Preventing DoS Attacks in IoT Using AES

Authors

  • Yasir Javed FCSIT, UNIMAS, Sarawak, Malaysia. Prince Sultan University, Riyadh, KSA.
  • Adnan Shahid Khan FCSIT, UNIMAS, Sarawak, Malaysia
  • Abdul Qahar FCSIT, UNIMAS, Sarawak, Malaysia. The University of Punjab, Lahore, Pakistan.
  • Johari Abdullah FCSIT, UNIMAS, Sarawak, Malaysia

Keywords:

DoS Attack, AES, IoT Security, Confidentiality, White Box,

Abstract

The Internet of Things (IoT) is significant in today’s development of mobile networks enabling to obtain information from the environment, devices, and appliances. A number of applications have been implemented in various kinds of technologies. IoT has high exposure to security attacks and threats. There are several requirements in terms of security. Confidentiality is one of the major concerns in the wireless network. Integrity and availability are key issues along with the confidentiality. This research focuses on identifying the attacks that can occur in IoT. Packet filtering and patches method were used to secure the network and mitigate mentioned attacks but these techniques are not capable of achieving security in IoT. This paper uses Advanced Encryption Standard (AES) to address these mentioned security issues. Official AES version uses the standard for secret key encryption. However, several problems and attacks still occur with the implementation of this original AES. We modified AES by adding white box and the doubling of the AES encryption. We also replaced the Substitute-Byte (S-Box) in the conventional AES with the white box. The significance of a white box is where the whole AES cipher decomposed into round functions. While doubling the process of AES gives difficulty to the attacker or malware to interrupt the network or system. From the algorithms, our proposed solutions can control DoS attack on IoT and any other miniature devices.

References

J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,” Future generation computer systems, vol. 29, no. 7, pp. 1645-1660, 2013.

B. Li, J. Yub, “Research and application on the smart home based on component technologies and Internet of Things,” Advanced in Control Engineering and Information Science, vol. 15, pp. 2087 – 2092, 2011. Retrieved from http://www.sciencedirect.com.

M. A. Zaveri, S. K. Pandey, and J. Kumar, “Collaborative service oriented smart grid using the Internet of Things,” In Communication and Signal Processing (ICCSP), 2016 International Conference on, pp. 1716-1722, Apr. 2016. IEEE.

S. Pawel, “FPGA Trojans through detecting and weakening of cryptographic primitives,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 8, pp. 1236- 1249, 2015.

A. A. Panmu, K. S. Chong, W. G. Ho, and B. H. Gwee, “Interceptive Side Channel Attack on AES-128 Wireless Communications for IoT Applications,” Asia Pacific Conference on Circuits and System 2016, pp. 650-653, 2016.

G. Singh, “A study of encryption algorithms (RSA, DES, 3DES and AES) for information security,” International Journal of Computer Applications, vol. 67, no. 19, 2013.

M. M. Wong, M. L. D. Wong, A. K. Nandi, et al., “Composite field GF(((22)2)2) Advanced Encryption Standard (AES) S-box with algebraic normal form representation in the subfield inversion,” IET Circuits Devices Syst., vol. 5, no. 6, pp. 471–476, May 2011.

L. Whitney, Adobe hack attack affected 38 million accounts, 2013. Retrieved from CNET: https://www.cnet.com/news/adobe-hackattack-affected-38-million-accounts/.

C. Paar, J. Pelzl, and B. Preneel, Understanding Cryptography: A Textbook for Students and Practitioners, 2010. Springer.

A. Jose, “SecCloud Protocol Implementation Using AES Algorithm for Security and Privacy in Cloud Computing,” 2014 International Journal for Research in Applied Science and Engineering Technology, vol. 2, no. 2, pp. 1-8, 2014.

J. Yan, F. Chen, “An Improved AES Key Expansion Algorithm,” International Conference on Electrical, Mechanical and Industrial Engineering, 2016.

A. Al-Haj, G. Abandah, and N. Hussein, “Crypto-based algorithms for secured medical image transmission,” IET Information Security, vol. 9, no. 6, pp. 365-373, 2015.

S. Srinivas, “FPGA Based Hardware Implementation of AES Rijndael Algorithm for Encryion and Decryption,” International Conference on Electrical, Electronics, and Optimization Techniques, pp 1769-1776, 2016.

N. Ruan and Y. Hori, “DoS atack-tolerant TESLA-based broadcast authentication protocol in Internet of Things,” International Conference on Selected Topics in Mobile and Wireless Networking, pp 60-65, 2012.

Y. Yuan, H. Yuan, L. Guo, H. Yang, and S. Sun, “Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach,” IEEE Transactions On Industrial Informatics, vol. 12, no. 5, pp. 1786-1794, 2016.

N. Mathu and R. Bansode, “AES Based Text Encryption Using 12 Rounds With Dynamic Key Selection,” 7th International Conference on Communication, Computing and Virtualization 2016, pp.1036- 1043, 2016.

Q. Liu, Z. Xu, and Y. Yuan, “High throughput and secure advanced encryption standard on field programmable gate array with fine pipelining and enhanced key expansion,” IET Computers & Digital Techniques, vol. 9, no. 3, pp. 175-184, 2015.

Downloads

Published

2017-12-07

How to Cite

Javed, Y., Khan, A. S., Qahar, A., & Abdullah, J. (2017). Preventing DoS Attacks in IoT Using AES. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(3-11), 55–60. Retrieved from https://jtec.utem.edu.my/jtec/article/view/3184

Most read articles by the same author(s)