On Random Dynamic Voltage Scaling for Internet-of-Things: A Game-Theoretic Approach

被引:2
|
作者
Geng, Hui [1 ]
Kwiat, Kevin A. [2 ]
Kamhoua, Charles A. [2 ]
Shi, Yiyu [3 ,4 ]
机构
[1] Missouri Univ Sci & Technol, Elect & Comp Engn Dept, Rolla, MO 65409 USA
[2] US Air Force, Res Lab, Informat Directorate, Rome, NY 13441 USA
[3] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
[4] Univ Notre Dame, Dept Elect Engn, Notre Dame, IN 46556 USA
关键词
Game theory; Internet-of-Things (IoT); random dynamic voltage scaling (RDVS); S-Box; side channel attack; POWER ANALYSIS ATTACKS; DESIGN;
D O I
10.1109/TCAD.2017.2717780
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is one of the top considerations in hardware designs for Internet-of-Things (IoT), where embedded cryptosystems are extensively used. Traditionally, random dynamic voltage scaling technology has been shown to be very effective in improving the resistance of cryptosystems against side-channel attacks. However, in this paper we demonstrate that the resistance can be undermined by providing lower off-chip power supply voltage. In order to address this issue, we then further propose to monitor the off-chip power supply voltage, and trigger an alarm to protect valued information once the power supply voltage is lower than the expected voltage (threshold voltage). However, considering both maintenance cost of IoT devices and the environment noise on power supply voltage, we first formulated this problem as a nonzero sum game model, and the attacker and the circuit supplier (defender) are the players of this game. The analysis of the Nash equilibria in this game show interesting guideline to the defender about the choice of threshold voltage, which is based on parameters of cryptosystem including the value of information, denial-of-service cost in IoT, etc.
引用
收藏
页码:123 / 132
页数:10
相关论文
共 50 条
  • [41] A Game-Theoretic Approach to Network Slicing
    Yang, Xu
    Liu, Yue
    Chou, Ka Seng
    Cuthbert, Laurie
    2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 359 - 362
  • [42] A Game-Theoretic Approach to Anonymous Networking
    Venkitasubramaniam, Parv
    Tong, Lang
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (03) : 892 - 905
  • [43] Contention control: A game-theoretic approach
    Chen, Lijun
    Low, Steven H.
    Doyle, John C.
    PROCEEDINGS OF THE 46TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2007, : 6183 - 6189
  • [44] ALOHA networks: a game-theoretic approach
    Sebastián Marbán
    Peter van de Ven
    Peter Borm
    Herbert Hamers
    Mathematical Methods of Operations Research, 2013, 78 : 221 - 242
  • [45] A Game-theoretic Approach to Behavioural Visualisation
    Westergaard, Michael
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 208 (113-129) : 113 - 129
  • [46] Strategies in Dialogues: A Game-Theoretic Approach
    Kacprzak, Magdalena
    Dziubinski, Marcin
    Budzynska, Katarzyna
    COMPUTATIONAL MODELS OF ARGUMENT, 2014, 266 : 333 - 344
  • [47] A Game-Theoretic Approach to Peer Disagreement
    Heesen, Remco
    van der Kolk, Pieter
    ERKENNTNIS, 2016, 81 (06) : 1345 - 1368
  • [48] A Game-theoretic Approach to Data Interaction
    McCamish, Ben
    Ghadakchi, Vahid
    Termehchy, Arash
    Touri, Behrouz
    Cotilla-Sanchez, Eduardo
    Huang, Liang
    Changpinyo, Soravit
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2020, 45 (01):
  • [49] A GAME-THEORETIC APPROACH TO INTEGRATION OF MODULES
    BOZMA, HI
    DUNCAN, JS
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1994, 16 (11) : 1074 - 1086
  • [50] A game-theoretic approach to constraint satisfaction
    Kolaitis, PG
    Vardi, MY
    SEVENTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-2001) / TWELFTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE (IAAI-2000), 2000, : 175 - 181