14 research outputs found
Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or mobile ad hoc networks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight cryptographic primitives for many security applications because of the tight cost and constrained resource requirement of sensor based networks. This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems. A large number of research solutions have been proposed to implement lightweight cryptographic primitives and protocols in sensor and RFID integration based resource constraint networks. In this work, an overview of the currently discussed lightweight primitives and their attributes has been done. These primitives and protocols have been compared based on gate equivalents (GEs), power, technology, strengths, weaknesses and attacks. Further, an integration of primitives and protocols is compared with the possibilities of their applications in practical scenarios
Técnicas de segurança para a internet das coisas
Mestrado em Engenharia de Computadores e TelemáticaIoT assume que dispositivos limitados, tanto em capacidades computacionais
como em energia disponível, façam parte da sua infraestrutura. Dispositivos
esses que apresentam menos capacidades e mecanismos de defesa do que
as máquinas de uso geral. É imperativo aplicar segurança nesses dispositivos
e nas suas comunicações de maneira a prepará-los para as ameaças da
Internet e alcançar uma verdadeira e segura Internet das Coisas, em concordância
com as visões atuais para o futuro. Esta dissertação pretende ser um
pequeno passo nesse sentido, apresentando alternativas para proteger as comunicações
de dispositivos restritos numa perspetiva de performance assim
como avaliar o desempenho e a ocupação de recursos por parte de primitivas
criptográficas quando são aplicadas em dispositivos reais. Dado que a
segurança em diversas ocasiões tem de se sujeitar aos recursos deixados
após a implementação de funcionalidades, foi colocada uma implementação
de exposição de funcionalidades, recorrendo ao uso de CoAP, num dispositivo
fabricado com intenção de ser usado em IoT e avaliada de acordo com a
sua ocupação de recursos.IoT comprehends devices constrained in both computational capabilities and
available energy to be a part of its infrastructure. Devices which also present
less defense capabilities and mechanisms than general purpose machines.
It’s imperative to secure such devices and their communications in order to
prepare them for the Internet menaces and achieve a true and secure Internet
of Things compliant with today’s future visions. This dissertation intends
to be a small step towards such future by presenting alternatives to protect
constrained device’s communications in a performance related perspective as
well as benchmarks and evaluation of resources used by cryptographic primitives
when implemented on real devices. Due to security being on multiple
occasions subjected to the resources available only after functionalities implementation,
a minimalist implementation of functionalities exposure through
the use of CoAP was also deployed in an IoT intended device and assessed
according to resource overhead
高速擬似乱数生成器および高速ストリーム暗号
広島大学(Hiroshima University)博士(理学)Physical Sciencedoctora
Covert timing channels, caching, and cryptography
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryptographic primitive but the implementation of it. Examples of side-channels include power consumption or timing measurements. This is a young but very active field within applied cryptography. Modern processors are equipped with numerous mechanisms to improve the average performance of a program, including but not limited to caches. These mechanisms can often be used as side-channels to attack software implementations of cryptosystems. This area within side-channel analysis is called microarchitecture attacks, and those dealing with caching mechanisms cache-timing attacks. This dissertation presents a number of contributions to the field of side-channel analysis. The introductory portion consists of a review of common cache architectures, a literature survey of covert channels focusing mostly on covert timing channels, and a literature survey of cache-timing attacks, including selective related results that are more generally categorized as side-channel attacks such as traditional timing attacks. This dissertation includes eight publications relating to this field. They contain contributions in areas such as side-channel analysis, data cache-timing attacks, instruction cache-timing attacks, traditional timing attacks, and fault attacks. Fundamental themes also include attack mitigations and efficient yet secure software implementation of cryptosystems. Concrete results include, but are not limited to, four practical side-channel attacks against OpenSSL, each implemented and leading to full key recovery