Conference PaperPDF Available

Preventing DoS Attacks in IoT Using AES

Authors:

Figures

Content may be subject to copyright.
e-ISSN: 2289-8131 Vol. 9 No. 3-11 55
Preventing DoS Attacks in IoT Using AES
Yasir Javed1, 2, Adnan Shahid Khan1, Abdul Qahar1, 3 and Johari Abdullah1
1FCSIT, UNIMAS, Sarawak, Malaysia
2Prince Sultan University, Riyadh, KSA.
3The University of Punjab, Lahore, Pakistan.
yjaved@psu.edu.sa
AbstractThe Internet of Things (IoT) is significant in
today’s development of mobile networks enabling to obtain
information from the environment, devices, and appliances. A
number of applications have been implemented in various kinds
of technologies. IoT has high exposure to security attacks and
threats. There are several requirements in terms of security.
Confidentiality is one of the major concerns in the wireless
network. Integrity and availability are key issues along with the
confidentiality. This research focuses on identifying the attacks
that can occur in IoT. Packet filtering and patches method were
used to secure the network and mitigate mentioned attacks but
these techniques are not capable of achieving security in IoT.
This paper uses Advanced Encryption Standard (AES) to
address these mentioned security issues. Official AES version
uses the standard for secret key encryption. However, several
problems and attacks still occur with the implementation of this
original AES. We modified AES by adding white box and the
doubling of the AES encryption. We also replaced the
Substitute-Byte (S-Box) in the conventional AES with the white
box. The significance of a white box is where the whole AES
cipher decomposed into round functions. While doubling the
process of AES gives difficulty to the attacker or malware to
interrupt the network or system. From the algorithms, our
proposed solutions can control DoS attack on IoT and any other
miniature devices.
Index TermsDoS Attack; AES; IoT Security;
Confidentiality; White Box.
I. INTRODUCTION
The inventions of smart devices and mobile devices are
growing very rapidly as the development of mobile
computing is also increasing with all of them including
Internet of Things (IoT) as their integral part. IoT are objects
that are uniquely identifiable and have Internet-like structure
virtual representation [1]. The growth of IoT nowadays is
enormous. Modern technologies such as Radio-Frequency
Identification (RFID), sensor networks, short-range wireless
communications, and real-time localization are now
becoming extremely usual, which apply IoT into commercial
use. There are wide range of networks such as Wireless
Sensor Network (WSN), Vehicular Ad-Hoc Network
(VANET), Radio-Frequency Identification (RFID),
Smartphone, and others, are included in constructing the IoT
[2]. There are billions of IoT devices connected today and are
expected to increase in coming years. Because of wide range
of applications, elements in IoT interact via broadcasting
messages, which create the messages’ dissemination
efficient. This make IoT network prone to attacks, where
attacker to interrupt the networks. It will be easier for attacker
to intercept, fabricate or even steal the data in the networks
that might be the high-secrecy or private confidential
information. All these suggested solutions are applicable in
the real time applications. People's requirements for
improved living condition are constantly rising because of the
development of economy and the rise of information-based
society. Building Smart Home based on the advancement
information technology is becoming more important. It is
essential to process and use the immense and decentralized
information. Smart home is the basis component of Intelligent
Residential District [3]. The user can correspond with the
latest security dynamics of the whole family if security
devices, such as infrared detector, smoke sensor, etc. can be
accessed to the IoT network. To access to the network of IoT
and community hospital, user need to have household
medical devices like sphygmomanometer so doctors can
correspond with the patients’ health condition timely and
make treatment. Family business center can complete a series
of tasks, such as shopping and payment so people can stay
indoors to manage their daily life [4]. Thus, the security
requirements are the major concern regarding these problems.
One of the key problems is the leak of personal information
that shows the violation of confidentiality. The integrity issue
come through when there is a stealing of data and identity.
Attacks on integrity can disable the sensing and control the
information. Availability is another great target for the
attacks. This research focuses on Denial of Services (DoS)
attack that is high possibility to occur when it comes to
availability context. DoS attack occurs when the system or
service that is required cannot be accessed. Thus, securing
broadcast communication protocol is conducted into
research. This research proposes several improvement in
AES encryption structure. White box as stated, it decomposes
the whole AES cipher into round functions.
Section II presents the related works, about known AES
mechanism and their modification, Section III presents a
system model Section IV presents the proposed solution.
Section V presents the mathematical analysis of proposed
solution. Section VI presents the conclusion.
II. RELATED WORKS
AES replaces the Data Encryption Standard (DES) in 2001
[4-6]. AES contains ten iterations of four key operations,
which are the SubBytes, ShiftRows, MixColumns and
AddRoundKey [7]. Security and confidentiality have always
been the major concern of cloud consumers since the
beginning. Such concerns are derived from several types of
attacks on several systems that have occurred since these
cloud-based services are implemented. Brute force attack,
also known as Dictionary attack or Hybrid Brute-force attack
is one of the incorporate attacks. According to Whitney [8],
brute-force attack is an attack that uses “Trial and Error”
method by guessing users’ passwords. This method initially
Journal of Telecommunication, Electronic and Computer Engineering
56 e-ISSN: 2289-8131 Vol. 9 No. 3-11
initiated by gathering the fundamental information about the
user such as user’s nickname, pet name, birthday month or
year and vehicle name. Attackers usually launch this method
