Loading...
- Type of Document: M.Sc. Thesis
- Language: Farsi
- Document No: 51420 (05)
- University: Sharif University of Technology
- Department: Electrical Engineering
- Advisor(s): Salmasizadeh, Mahmoud; Gholampour, Iman
- Abstract:
- The Internet of Things remains a matter of concern in the minds of the activists in the field after being raised. The structure of an IoT-based system, the components of an IoT-based system, the requirements and limitations of the Internet of Things are the most important parts of which no clear description of them has ever been presented. Structural modifiability, processing constraints, energy supply constraints, and most importantly the security of an IoT-based network are among the issues that have complicated the analysis of an IoT-based System. So providing a clear scheme and an open system for such networks can make it easier to make progress in this area. In this study, we first outline the definition of an IoT-network and examining examples of protocols used in such networks. Then we focus specifically on the physical attacks on IoT-based network parts and examine its security challenges. Certainly, individuals and users of such networks do not want unauthorized persons and entities to be able to monitor and control their internal environment. Because in that case they will be able to disrupt the way they operate and even disable the devices while accessing information from individuals. Forgery of individuals by using their personal information, distributed denial-of-access attacks, the use of the power of processing multiple IoT-based networks, to carry out attacks on a third party, side channel attacks, ... are examples of physical attacks. In such a network due to the constraints on energy supply, generally devices with limited processing power are commonly used. Therefore, an environment suitable for performing side channel attacks is provided to the attackers. In this study, we present a novel FPGA-based implementation of the cryptography algorithms which have a two-layered resistance against power analysis attacks. Our countermeasure is based on the concept of finite state machine equipped with a random number generator. Beyond masking the intermediate variables as the first layer of defense, we randomize the sequences of operations and add dummy computations as the second layer of defense. Therefore, the first order attack is prevented and the number of power traces needed for a successful second order attack is vastly increased and the correlation coefficient is decreased, as expected
- Keywords:
- Side Channel Attacks ; Finite State Machine (FSM) ; Masking ; Internet of Things ; Hiding in Software ; Physical Attacks
-
محتواي کتاب
- view