An Ultra-Lightweight White-Box Encryption Scheme for Securing Resource-constrained IoT Devices

被引:16
|
作者
Shi, Yang [1 ]
Wei, Wujing [1 ]
He, Zongjian [1 ]
Fan, Hongfei [1 ]
机构
[1] Tongji Univ, Sch Software Engn, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet-of-Things; white-box encryption scheme; ultra-lightweight; white-box attack context; resource-constrained; CRYPTANALYSIS; IMPLEMENTATION;
D O I
10.1145/2991079.2991086
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded devices with constrained computational resources, such as wireless sensor network nodes, electronic tag readers, roadside wins in vehicular networks, and smart watches and wristbands, arc widely used in the Internet of Things. Many of such devices are deployed in untrustable environments, and others may be easy to lose, leading to possible capture by adversaries. Accordingly, in the context of security research, these devices are running in the white-box attack context, where the adversary may have total visibility of the implementation of the built-in cryptosystem with full control over its execution. It is undoubtedly a significant challenge to deal with attacks from a powerful adversary in white-box attack contexts. Existing encryption algorithms for white-box attack contexts typically require large memory use, varying from one to dozens of megabytes, and thus are not suitable for resource-constrained devices. As a countermeasure in such circumstances, we propose an ultra-lightweight encryption scheme for protecting the confidentiality of data in white-box attack contexts. The encryption is executed with secret components specialized for resource-constrained devices against white-box attacks, and the encryption algorithm requires a relatively small amount of static data, ranging from 48 to 92 KB. The security and efficiency of the proposed scheme have been theoretically analyzed with positive results, and experimental evaluations have indicated that the scheme satisfies the resource constraints in terms of limited memory use and low computational cost.
引用
收藏
页码:16 / 29
页数:14
相关论文
共 50 条
  • [1] Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices
    Bang, A. O.
    Rao, Udai Pratap
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (08): : 11111 - 11137
  • [2] Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices
    A. O. Bang
    Udai Pratap Rao
    [J]. The Journal of Supercomputing, 2022, 78 : 11111 - 11137
  • [3] Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
    Engels, Daniel
    Fan, Xinxin
    Gong, Guang
    Hu, Honggang
    Smith, Eric M.
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 3 - +
  • [4] Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices
    Noura, Hassan
    Couturier, Raphael
    Pham, Congduc
    Chehab, Ali
    [J]. 2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [5] RPPUF: An Ultra-Lightweight Reconfigurable Pico-Physically Unclonable Function for Resource-Constrained IoT Devices
    Huang, Zhao
    Li, Liang
    Chen, Yin
    Li, Zeyu
    Wang, Quan
    Jiang, Xiaohong
    [J]. ELECTRONICS, 2021, 10 (23)
  • [6] Design Prototype and Security Analysis of a Lightweight Joint Compression and Encryption Scheme for Resource-Constrained IoT Devices
    Kuldeep, Gajraj
    Zhang, Qi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 165 - 181
  • [7] A Lightweight XMPP Publish/Subscribe Scheme for Resource-Constrained IoT Devices
    Wang, Heng
    Xiong, Daijin
    Wang, Ping
    Liu, Yuqiang
    [J]. IEEE ACCESS, 2017, 5 : 16393 - 16405
  • [8] A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices
    Shi, Yang
    Wei, Wujing
    Fan, Hongfei
    Au, Man Ho
    Luo, Xiapu
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (10) : 1411 - 1427
  • [9] A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
    Yilmaz, Selim
    Aydogan, Emre
    Sen, Sevil
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4405 - 4418
  • [10] A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
    Kumar, Sunil
    Kumar, Dilip
    Dangi, Ramraj
    Choudhary, Gaurav
    Dragoni, Nicola
    You, Ilsun
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 31 - 63