• Corpus ID: 212447067

IMPROVING SECURITY ANALYSIS OF IOT ENCRYPTION

@article{BSurya2018IMPROVINGSA,
  title={IMPROVING SECURITY ANALYSIS OF IOT ENCRYPTION},
  author={B.Surya and A.V.Sai Prasad and V.Rajesh Kumar and I. Chandra},
  journal={International Journal of Advance Research and Innovative Ideas in Education},
  year={2018},
  volume={4},
  pages={257-261}
}
A product device for security examination of IoT frameworks is displayed using SIMECK. The instrument, named ASTo (Apparatus Programming Tool) empowers the perception of IoT frameworks utilizing an area particular demonstrating dialect. The displaying dialect gives develops to express the equipment, programming and social ideas of an IoT framework alongside security ideas. Security issues of IoT frameworks are distinguished dependent on the properties of the develops and their connections… 

Figures from this paper

References

SHOWING 1-10 OF 22 REFERENCES

Constraints in the IoT: The World in 2020 and Beyond

This paper surveys major technical limitations that are hindering the successful deployment of the IoT such as standardization, interoperability, networking issues, addressing and sensing issues, power and storage restrictions, privacy and security, etc.

Integrating RFIDs and Smart Objects into a Unified Internet of Things Architecture

A generic Internet of Things architecture trying to resolve the existing restrictions of current architectural models by integrating both RFID and smart object-based infrastructures, while also exploring a third parameter, i.e. the social potentialities of the Internet of Thing building blocks towards shaping the “Social Internet of things”.

A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers

  • Fan ZhangShize Guo Dawu Gu
  • Computer Science, Mathematics
    IEEE Transactions on Information Forensics and Security
  • 2016
A comprehensive study of AFA on an ultra-lightweight block cipher called LBlock shows that a single fault injection is enough to recover the master key of LBlock within the affordable complexity in each scenario.

On the Security of NOEKEON against Side Channel Cube Attacks

This paper investigates the security of the NOEKEON block cipher against side channel cube attacks and shows that it is possible to extract 60 independent linear equations over 99 (out of 128) key variables.

KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers

A new family of very efficient hardware oriented block ciphers divided into two flavors, which is more compact in hardware, as the key is burnt into the device (and cannot be changed), and achieves encryption speed of 12.5 KBit/sec.

Security evaluation on Simeck against zero-correlation linear cryptanalysis

This study evaluates the security level of Simeck against zero-correlation linear cryptanalysis and proposes a new block cipher inspired from both SIMON and SPECK, which is more compact and efficient.

Efficient Hamming weight-based side-channel cube attacks on PRESENT

The Simeck Family of Lightweight Block Ciphers

This paper introduces Simeck, a new family of lightweight block ciphers that combines the good design components from both Simon and Speck, in order to devise even more compact and efficient blockciphers.

Side Channel Cube Attack on PRESENT

The non-random properties in the first four rounds of PRESENT are detected based on cube attack proposed by Shamir et al. by analyzing the features of the S-box and pLayer and giving the side channel cube attack on PRESENT.

Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN

A new framework for an efficient key recovery attack on block ciphers using a kind of dynamic cube attack, where a cube tester is positioned at the middle of the cipher which is extended in two directions over the maximum possible upper and lower rounds, provided that some subkey bits are guessed.