Preventing DoS Attacks in IoT Using AES
Keywords:
DoS Attack, AES, IoT Security, Confidentiality, White Box,Abstract
The Internet of Things (IoT) is significant in today’s development of mobile networks enabling to obtain information from the environment, devices, and appliances. A number of applications have been implemented in various kinds of technologies. IoT has high exposure to security attacks and threats. There are several requirements in terms of security. Confidentiality is one of the major concerns in the wireless network. Integrity and availability are key issues along with the confidentiality. This research focuses on identifying the attacks that can occur in IoT. Packet filtering and patches method were used to secure the network and mitigate mentioned attacks but these techniques are not capable of achieving security in IoT. This paper uses Advanced Encryption Standard (AES) to address these mentioned security issues. Official AES version uses the standard for secret key encryption. However, several problems and attacks still occur with the implementation of this original AES. We modified AES by adding white box and the doubling of the AES encryption. We also replaced the Substitute-Byte (S-Box) in the conventional AES with the white box. The significance of a white box is where the whole AES cipher decomposed into round functions. While doubling the process of AES gives difficulty to the attacker or malware to interrupt the network or system. From the algorithms, our proposed solutions can control DoS attack on IoT and any other miniature devices.References
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,” Future generation computer systems, vol. 29, no. 7, pp. 1645-1660, 2013.
B. Li, J. Yub, “Research and application on the smart home based on component technologies and Internet of Things,” Advanced in Control Engineering and Information Science, vol. 15, pp. 2087 – 2092, 2011. Retrieved from http://www.sciencedirect.com.
M. A. Zaveri, S. K. Pandey, and J. Kumar, “Collaborative service oriented smart grid using the Internet of Things,” In Communication and Signal Processing (ICCSP), 2016 International Conference on, pp. 1716-1722, Apr. 2016. IEEE.
S. Pawel, “FPGA Trojans through detecting and weakening of cryptographic primitives,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 8, pp. 1236- 1249, 2015.
A. A. Panmu, K. S. Chong, W. G. Ho, and B. H. Gwee, “Interceptive Side Channel Attack on AES-128 Wireless Communications for IoT Applications,” Asia Pacific Conference on Circuits and System 2016, pp. 650-653, 2016.
G. Singh, “A study of encryption algorithms (RSA, DES, 3DES and AES) for information security,” International Journal of Computer Applications, vol. 67, no. 19, 2013.
M. M. Wong, M. L. D. Wong, A. K. Nandi, et al., “Composite field GF(((22)2)2) Advanced Encryption Standard (AES) S-box with algebraic normal form representation in the subfield inversion,” IET Circuits Devices Syst., vol. 5, no. 6, pp. 471–476, May 2011.
L. Whitney, Adobe hack attack affected 38 million accounts, 2013. Retrieved from CNET: https://www.cnet.com/news/adobe-hackattack-affected-38-million-accounts/.
C. Paar, J. Pelzl, and B. Preneel, Understanding Cryptography: A Textbook for Students and Practitioners, 2010. Springer.
A. Jose, “SecCloud Protocol Implementation Using AES Algorithm for Security and Privacy in Cloud Computing,” 2014 International Journal for Research in Applied Science and Engineering Technology, vol. 2, no. 2, pp. 1-8, 2014.
J. Yan, F. Chen, “An Improved AES Key Expansion Algorithm,” International Conference on Electrical, Mechanical and Industrial Engineering, 2016.
A. Al-Haj, G. Abandah, and N. Hussein, “Crypto-based algorithms for secured medical image transmission,” IET Information Security, vol. 9, no. 6, pp. 365-373, 2015.
S. Srinivas, “FPGA Based Hardware Implementation of AES Rijndael Algorithm for Encryion and Decryption,” International Conference on Electrical, Electronics, and Optimization Techniques, pp 1769-1776, 2016.
N. Ruan and Y. Hori, “DoS atack-tolerant TESLA-based broadcast authentication protocol in Internet of Things,” International Conference on Selected Topics in Mobile and Wireless Networking, pp 60-65, 2012.
Y. Yuan, H. Yuan, L. Guo, H. Yang, and S. Sun, “Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach,” IEEE Transactions On Industrial Informatics, vol. 12, no. 5, pp. 1786-1794, 2016.
N. Mathu and R. Bansode, “AES Based Text Encryption Using 12 Rounds With Dynamic Key Selection,” 7th International Conference on Communication, Computing and Virtualization 2016, pp.1036- 1043, 2016.
Q. Liu, Z. Xu, and Y. Yuan, “High throughput and secure advanced encryption standard on field programmable gate array with fine pipelining and enhanced key expansion,” IET Computers & Digital Techniques, vol. 9, no. 3, pp. 175-184, 2015.
Downloads
Published
How to Cite
Issue
Section
License
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.