2021
DOI: 10.1002/cpe.6764
|View full text |Cite
|
Sign up to set email alerts
|

Edge enhanced deep learning system for IoT edge device security analytics

Abstract: The processing of locally harvested data at the physically accessible edge devices opens a new avenue of security threats for edge enhanced analytics. Cryptographic algorithms are used to secure the data being processed on the edge device. However, the implementation weakness of the algorithms on the edge devices can lead to side‐channel attack vulnerability, which is exacerbated with the application of machine‐learning techniques. This research proposes a deep learning‐based system integrated at the edge devi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 57 publications
(102 reference statements)
0
1
0
Order By: Relevance
“…These template attacks are often quite successful against hardware-implemented advanced encryption algorithms, as shown by Bukasa et al [199]. Machine learning-based attacks have been applied as a cutting-edge method that involves utilizing machine learning algorithms to examine the EM emissions produced by a device as it executes cryptographic operations [80,100,113,117]. These machine learning-based attacks can be particularly successful since they automatically recognize EM emission patterns that signify the use of the encryption key.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…These template attacks are often quite successful against hardware-implemented advanced encryption algorithms, as shown by Bukasa et al [199]. Machine learning-based attacks have been applied as a cutting-edge method that involves utilizing machine learning algorithms to examine the EM emissions produced by a device as it executes cryptographic operations [80,100,113,117]. These machine learning-based attacks can be particularly successful since they automatically recognize EM emission patterns that signify the use of the encryption key.…”
Section: Discussionmentioning
confidence: 99%
“…They benefit from the information that unintentionally leaked from a device that was designed to prevent tampering. Mukhtar et al [100] used a side-channel EM leakage trace collected from an FPGA to conduct the Elliptic curve scalar multiplication (ECSM). The EM probes are employed to collect the leakages, which are then recorded properly to create a leakage dataset for further side-channel investigation.…”
Section: Em-sca On Ecc Implementationsmentioning
confidence: 99%
See 1 more Smart Citation
“…This vulnerability will become more and more serious. Mukhtar et al 11 proposed a deep learning‐based evaluation system integrated at the edge device to detect side channel leaks when edge devices deploy new security algorithms for updating. The model is trained in the cloud and deployed at the edge after the training is completed.…”
Section: Contentmentioning
confidence: 99%