IoT application protection against power analysis attack

Jaegeun Moon, Im Y. Jung, Jong Hyuk Park

Research output: Contribution to journalArticlepeer-review

24 Scopus citations

Abstract

The era of the Internet of Things (IoT) has arrived and much information is transmitted through various small IoT devices. Public key cryptography can be used in the present internet environment to avoid eavesdropping. The well-known public key cryptography, Rivest–Shamir–Adleman cryptography and Elliptic Curve Cryptography are apt to be broken when quantum computing is introduced. Therefore, lattice-based cryptography has been proposed as a new public key cryptography to replace them. The Ring-LWE scheme has been proposed to implement lattice-based cryptography. To apply the scheme to IoT devices using 8-bit, 32-bit, or 64-bit microcontrollers, optimization is inevitable. Further, the 8-bit environment is more important for small IoT devices. However, Ring-LWE may be vulnerable to side-channel attacks. This paper analyzes the attack scenario and tenders a countermeasure through bit checking for IoT applications using 8-bit microcontrollers.

Original languageEnglish
Pages (from-to)566-578
Number of pages13
JournalComputers and Electrical Engineering
Volume67
DOIs
StatePublished - Apr 2018

Keywords

  • IoT
  • Public key cryptography
  • Quantum computing
  • Ring-LWE
  • Side-channel attack

Fingerprint

Dive into the research topics of 'IoT application protection against power analysis attack'. Together they form a unique fingerprint.

Cite this