2019
DOI: 10.1109/access.2019.2916553
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing

Abstract: Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices. Collision attack represents a powerful category of side-channel analysis in extracting security information from embedded cryptographic algorithms. Since its proposition in 2003, plenty of collision detection algorithms are presented, most of which enumerate all the values of target plaintex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Whole key recovery attack. As a result, the traffic from IoT devices using outdated security implementations for communications is subject to efficient key recovery attacks [44] [45].…”
Section: Outdated Security/configuration In Communication Protocolsmentioning
confidence: 99%
“…Whole key recovery attack. As a result, the traffic from IoT devices using outdated security implementations for communications is subject to efficient key recovery attacks [44] [45].…”
Section: Outdated Security/configuration In Communication Protocolsmentioning
confidence: 99%
“…This importance is further underpinned by the incorporation of inventive data reading protocols and compression methods, all working collectively to attain this essential goal. A sophisticated approach to mitigate side-channel attacks, specifically collision attacks, in the context of edge computing was introduced by Ding et al [13]. Their approach, which capitalizes on the correlation between distance metrics and the reduction of plaintext candidate space, leads to a substantial boost in the efficiency of their proposed technique.…”
Section: Literature Workmentioning
confidence: 99%
“…(1) Device RAM Memory (Rm), Result of Offloadies (Rs), ( 2) Energy (E), FCaompatibleDevice () is a function in Android to check for RAM, (3) Compatible Device (Cd), CPU, and Device minimum requirements. (4) Input: (Cr) (5) for each MEC Server do (6) Output: {Rm, E, CPU} (7) end for (7) for each Device d do (8) Calculate the Compatibility check using FCompatibleDevice (), add the device to the Cd list (9) end for (10) for each Cd do (11) Rs � Output {task} (12) end for ND.add (D {i}) (7) end if (8) if (i < DL.size() then (9) Move to Step 3 (10) Output {ND} (11) end if (12) MES Input {NCR} (13) end for (14) for each ND do (15) if ND {i}.ram>3 GB && ND {i}.CPU>2.4 GHz then (16) CD.add (ND {i}) (17) end if (18) if i< CD.size() then (19) Move to Step 9 (20) end if (21) Output {CD} (22) Input {T} (23) Calculate Result using function Compute_Result () (24) Output {Result} (25) end for ALGORITHM 3: Algorithm for optimization.…”
Section: Data Availabilitymentioning
confidence: 99%
“…e ploy of [23] is that it does not consider the offloading task in the network easily and more securely. e depraved thing of [24] is that it does not consider more instructions to make the system more secure. e downside of the study is that it does not consider cryptography techniques to make the network more secure [25].…”
Section: Introductionmentioning
confidence: 99%