by combining random and guessable passwords such as
‘1234’ or ‘qwerty’. In 2013, October 3 to be exact, Adobe has
confirmed that it had been a victim of an attack that affected
38 million of active userswhich mostly used guessable and
random words as their passwords [9]. This brute force attack
enables attackers to guess users’ passwords using a key
derivation function, known as exhaustive key search. This
attack is a cryptanalytic attack that used to decrypt or crack
any encrypted data.
Jose [10] has proposed a technique called “SecCloud
Protocol Implementation” which encrypted protocol data and
sent it to the cloud servers. This technique initially used RSA
algorithm for encryption, but since it suffered from brute
force attack, another AES algorithm has been introduced to
solve this problem. However, brute force attacks still exist
since the author did not focus on the S-box model.
Meanwhile, Junjie and Feng [11] proposed a solution by
using an expansion key on AES algorithm to improve the
security of the key and maintaining the algorithm efficiency
at the same time. This solution proposed does increase the
security, but it does not increase the key length, which might
be a problem since brute force attacks target on key length.
Al-Haj et.al [12] have chosen as the AES in 2001 after an
open process because of its efficiency, security, implement
ability, flexibility, and performance. There are many
applications using AES since it gives many benefits such as
remote diagnosis contribute by telemedicine applications
access to centralized medical remote-distance learning and
medical archives. They suggested improvised method, which
they provide the encryption keys and initialization vectors
externally so that it can overcome the overhead.
White box as stated, it decomposes the whole AES cipher
into round functions. The output of previous round is the
offset of the input of encoding in the ith round. All the
encodings is produced through both linear and non-linear
mapping. Next, the shiftrows transformation that we
suggested is the simple permutation process, which is circular
byte shift that can be guaranteed. Mix columns also
applicable where the four bytes in each column of a state is
combine with an invertible linear transformation. We
proposed the AES add round key algorithm adapted from
Rijndael algorithm[13]. In this algorithm, the 128-bit
independent key for every round is derived from the original
128-bit encryption key. Our research proposed a doubling
process of AES with two different keys. It will ensure the
attacker not to disrupt the network or system because it is
strengthen by the double encryption of AES. AES uses byte
wise substitution, byte swapping and the XOR operation for
encryption process. The mathematical analysis for this
operation is when 128-bit plaintext block are arranged into
4x4 columns. It called ‘states’ and to generate 128 bits of
cipher text it will undergo 10 rounds. At the same time, the
key expansions also occur. The 128-bit keys will produce
other 128-bit keys for 10 rounds. Ten (10) matrices are made
up from the arrangement of keys in 4x4 matrices.
III. SYSTEM MODEL
Figure 1 represents a system design for our proposed model
where a user would like to upload the data into cloud. For
This a Cloud User will use our extended AES Encryption
standard to store the data. Where the Data owner if want to
see the data has to decrypt the cipher using his known key.
Thus, Cloud user will be able to send the data securely over
the cloud and data owner while using the secret key can see
it.
Figure 1: The implementation of AES on IoT (Cloud Service)
Figure 2 represent a DOS attack, where attacker has
stopped the services to Data owner.
Figure 2: The DoS attack on IoT (Cloud Service)
Internet has become a mission- critical component in
modern business. Having said that, cybersecurity has become
indispensable element in the information system. However,
threats and attacks are inevitable in the cyber world due to
lack of security [5]. The IoT is not an exception to this
problem. One of the problems arose is the unwanted release
of personal information. It is the violation of data
confidentiality [14]. For example, a data leak in the smart
medical center monitoring system will lead to an inadvertent
release of sensitive medical data. Therefore, loss of
confidentiality in passwords and important keys will cause
unwanted system threats. Furthermore, attacks on integrity
can distort the sensing and control information [15]. For
instance, the house controller confused by unauthenticated
system status alerts will predicted a situation mistakenly
which allowed an illicit entry. Availability becomes the
greatest target for the attacks. Many Internet-enabled devices
often configured with default or weak password. For instance,
Preventing DoS Attacks in IoT Using AES
e-ISSN: 2289-8131 Vol. 9 No. 3-11 57
in-car Wi-Fi has the same security vulnerabilities as
traditional Wi-Fi hotspots. However, in-car devices and data
will be at risk without the firewalls present in conjunction
with Wi-Fi installation. Hence, as more and more products
are developed with the capacity to be networked, wirelessly
networked IoT devices with a low operational duty cycle will
flood the network and this can lead to a denial of service to
legitimate users.
IV. PROPOSED SOLUTION
A. Reminiscing the Old Solution
As stated in the problem statement, one of the common
services that facing DoS is the network device level.
Previously, the two common ways in preventing this matter
were patches method and packet filtering. For instance, to
hinder the attacks, it is better for a network to reject broadcast
ping requests to reach the network from outside, or to
configure a firewall that rejects all arriving echo request
packets. Suppose that the Internet Service Provider (ISP) in
Figure 1 owns the router that give the end network internet
access and the ISP knows the legal address size of packets
trying to reach through this router. If a packet is trying to
reach the ISP and act to be from an address that is outside of
this legal address space, thus it is clearly depicted. The
deception attempt can be logged and the packet can be filtered
out.
B. Newly Proposed AES Encryption
However, filtering packets and patches method were not
robust enough to secure the network security. Here, we have
