Power Analysis Side Channel Attacks and Countermeasures for the Internet of Things

被引:3
|
作者
Liptak, Christopher [1 ]
Mal-Sarkar, Sanchita [1 ]
Kumar, Sathish A. P. [1 ]
机构
[1] Cleveland State Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44115 USA
关键词
Side channel attacks; Internet of Things; Cryptography and Encryption; Power Analysis;
D O I
10.1109/PAINE56030.2022.10014854
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the explosion in the number of internet of things (IoT) devices in recent years, the security of these devices has become an area of major concerns across the globe. Encryption is an essential means of protecting data in IoT devices, but cryptographic implementations are vulnerable to attacks as well. These vulnerabilities can allow attackers to completely bypass or significantly weaken the theoretical strength of the encryption algorithms. Resistance to cryptanalysis alone is not adequate for building a secure cryptosystem in practice. Power analysis side-channel attacks have emerged as a very effective method of discovering cryptographic keys by monitoring the power consumption of devices. Power consumption of the chips can reveal information about the cryptographic operations being performed or the data being processed. Numerous countermeasures against power analysis attacks have been discussed in the literature. However, all these countermeasures introduce various tradeoffs, such as increased power consumption, decreased performance, and increased space requirements for additional hardware. In addition to strong resistance to power analysis attacks and simplicity of implementation, developers need to evaluate the countermeasures by taking into consideration these tradeoffs while designing and implementing the IoT, which are often operated in heterogenous and highly resource constraint environments. This paper explores the state-of-the art power analysis attacks and their countermeasures and analyze the limitations of these countermeasures based on the constraints present in IoT devices.
引用
收藏
页码:58 / 64
页数:7
相关论文
共 50 条
  • [2] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [3] Advances in Side Channel Attacks and Countermeasures
    Wang, Yong-Juan
    Fan, Hao-Peng
    Dai, Zheng-Yi
    Yuan, Qing-Jun
    Wang, Xiang-Bin
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (01): : 202 - 228
  • [4] A Flexible and Generic Gaussian Sampler With Power Side-Channel Countermeasures for Quantum-Secure Internet of Things
    Zhang, Cong
    Liu, Zilong
    Chen, Yuyang
    Lu, Jiahao
    Liu, Dongsheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 8167 - 8177
  • [5] Power Supply Noise Aware Evaluation Framework for Side Channel Attacks and Countermeasures
    Yang, Jianlei
    Wang, Chenguang
    Cai, Yici
    Zhou, Qiang
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), 2014, : 161 - 166
  • [6] Analysis and countermeasures to side-channel attacks: a hardware design perspective
    Zoni, Davide
    [J]. 2019 14TH INTERNATIONAL SYMPOSIUM ON RECONFIGURABLE COMMUNICATION-CENTRIC SYSTEMS-ON-CHIP (RECOSOC 2019), 2019, : 1 - 4
  • [7] Unified Countermeasures against Physical Attacks in Internet of Things - A survey
    Dofe, Jaya
    Nguyen, Aaron
    Nguyen, Andy
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 194 - 199
  • [8] A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
    Kuang, Boyu
    Fu, Anmin
    Susilo, Willy
    Yu, Shui
    Gao, Yansong
    [J]. COMPUTERS & SECURITY, 2022, 112
  • [9] Routing Attacks and Countermeasures in the RPL-Based Internet of Things
    Wallgren, Linus
    Raza, Shahid
    Voigt, Thiemo
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [10] Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures
    Rajendran, Gowthamaraj
    Nivash, Ragul R. S.
    Parthy, Purushotham Parthiban
    Balamurugan, S.
    [J]. 2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,