2021
DOI: 10.36227/techrxiv.16430886.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks

Abstract: The prevalence of Internet of Things (IoT) allows heterogeneous and lightweight smart devices to collaboratively provide services with or without human intervention. With an ever-increasing presence of IoT-based smart applications and their ubiquitous visibility from the Internet, user data generated by highly connected smart IoT devices also incur more concerns on security and privacy. While a lot of efforts are reported to develop lightweight information assurance approaches that are affordable to resource-c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 13 publications
(2 reference statements)
0
3
0
Order By: Relevance
“…Moreover, THASSA can operate within existing systems. [9] THASSA addresses various attack models. The trusted device in THASSA operates a TPM, which addresses the power-based side channel attack at the TPM level.…”
Section: Declarationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, THASSA can operate within existing systems. [9] THASSA addresses various attack models. The trusted device in THASSA operates a TPM, which addresses the power-based side channel attack at the TPM level.…”
Section: Declarationsmentioning
confidence: 99%
“…Information assurance is an important aspect of the IoT design to ensure system integrity [3]. A lot of efforts have been reported to secure the IoT devices and networks, including access control [4,5], data authentication [6], privacy preservation [7,8], and security solutions against hardware-level attacks, i.e., side-channel attacks (SCA) [9,10]. The wide spread of sophisticated cyberattack tools has also shed light on IoT security.…”
Section: Introductionmentioning
confidence: 99%
“…A lot of efforts have been reported to secure the IoT devices and networks, including access control [31], [32], data authentication [18], privacy preservation [7], [21], and security solutions against hardware-level attacks, i.e. side-channel attacks (SCA) [11], [22]. The wide spread of sophisticated cyberattack tools has also shed light on IoT security.…”
Section: Introductionmentioning
confidence: 99%