indicated a couple of new algorithm to modify the existing
AES, which are the doubling of the AES encryption, and the
white box, which replaces the Substitute Bytes (S-Box).
Below are the explanation for the method used in AES
encryption that can prevent the attack techniques of DoS such
as Attack Tools, Application-layer Floods, Degradation-Of-
Services and Denial-Of-Services from occurring [15].
Therefore, the most suitable encryption protocols for device
to server communications is AES.
1) Independent Key (Round Key)
The key will be arranged in the form of 4x4 bytes matrix
then it will be expanded into a schedule 44 words. The
independent key will be added into the input block of
plaintext to be ciphered once it is expanded [16].
2) Input Block
The first word from the key fills the first column of the
matrix. The expanded independent key is arranged into a
schedule of 44 words. Each round during the AES encryption
will contain 4 words from the schedule. Thus, the input block
contains a plaintext from the client side and expanded
independent key.
3) Input State Array
Before the round-based process for encryption commence,
the input state array is XOR with the first four words from the
schedule (44 words of expanded independent key).
C. Proposed AES Encryption Structure
1) White box cryptography (WBC)
Even though the implementation of white box will expose
an encryption algorithm to the external, white box is defended
by encoding, mixed bijections and external encoding. During
the encoding, a bijection of two keys are injected into the
lookup tables from the Sub-Bytes process. Apart from that,
mixed bijections will add confusion by concatenate input and
output from the encoding [16]. In addition, external encoding
will double the number of lookup tables. Although white box
provides full visibility of internal algorithm, it is just to
consider the worst-case attack model [3, 6].
2) Sub-Bytes/S-box
SubBytes dominates the AES performance. There are two
implementations to utilize the Sbox in SubBytes. The first
approach was implementing the composite-field
computation-based Sbox on FPGAs. Then another was the
LUT (LookUp Table). The former involves mapping and
inverse mapping between the GF (28) field and the GF (24)
field. While the latter one applies the formula, Lsb= 8 − K +
1, K is the number of inputs in LUT [4].
3) Shift Rows
This Shift Rows transformation is a simple permutation
(circular byte shift) process that will guarantee. For example,
in the first row, there is no byte to shift whereas at the second
row, there is a 1-byte circular left shift and followed by the
third row, a 2-byte circular left shift. Finally, the last row by
three bytes to the left. The shifts of row will help to
complicate the cryptanalysis that intrudes a cloud service.
The input block is in the form of column-wise. The first
four bytes of the input block will fill up the first column of
the state array, followed by the next four bytes of the second
column, and so on. In the end, the byte order of the input
block is scrambled up due to the rows shifted in the indicated
manner.
4) Mix Columns
In this step, combine the four bytes in each column of the
state with an invertible linear transformation. During the Mix
Column operation, four bytes are taken as input and then
outputs another four bytes, where each input byte influences
the four outputs. Along with the Shift Rows, another step in
the AES encryption, which is the Mix Columns, provide
diffusion in the cipher. A fast and low complexity
architecture for the Mix Column in AES operation is
proposed. It is recommended to contain a short critical path,
small gate count and versatility (encrypt and decrypt) [4].
5) Add Round Key
A round key will be derived from the original 128-bit
encryption key in every round. The XOR of the round key
(independent key) with the state array is a part of one of the
four steps available in both AES encryption and decryption.
The AES AddRoundKey algorithm is applied to derive the
128-bit independent key for every round from the original
128-bit encryption key. In addition, the logic behind the
independent key expansion algorithm is to guarantee that if
one bit of the encryption key is altered, the independent keys
for several rounds will be affected as well. Having said that,
the same manner goes to the 128-bit input block is arranged
in the form of state array, the algorithm organize the first 16
bytes of the encryption key in the form of 4x4 array of bytes.
Journal of Telecommunication, Electronic and Computer Engineering
58 e-ISSN: 2289-8131 Vol. 9 No. 3-11
6) Double the process of AES encryption in IoT with two
different keys.
If the hacker tend to send a malware that can interrupt,
inhibit the normal flow of data into and out of the system or
disrupt the IoT such as Smart Home System, the AES will
double encrypt by using two different keys, the malware will
unable to break the algorithm because it has been strengthen
by the double encryption process of AES [8]. Hence, the
system will be unable to disrupt by the hacker thus the user
able to access to the system as usual [6].
The data encryption and decryption above is for AES-128
bits. In order to make the data even more secure, we apply the
192 bits or 256 bits. Furthermore, in the near future, we can
produce the IoT board, which is a black box that can receive
the plain text as input and gives encoded output for various
IoT applications [4]. Having said that, even a common
computer user can secure data.
V. AES MATHEMATICAL ANALYSIS
A. White-Box Implementation
1) Encoding
The aim is to make the extraction of the key from the
encryption code harder due to a new complicated lookup
table. The bijection of key g and f.
T1 = g0 T0 f-1
2) Mixed bijection
A concatenation of input and output from the previous
encoding.
3) External Encoding
The double of lookup tables in the 1st to the 9th iteration
after the mixed bijection will produce:
228 of 8- bit to 32-bit lookup tables 1024 bytes each.
1728 of 8-bit to 4-bit lookup tables which is 128 bytes each.
16 of 8-bit to 8-bit lookup tables which is 256 bytes each.
Thus, the attacker will find it tedious to search through the
large storage for cryptanalysis.
Operations in AES are performed using bytes. There are
 number of bytes possible. Specific bytes are
represented by elements in the finite field,
  

