Abstract
Internet of Things (IoT) devices are increasingly embedded in many aspects of our daily lives. The massive connectivity of these devices means the enormous amounts of data they transmit becomes susceptible to different types of attacks. Therefore, an IoT system demands that high security features be an integral part of the implementation of these IoT devices, which are responsible for exchanging critical and sensitive information. The proper use of Cryptography through Cryptographic ICs therefore becomes essential to securing all IoT devices. A Cryptographic IC also needs to be tested so as to ensure its correct functionality. Although various types of testing methods exist, scan-based testing is the most popular IC testing technique. When it comes to Cryptographic ICs, these scan-based testing methods can retrieve secret information stored inside them. This happens because scan chain structure provides a backdoor to hackers who can exploit easily sensitive information. Such attacks are known as scan-based side channel attacks. Therefore, it becomes absolutely essential to guarantee the security of these Cryptographic ICs which are used to secure IoT devices, and also maintain their testing capabilities to ensure their functional correctness. In this chapter, Cryptographic Algorithms used for security purposes in IoT devices are discussed, as well as various side channel attacks on AES Cryptographic ICs reported in the literature. Existing countermeasures for securing the scan chain, which is typically inserted in the AES Cryptographic ICs, are examined. In the next section of the chapter, the design and simulation results of a scan-inserted AES Crypto module are presented. The proposed methods which are used to enhance the security of the SCAN Chain of AES Crypto module are detailed. Closely examined are the results and analysis of the implemented Crypto module. The conclusion highlights achievements while completing this work and discusses future work. After reading this chapter, the reader should be able to understand the importance of the SCAN chain side channel attacks and their countermeasures in Cryptographic ICs used in IoT devices for security.
Full Text
Topics from this Paper
Internet Of Things Devices
Cryptographic ICs
Scan-based Side Channel Attacks
Side Channel
Scan Chain
+ Show 5 more
Create a personalized feed of these topics
Get StartedTalk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Similar Papers
arXiv: Cryptography and Security
Mar 18, 2019
Applied Sciences
Mar 12, 2021
IEEE Internet of Things Journal
Oct 1, 2017
Digital Investigation
Jul 1, 2019
ACM Transactions on Sensor Networks
Jul 17, 2023
Journal of Ambient Intelligence and Humanized Computing
Sep 10, 2019
Mathematics
Nov 17, 2022
Measurement: Sensors
Dec 1, 2022
Future Generation Computer Systems
Mar 1, 2019
International Journal of Advanced Research in Science, Communication and Technology
May 20, 2022
Telecom
Jan 4, 2022