N. Ansari, R. Hussain, Syed Sajjad Hussain, Sheeraz Arif
{"title":"AES算法实现对物联网设备攻击的不变性","authors":"N. Ansari, R. Hussain, Syed Sajjad Hussain, Sheeraz Arif","doi":"10.1109/ICCOINS49721.2021.9497174","DOIUrl":null,"url":null,"abstract":"Internet-of-Things (IoT) establish connection between billions of smart devices, performing a diverse range of purposes. These devices embedded with sensors, software and network to exchange and collect data with each other. In IoT hardware security is the main task for researchers because large number of devices connected day by day with each other. As researchers concern, latest research is now focused on seeing attack and defensive site of IoT devices. Side channel attacks are one of the major concerns for researchers who work on IoT. This paper presents an implementation of AES algorithm with proposed false key mechanism and power reduction technique against SCA in IoT devices.","PeriodicalId":245662,"journal":{"name":"2021 International Conference on Computer & Information Sciences (ICCOINS)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Invariant of AES algorithm implementations against Attacks in IoT Devices\",\"authors\":\"N. Ansari, R. Hussain, Syed Sajjad Hussain, Sheeraz Arif\",\"doi\":\"10.1109/ICCOINS49721.2021.9497174\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet-of-Things (IoT) establish connection between billions of smart devices, performing a diverse range of purposes. These devices embedded with sensors, software and network to exchange and collect data with each other. In IoT hardware security is the main task for researchers because large number of devices connected day by day with each other. As researchers concern, latest research is now focused on seeing attack and defensive site of IoT devices. Side channel attacks are one of the major concerns for researchers who work on IoT. This paper presents an implementation of AES algorithm with proposed false key mechanism and power reduction technique against SCA in IoT devices.\",\"PeriodicalId\":245662,\"journal\":{\"name\":\"2021 International Conference on Computer & Information Sciences (ICCOINS)\",\"volume\":\"216 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computer & Information Sciences (ICCOINS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCOINS49721.2021.9497174\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computer & Information Sciences (ICCOINS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCOINS49721.2021.9497174","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Invariant of AES algorithm implementations against Attacks in IoT Devices
Internet-of-Things (IoT) establish connection between billions of smart devices, performing a diverse range of purposes. These devices embedded with sensors, software and network to exchange and collect data with each other. In IoT hardware security is the main task for researchers because large number of devices connected day by day with each other. As researchers concern, latest research is now focused on seeing attack and defensive site of IoT devices. Side channel attacks are one of the major concerns for researchers who work on IoT. This paper presents an implementation of AES algorithm with proposed false key mechanism and power reduction technique against SCA in IoT devices.