where        (according to original
Rijndael algorithm). Other choices for p(x) can be used also.
B. S-box
S-box is used to transform a given element in   
 into
another unique element in F using the AES S-box.
For e.g.   
Binary presentation of   
Split it into two sides.
LHS
Binary presentation= 0010
Binary expression=   
Binary expression = 1
RHS
Binary presentation= 0110
Binary expression=   
Binary expression = 6
Entry 1 will be used as row and 6 will be used as column.
Referring to the AES S-box, we will gain 71, which as a byte
can be expressed as 010000111, and as polynomial can be
represented by.       
Thus, for the input    will produce output
   
C. SubByte
The input encoding of the i th round is offset by the output
of previous round and the encoding is composed of non-linear
mapping and linear mapping with the formula,
F = g. E. f
= Q. B. M. S. A. P
= QBMSAP
where: f = input encoding,
A = block diagonal linear mapping
P = nonlinear mapping
M = invertible linear mapping
S = the concatenation of S-box on m bits
E = 4F
Q = non-linear mapping
B = block diagonal linear mapping
Let x=(), S=(), AP=(),and M=[],
where ’s are 8-bit values, s are nonlinear bijections on 8
bits and is the ith vertical strip of size 32 × 8. For 1 ≤
4,
F(x) = QBMSAP(x)
= (Σ=1 ())
= Q (ΣQ−1 ())
The nonlinear part Q can be removed up to an affine
transformation in ((n/mQ)23mQ) when Q = (Q1,..,Qn/Qm)
and each Qi is a nonlinear bijection on mQ bits. After the
nonlinear P and Q are removed, the equation becomes F = B
S A. The specialized affine equivalence algorithm (SAEA)
with (n322n) is applied into the equation. and in O ((n/m)
mA323m) can be found, where mA is the smallest integer p
such that A is a block diagonal matrix with p×p matrix blocks.
Matrix block will be convert using S-box to produce a new
matrix.
 

D. ShiftRow
Let state be where i=1, 2, 3,…, r, round=number of
rounds
 

After shift row,
 

Preventing DoS Attacks in IoT Using AES
e-ISSN: 2289-8131 Vol. 9 No. 3-11 59
E. MixColumn
This operating involve the modular multiplication of 2
four-term polynomials whose coefficients are element of
All the columns in state are treated as four terms
polynomial
      and
   .
Polynomial multiplication
 

 
where:
 
 
 
 
 
 
 
Modular reduction
Since the outcome of c(x) has 7-term polynomial, it has to
be reduced to 4 term, as it need to be in 4-byte word.
 

  
  
 
    
    
 
where:
 
 
 
 
Matrix representation
Using polynomial multiplication,
 
 
 
 
Replace coefficients of a(x) with the constants [3 1 1 2], we
will get:
 
  
 
  Or,
 

F. AddRoundKey
Each Round Key consist of Nb words from the key
schedule are each added into the column of the state, such that
[] [] • [] for 0 • c
< Nb.
The key matrix where i=1,2,…,r-1 will be added to
matrix resulted from MixColumn. This will produce
where i=1,2,…,r-1.
 
