Preventing DoS Attacks in IoT Using AES

Authors

  • Yasir Javed FCSIT, UNIMAS, Sarawak, Malaysia. Prince Sultan University, Riyadh, KSA.
  • Adnan Shahid Khan FCSIT, UNIMAS, Sarawak, Malaysia
  • Abdul Qahar FCSIT, UNIMAS, Sarawak, Malaysia. The University of Punjab, Lahore, Pakistan.
  • Johari Abdullah FCSIT, UNIMAS, Sarawak, Malaysia

Keywords:

DoS Attack, AES, IoT Security, Confidentiality, White Box,

Abstract

The Internet of Things (IoT) is significant in today’s development of mobile networks enabling to obtain information from the environment, devices, and appliances. A number of applications have been implemented in various kinds of technologies. IoT has high exposure to security attacks and threats. There are several requirements in terms of security. Confidentiality is one of the major concerns in the wireless network. Integrity and availability are key issues along with the confidentiality. This research focuses on identifying the attacks that can occur in IoT. Packet filtering and patches method were used to secure the network and mitigate mentioned attacks but these techniques are not capable of achieving security in IoT. This paper uses Advanced Encryption Standard (AES) to address these mentioned security issues. Official AES version uses the standard for secret key encryption. However, several problems and attacks still occur with the implementation of this original AES. We modified AES by adding white box and the doubling of the AES encryption. We also replaced the Substitute-Byte (S-Box) in the conventional AES with the white box. The significance of a white box is where the whole AES cipher decomposed into round functions. While doubling the process of AES gives difficulty to the attacker or malware to interrupt the network or system. From the algorithms, our proposed solutions can control DoS attack on IoT and any other miniature devices.

Downloads

Published

2017-12-07

How to Cite

Javed, Y., Khan, A. S., Qahar, A., & Abdullah, J. (2017). Preventing DoS Attacks in IoT Using AES. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(3-11), 55–60. Retrieved from https://jtec.utem.edu.my/jtec/article/view/3184

Most read articles by the same author(s)