号
摘要
In semiconductor industry, reusability-based System-on-Chip architecture using hardware intellectual property (IP) cores play a prominent role in Internet-of-Things (IoT) applications for secure data transmission. The advent of IoT makes it possible for physical things to transmit, process, compute, and receive data over internet. But, it also introduces in-device communication security vulnerabilities. Advanced Encryption Standard (AES) IP has been used to address security vulnerabilities in IoT. It is an efficient and high-performance crypto algorithm used in IoT devices for secure and fast data encryption. However, due to rise of many attacks, the security of AES IP is also under threat. Hardware obfuscation is one such prominent countermeasure that mitigates hardware attacks such as tampering, reverse engineering, and malicious alteration. This article presents secure AES IP mechanism using the potential technique of obfuscation inspired by the concept of combinational hardware Trojan. Experimental results show that the proposed technique is resilient against reverse-engineering, malicious alteration, Boolean satisfiability attack, and key-sensitizing attacks. The confusion and diffusion features of obfuscated AES IP are higher in terms of Hamming distance, avalanche effect, and balance rate. The proposed technique is implemented in Basys-3 FPGAs within 5% of power and area overhead while maintaining high throughput. © 2022 John Wiley & Sons, Ltd.
引用
收藏
相关论文
共 10 条
  • [1] Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications
    Chhabra, Surbhi
    Lata, Kusum
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (21):
  • [2] Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT
    Chhabra, Surbhi
    Lata, Kusum
    [J]. SECURITY AND PRIVACY, 2022, 5 (04)
  • [3] Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications
    Chhabra S.
    Lata K.
    [J]. SN Computer Science, 3 (4)
  • [4] Key-based Obfuscation using HT-like Trigger Circuit for 128-bit AES Hardware IP Core
    Chhabra, Surbhi
    Latat, Kusum
    [J]. 34TH IEEE INTERNATIONAL SYSTEM ON CHIP CONFERENCE (SOCC), 2021, : 164 - 169
  • [5] Data Injection Attacks Using a Hardware Trojan on a Transmission Line
    Kaji, Shugo
    Kinugawa, Masahiro
    Fujimoto, Daisuke
    Hayashi, Yu-ichi
    [J]. 2018 JOINT IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY AND 2018 IEEE ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC/APEMC), 2018, : 10 - 10
  • [6] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    [J]. 23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410
  • [7] Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level
    Chhabra, Surbhi
    Lata, Kusum
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 401 - 406
  • [8] Data Augmented Hardware Trojan Detection Using Label Spreading Algorithm Based Transductive Learning for Edge Computing-Assisted IoT Devices
    Sankar, Vaishnavi
    Nirmala Devi, M.
    Jayakumar, M.
    [J]. IEEE ACCESS, 2022, 10 : 102789 - 102803
  • [9] Data Augmented Hardware Trojan Detection Using Label Spreading Algorithm Based Transductive Learning for Edge Computing-Assisted IoT Devices
    Sankar, Vaishnavi
    Nirmala Devi, M.
    Jayakumar, M.
    [J]. IEEE Access, 2022, 10 : 102789 - 102803
  • [10] Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC
    Balakrishnan, D.
    Rajkumar, T. Dhiliphan
    Dhanasekaran, S.
    Murugan, B. S.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 2999 - 3016