For the first round i=1,
For i=r, formulae  
where was output of ShiftRow,
=cipher text
is used because MixColumn transformation is not repeated in
final round. . This proves that our proposed method is
more secure in terms of avoiding the attacks especially the
DoS attack. It can be used in IoT setting anywhere, as it will
ensure that Man-in-the-Middle attack will not occur. In
future, we plan to test our algorithm on IoT devices and check
its security and execution time to benchmark it with other
security algorithm.
VI. CONCLUSION
This paper presented novel AES implementation with a
simple and integrated countermeasure against Denial of
Services Attack (DoS) in IoT. IoT can be divided into smart
grid, smart car, smart campus, smart house, wearables and
industrial internet. The security involves the measures and
controls that ensure confidentiality, integrity and availability
of the information processed. However, there are some of the
attack techniques of DoS such as Attack Tools, Application-
layer Floods, Degradation-Of-Services and Denial-Of-
Services. Rijndael algorithm incorporates four
transformations namely SubBytes, ShiftRows, MixColumns
and lastly is AddRoundKey in each round step and it is a
uniform and parallel composition. AES has a strong
symmetric key cryptographic algorithm, which uses table of
lookups. To carry out the encryption and decryption, AES
need a minimum of 128 bits or 192 bits with recommendation
of 256 bits cryptographic keys. The algorithms is composed
of three layers, which are linear diffusion, non-linear
diffusion and key mixing. The new design and idea allows the
construction of the actual cores with speed characteristics and
efficient area. Protecting against the threats and attacks in the
cyber world still need to be investigate and excavation
however it is still a challenge and it is also costly.
Development of the efficient countermeasures for the
prevention of the side-channel attacks in IoT is one of the
open issue in scientific world and it should be further
investigated optimized in the future research by human. The
proposed algorithm will be compared against present security
algorithms for security effectiveness and their effect on
memory as well as computational usage.
ACKNOWLEDGEMENT
The work is fully funded by Research and Innovation
Management Center (RIMC) under the grant number
F08/SpSG/1403/16/4.
Journal of Telecommunication, Electronic and Computer Engineering
60 e-ISSN: 2289-8131 Vol. 9 No. 3-11
REFERENCES
[1] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, Internet of
Things (IoT): A vision, architectural elements, and future
directions,” Future generation computer systems, vol. 29, no. 7, pp.
1645-1660, 2013.
[2] B. Li, J. Yub, Research and application on the smart home based on
component technologies and Internet of Things,” Advanced in Control
Engineering and Information Science, vol. 15, pp. 2087 2092, 2011.
Retrieved from http://www.sciencedirect.com.
[3] M. A. Zaveri, S. K. Pandey, and J. Kumar, Collaborative service
oriented smart grid using the Internet of Things,” In Communication
and Signal Processing (ICCSP), 2016 International Conference on, pp.
1716-1722, Apr. 2016. IEEE.
[4] S. Pawel, FPGA Trojans through detecting and weakening of
cryptographic primitives,” IEEE Transactions on Computer-Aided
Design of Integrated Circuits and Systems, vol. 34, no. 8, pp. 1236-
1249, 2015.
[5] A. A. Panmu, K. S. Chong, W. G. Ho, and B. H. Gwee, Interceptive
Side Channel Attack on AES-128 Wireless Communications for IoT
Applications,” Asia Pacific Conference on Circuits and System 2016,
pp. 650-653, 2016.
[6] G. Singh, A study of encryption algorithms (RSA, DES, 3DES and
AES) for information security,” International Journal of Computer
Applications, vol. 67, no. 19, 2013.
[7] M. M. Wong, M. L. D. Wong, A. K. Nandi, et al., “Composite field
GF(((22)2)2) Advanced Encryption Standard (AES) S-box with
algebraic normal form representation in the subfield inversion,” IET
Circuits Devices Syst., vol. 5, no. 6, pp. 471476, May 2011.
[8] L. Whitney, Adobe hack attack affected 38 million accounts, 2013.
Retrieved from CNET: https://www.cnet.com/news/adobe-hack-
attack-affected-38-million-accounts/.
[9] C. Paar, J. Pelzl, and B. Preneel, Understanding Cryptography: A
Textbook for Students and Practitioners, 2010. Springer.
[10] A. Jose, SecCloud Protocol Implementation Using AES Algorithm
for Security and Privacy in Cloud Computing,” 2014 International
Journal for Research in Applied Science and Engineering Technology,
vol. 2, no. 2, pp. 1-8, 2014.
[11] J. Yan, F. Chen, An Improved AES Key Expansion Algorithm,”
International Conference on Electrical, Mechanical and Industrial
Engineering, 2016.
[12] A. Al-Haj, G. Abandah, and N. Hussein, Crypto-based algorithms for
secured medical image transmission,” IET Information Security, vol. 9,
no. 6, pp. 365-373, 2015.
[13] S. Srinivas, FPGA Based Hardware Implementation of AES Rijndael
Algorithm for Encryion and Decryption,” International Conference on
Electrical, Electronics, and Optimization Techniques, pp 1769-1776,
2016.
[14] N. Ruan and Y. Hori, DoS atack-tolerant TESLA-based broadcast
authentication protocol in Internet of Things,” International
Conference on Selected Topics in Mobile and Wireless Networking, pp
60-65, 2012.
[15] Y. Yuan, H. Yuan, L. Guo, H. Yang, and S. Sun, Resilient Control of
Networked Control System Under DoS Attacks: A Unified Game
Approach,” IEEE Transactions On Industrial Informatics, vol. 12, no.
5, pp. 1786-1794, 2016.
[16] N. Mathu and R. Bansode, AES Based Text Encryption Using 12
Rounds With Dynamic Key Selection, 7th International Conference
on Communication, Computing and Virtualization 2016, pp.1036-
1043, 2016.
[17] Q. Liu, Z. Xu, and Y. Yuan, High throughput and secure advanced
encryption standard on field programmable gate array with fine
pipelining and enhanced key expansion,” IET Computers & Digital
Techniques, vol. 9, no. 3, pp. 175-184, 2015.
... AES was suggested to have better performance than other algorithms such as RSA, DES and hashing, where AES has the lowest time complexity [20,21]. AES could be used to mitigate DoS attacks on IoT or other devices [22]. AES operates on fixed data block lengths of 128 bits and incorporates the substitution and permutation structure. ...
... AddRundKey 'substitution stages' Figure 1 represents the AES algorithm flow chart [23]. on IoT or other devices [22]. AES operates on fixed data block lengths of 128 bits and incorporates the substitution and permutation structure. ...
Article
Full-text available
