A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices

  • Shridevi V Student, Department of Electronics and Communication Engineering, Guru Nanak dev Engineering College Bidar, Karnataka
  • Veerendra Dakulagi Associate Professor and Dean, Department of Electronics and Communication Engineering, Guru Nanak dev Engineering College Bidar, Karnataka, India

Abstract

Embedded devices distributed widely in sensor networks and the Internet of Things is used to collect and send data. Many of them are deployed unattended (for example, sensor nodes and tag readers), while others can be easily lost (for example, bracelets and smart watches). This distributed hardware can be captured and accessed unauthorized due to its physical nature. From a security perspective, they generally work in the context of a white square attack, where opponents have full visibility of deployed cryptographic systems deployments and full control over their implementations. Undoubtedly, it is a big challenge to deal with white box attacks on these devices. Current encryption algorithms for white box attack contexts require a large amount of memory space and are therefore unsuitable for embedded devices with limited resources. To meet this challenge, we suggest a new lightweight encryption plan to protect data confidentiality. Encryption is done using specialized confidential components, and the encryption algorithm requires a small amount of static data to store critical information. Also, this scheme supports only effective key update at a very small COST. The safety and cost of the proposed scheme have been theoretically analyzed with positive results, and extensive empirical assessments indicate that the new scheme meets the requirements of distributed hardware combined in terms of limited memory usage and low arithmetic cost.


How to cite this article:
Shridevi, Dakulagi V. A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices. J Adv Res Embed Sys 2020; 7(3&4): 24-28.

References

[1]T. Kasper, D. Oswald, and C. Paar, “Sweet Dreams and Nightmares: Security in the Internet of Things,” in Information Security Theory and Practice: Securing the Internet of Things, Berlin, 2014, pp. 1-9.
[2] R. Kirkham, and C. Greenhalgh, “Social Access vs. Privacy in Wearable Computing: A Case Study of Autism,” Ieee Pervasive Computing, vol. 14, no. 1, pp. 26-33, Jan-Feb, 2015.
[3] J. Zhao, “On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 557-571, 2017.
[4] S. Chow, P. Eisen, H. Johnson, and P. C. Van Oorschot, “A white-box DES implementation for DRM applications,” in Digital Rights Management, 2003, pp. 1-15.
[5] M. Beunardeau, A. Connolly, R. Géraud, and D. Naccache, “White-Box Cryptography: Security in an Insecure Environment,” IEEE Security & Privacy, vol. 14, no. 5, pp. 88-92, 2016.
[6] W. Michiels, “Opportunities in White-Box Cryptography,” IEEE Security & Privacy, no. 1, pp. 64-67, 2010.
[7] D. H. Yum, and P. J. Lee, “Exact Formulae for Resilience in Random Key Predistribution Schemes,” Ieee Transactions on Wireless Communications, vol. 11, no. 5, pp. 1638-1642, May, 2012.
[8] A. Newell, H. Yao, A. Ryker, T. Ho, and C. Nita-Rotaru, “Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols,” ACM Comput. Surv., vol. 47, no. 2, pp. 1-34, 2014.
[9] P. Swierczynski, M. Fyrbiak, P. Koppe, and C. Paar, “FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 8, pp. 1236-1249, 2015.
[10] Y. Shi, J. Han, X. Wang, J. Gao, and H. Fan, “An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems,” IEEE Internet of Things Journal, vol. 4, no. 4, pp. 15, 2017
Published
2020-07-23
How to Cite
V, Shridevi; DAKULAGI, Veerendra. A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices. Journal of Advanced Research in Embedded System, [S.l.], v. 7, n. 3 & 4, p. 24-28, july 2020. ISSN 2395-3802. Available at: <http://thejournalshouse.com/index.php/ADR-Journal-Embedded-Systems/article/view/200>. Date accessed: 02 may 2024.