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data through their personal devices. Although the BYOD practice implies plenty of advantages, this also opens the door to a variety of security risks. This study investigates these security risks and proposes a complementary encryption approach with a digital signature that uses symmetric and asymmetric algorithms, depending on the organization’s digital certificate, to secure sensitive information stored in employees’ devices within the framework of BYOD policies. The method uses Advanced Encryption System (AES), Blowfish, RSA and ElGamal with a digital signature to achieve strong encryption and address critical security considerations such as user authentication, confidentiality and data integrity. The proposed encryption approach offers a robust and effective cryptographic solution for securing sensitive information in organizational settings that involve BYOD policies. The study includes experimental results demonstrating the proposed approach’s efficiency and performance, with reasonable encryption and decryption times for different key and file sizes. The results of the study revealed that AES and Blowfish have the best execution time. AES has a good balance of security and performance. RSA performs better than ElGamal in encryption and signature verification, while RSA is slower than ElGamal in decryption. The study also provides a comparative analysis with previous studies of the four encryption algorithms, highlighting the strengths and weaknesses of each approach.
... In our paper, securing wireless communication protocol was done by doubling the process of AES with two different keys at the two levels (AES128 security API libraries level and ZigBee module level) which gives difficulty to the attacker or malware to interrupt the network or system as a result of the strength of the double encryption of AES. This is similar to what was done in ref. [27]. The key is manually pre-install onto each legitimate device of the ZigBee-enabled network (two devices). ...
Article
Full-text available
This paper describes the design and implementation of a wireless control area network (CAN bus) protocol for communication between the smart NOx (nitrogen oxide) sensor on diesel engines and the engine control unit (ECU). In this research, the approach taken is based on a case study of Wärtsilä's smart NOx sensor on a W4L20 diesel engine with the objective of replacing the wired CAN protocol with a wireless CAN communication node. In the current setup, the smart NOx sensor is connected to the engine control unit (ECU) with a wired CAN bus connection. The XBee module, which uses the ZigBee (IEEE 802.15.4) technology was used in the design and implementation of the wireless CAN prototype. With the emergence of 5G networks and the era of IoT, the topic of wireless industrial automation becomes essential in the modern industry. In addition to the great advantages and opportunities that the use of wireless nodes has in automation systems, there are many real challenges. The practical design challenges have been addressed in this paper.
... Wireless networks can be victim of sniffing, eavesdropping and other related wireless network attacks that include MitM, impersonation attacks, DoS [83] and Sybli. These attacks are vulnerable as they compromise privacy; moreover, they can result in major denial of the overall system by exhausting system bandwidth, memory, power, etc. [84]. ...
Article
Full-text available
This paper demonstrates a broad exploration of existing authentication and secure communication of unmanned aerial vehicles (UAVs) in a ‘6G network’. We begin with an overview of existing surveys that deal with UAV authentication in 6G and beyond communications, standardization, applications and security. In order to highlight the impact of blockchain and UAV authentication in ‘UAV networks’ in future communication systems, we categorize the groups in this review into two comprehensive groups. The first group, named the Performance Group (PG), comprises the performance-related needs on data rates, latency, reliability and massive connectivity. Meanwhile, the second group, named the Specifications Group (SG), is included in the authentication-related needs on non-reputability, data integrity and audit ability. In the 6G network, with blockchain and UAV authentication, the network decentralization and resource sharing would minimize resource under-utilization thereby facilitating PG targets. Furthermore, through an appropriate selection of blockchain type and consensus algorithms, the SG’s needs of UAV authentication in 6G network applications can also be readily addressed. In this study, the combination of blockchain and UAV authentication in 6G network emergence is reviewed as a detailed review for secure and universal future communication. Finally, we conclude on the critical identification of challenges and future research directions on the subject.
... However, some accounts and application developers enable locks after multiple incorrect password attempts, helping the organizations track and protect their users. Thus, one of the primary uses of the MFA is its characteristic of reducing the security risks [30,[36][37][38][39][40]. There are different ways through which the MFA is enabled. ...
Article
Full-text available
There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a continued evolution of the mobile network. Blockchain technology is one of the leading supporting technologies predicted to provide a secure and unique network to 6G-enabled devices, transactions, and applications. It is anticipated that the 6G mobile networks will be virtualized, have cloud-based systems, and aim to be the foundation for the Internet of Everything. However, along with the development of communication technologies, threats from malicious parties have become more sophisticated, making security a significant concern for the 6G era in the future. Despite enormous efforts by researchers to improve security and authentication protocols, systems still face novel intrusion and attacks. Recently, multifactor authentication techniques (MFA) have been deployed as potential solutions to attacks in blockchains. The 6G applications and the cellular network have specific vulnerabilities that need to be addressed using blockchain-based MFA technologies. The current paper is a systematic review that discusses the three technologies under consideration; then, several studies are reviewed that discuss MFA techniques in general and use blockchains as potential solutions to future security and authentication issues that may arise for 6G applications.
... In the field of computer science, there are many proposed preventative approaches to tackle DoS, such as strengthening the data authentication [107] dividing the network resources into different classes of services [108], improving network and routing infrastructures, statistical monitoring network [109], [110] and congestion algorithms. In the context of the cyber-physical layer of the inverter-based smart grid, according to the scope of our study, authentication and encryption approaches are taken into consideration, with an example of the application of Advanced Encryption Standard (AES) algorithm as demonstrated in [111]. However, due to the computational load required for defense, such traditional cryptographic tools that can be used to prevent DoS and DDoS attacks may degrade service quality and even create an open opportunity for DoS attack [112]. ...
Article
Full-text available
The blossom of renewable energy worldwide and its uncertain nature have driven the need for a more intelligent power system with the deep integration of smart power electronics. The smart inverter is one of the most critical components for the optimal operation of Smart Grid. However, due to the deep information and communication technology (ICT) infrastructure implementation that most inverter-based smart power systems tend to have, they are vulnerable to severe external threats such as cyberattacks by hackers. This paper presents a comprehensive review of the system structure and vulnerabilities of typical inverter-based power system with distributed energy resources (DERs) integration, nature of several types of cyberattacks, state-of-the-art defense strategies including several detection and mitigation techniques, and an overview and comparison of testbed and simulation tools applicable for cyber-physical research. Finally, challenges, unsolved problems, and future direction of the field are discussed and concluded at the end of the journal. This paper provides an all-inclusive survey at the state of the art smart grid cybersecurity research and paves the path for potential research topics in the future.
... It is considered as the most popular and dominant attack. Generally, attackers can use flooding attack to exhaust system's resources including memory, CPU, and bandwidth [58][59][60][61][62][63]. us, he either prevents the system to provide service or he makes it ineffective. ...
Article
Full-text available
Internet of Things (IoT) refers to a vast network that provides an interconnection between various objects and intelligent devices. The three important components of IoT are sensing, processing, and transmission of data. Nowadays, the new IoT technology is used in many different sectors, including the domestic, healthcare, telecommunications, environment, industry, construction, water management, and energy. IoT technology, involving the usage of embedded devices, differs from computers, laptops, and mobile devices. Due to exchanging personal data generated by sensors and the possibility of combining both real and virtual worlds, security is becoming crucial for IoT systems. Furthermore, IoT requires lightweight encryption techniques. Therefore, the goal of this paper is to identify the security challenges and key issues that are likely to arise in the IoT environment in order to guide authentication techniques to achieve a secure IoT service.
Chapter
Internet of things (IoT) is one of the new technologies that is expanding exponentially and is presenting new opportunities in a variety of industries, including business, academics, healthcare, transportation, industry, environment, and making our home and cities smart, among others. The IoT system's smart gadgets will be able to perceive, gather, and transport data via the internet without the need for human interaction. Large businesses strive to include technology into their marketing or digital marketing plan that reshapes consumers' expectations, attitudes, and requirements toward businesses in addition to communication style and product promotion. Due to the utilization of several smart devices, networks, and software that are weak and susceptible to hacking, it has a number of security vulnerabilities. The study focuses on the impression of IoT in digital marketing, IoT surface attack and security flaws, technological and security issues in digital marketing, and tries to present some preventive solutions for using IoT's in digital marketing.
Article
Full-text available
Many Internet of Things (IoT) devices use an Advanced Encryption Standard (AES) algorithm to secure data stored and transmitted during the communication process. The AES algorithm often suffers DC (DC) attacks. Little has been done to prevent DC attacks, particularly on an AES algorithm. This study focuses on preventing Differential Cryptanalysis attacks. DC attacks are practiced on an AES algorithm that is found on IoT devices. The novel approach of using a Khumbelo Difference Muthavine (KDM) function and changing the 8 × 8 S-Boxes to be the 8 × 32 S-Boxes successfully prevents DC attacks on an AES algorithm. A KDM function is a newly mathematically developed function, coined and used purposely in this study. A KDM function was never produced, defined, or utilized before by any researcher except for in this study. A KDM function makes a new 32-Bit S-Box suitable for the new Modified AES algorithm and confuses the attacker since it comprises many mathematical modulo operators. Additionally, these mathematical modulo operators are irreversible. The study managed to prevent the DC attack of a minimum of 70% on AES and a maximum of 100% on a Simplified DES. The attack on the new Modified AES Algorithm is 0% since no S-Box is used as a building block.
Conference Paper
Full-text available
AES algorithm or Rijndael algorithm is a network security algorithm which is most commonly used in all types of wired and wireless digital communication networks for secure transmission of data between two end users, especially over a public network. This paper presents the hardware implementation of AES Rijndael Encryption and Decryption Algorithm by using Xilinx Virtex-7 FPGA. The hardware design approach is entirely based on pre-calculated look-up tables (LUTs) which results in less complex architecture, thereby providing high throughput and low latency. There are basically three different formats in AES. They are AES-128, AES-192 and AES-256. The encryption and decryption blocks of all the three formats are efficiently designed by using Verilog-HDL and are synthesized on Virtex-7 XC7VX690T chip (Target Device) with the help of Xilinx ISE Design Suite-14.7 Tool. The synthesis tool was set to optimize speed, area and power. The power analysis is made by using Xilinx XPower Analyzer. Pre-calculated LUTs are used for the implementation of algorithmic functions, namely S-Box and Inverse S-Box transformations and also for GF (2^8) i.e. Galois Field Multiplications involved in Mix-Columns and Inverse Mix-Columns transformations. The proposed architecture is found to be having good efficiency in terms of latency, throughput, speed/delay, area and power.
Article
Full-text available
Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three classes: watermarking-based algorithms, crypto-based algorithms and hybrid algorithms. In this study, the authors propose two crypto-based algorithms capable of providing confidentiality, authenticity and integrity services to medical images exchanged in telemedicine applications. Strong cryptographic functions with internally generated symmetric keys and hash codes are used. The advanced encryption standard-Galois counter mode is used with the whirlpool hash function to provide confidentiality and authenticity, and the elliptic curve digital signature algorithm is used to provide authenticity and integrity. The proposed algorithms are based on the digital imaging and communication in medicine (DICOM) standard; however, unlike the standard, the algorithms provide confidentiality, authenticity and integrity for the header data, as well as for the pixel data of the DICOM images. Effectiveness of the proposed algorithms is evaluated and demonstrated through extensive experimentation using a benchmark set of DICOM images.
Article
Full-text available
This paper presents the design of a smart home system based on Internet of Things (IOT) and service component technologies. The current situation of IOT has been analyzed in detail. An approach based on SOA and component technology has been proposed and applied, which can help to realize every-changing dynamic semantic integration of the web services. Furthermore, the software architecture and main modules are explained as well. Finally, this paper discussed the heterogeneous information fusion in the Internet of Things. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS 2011]
Conference Paper
Power generation, distribution and optimal utilization is a concern for every organization and government sector industries. Due to innovation and usage of advanced technologies, a number of independent research activities investigates the performance in terms of real time management and processing of data. It helps to realize the concept of green environment and support with novel solutions for various green energy applications. There is a need of a smart way of distribution, management and utilization of power to optimize energy consumption and its cost. In this context, we present a Collaborative Service Oriented Smart Grid using Internet of Things (CSOSGI). It allows on time and in full delivery of services for power generation, distribution and utilization with collaborative data processing in an intelligent way using Internet of Things. Further, we explore how it leads to green environment, energy saving and optimal resource utilization with automation for smart city realization.
Article
We consider the problem of resilient control of networked control system (NCS) under Denial-of-Service (DoS) attack via a unified game approach. The DoS attacks lead to extra constraints in the NCS, where the packets may be jammed by a malicious adversary. Considering the attack induced packet dropout, optimal control strategies with multi-tasking and central-tasking structures are developed using game theory in the delta domain, respectively. Based on the optimal control structures, we propose optimality criteria and algorithms for both cyber defenders and DoS attackers. Both simulation and experimental results are provided to illustrate the effectiveness of the proposed design procedure.
Article
Aiming at protection of high speed data, field programmable gate array (FPGA)-based advanced encryption standard (AES) design is proposed here. Deep investigation into the logical operations of AES with regard to FPGA architectures leads to two efficient pipelining structures for the AES hardware implementation. The two design options allow users to make a trade-off among speed, resource usage and power consumption. In addition, a new key expansion scheme is proposed to address the potential issues of existing key expansion scheme used in AES. The proposed key expansion scheme with additional nonlinear operations increases the complexity of cracking keys by up to 2(N - 1) times for N-round AES. The proposed design is evaluated on various FPGA devices and is compared with several existing AES implementations. In terms of both throughput and throughput per slice, the proposed design can overcome most existing designs and achieves a throughput of 75.9 Gbps on a latest FPGA device. Two parallel implementations of the proposed design can meet the real-time encryption/decryption demand for 100 Gbps data rate. Furthermore, the proposed AES design is implemented on the Zynq xc7z020 FPGA platform, demonstrating its application to image encryption.
Article
This paper investigates a novel attack vector against cryptography realized on FPGAs, which poses a serious threat to real-world applications. We demonstrate how a targeted bitstream modification can seriously weaken cryptographic algorithms, which we show with the examples of AES and 3-DES. The attack is performed by modifying the FPGA bitstream that configures the hardware elements during initialization. Recently, it has been shown that cloning of FPGA designs is feasible, even if the bitstream is encrypted. However, due to its proprietary file format, a meaningful modification is challenging. While some previous work addressed bitstream reverse-engineering, so far it has not been evaluated how difficult it is to detect and modify cryptographic elements. We outline two possible practical attacks that have serious security implications. We target the S-boxes of block ciphers that can be implemented in look-up tables or stored as precomputed set of values in the memory of the FPGA. We demonstrate that it is possible to detect and apply meaningful changes to cryptographic elements inside an unknown, proprietary, and undocumented bitstream. Our proposed attack does not require any knowledge of the internal routing. Furthermore, we show how an AES key can be revealed within seconds. Finally, we discuss countermeasures that can raise the bar for an adversary to successfully perform this kind of attack.
Conference Paper
The Internet of Things (IoTs) is an emerging concept referring to networked everyday objects that interconnect to each other via wireless sensors attached to them. TESLA is a source authentication protocol for the broadcast network. Scalability of TESLA is limited by distribution of its unicast-based initial parameter. Low energy consumption version of TESLA is μTESLA, which is designed for wireless sensor network (WSN), while cannot tolerate DoS attack. TESLA++ is the DoS-tolerant version and is designed for VANET. TESLA++ cannot be accepted by WSN because of its higher consumption of power. To realize secure and robust DoS attack in the hybrid-vehicle-sensor network, we provide a TESLA-based protocol against DoS attack with a lower consumption of power. Analysis results demonstrate that using our protocol is better than using μTESLA or TELSA++, respectively.