Design and analysis of countermeasures for securing IoT edge devices against power analysis attacks

dc.contributor.authorSingha, Thockchom Birjit
dc.date.accessioned2025-10-08T11:50:24Z
dc.date.issued2024
dc.descriptionSupervisors: Roy, P Paily and Ahamed, Shaik Rafi
dc.description.abstractIoT edge devices are plagued by power analysis attacks despite the usage of Advanced Encryption Standard (AES) as a part of securing information exchange. However, owing to the resource constraint environment offered by the IoT environment, an AES design consuming low resources with an embedded countermeasure providing high security ensuring minimal area and power overheads, is the need of the hour. This thesis presents four cumulative approaches in designing a countermeasure for AES to thwart the attacks. The first step is the wise choice of Masoleh S-box against other available S-boxes, providing minimal switching and enhanced nonlinearity. The second stride is by designing a novel Cipher Feed Back-64 mode inspired by the standard modes of AES operation. The third scheme is by splitting the SubBytes round operation into multiple clocks to reduce side-channel leakage. Finally, a novel expansion-compression Random Number Generator (RNG) assisted with buffer-based delay element is proposed to corrupt the meaningful samples of AES, acquired by the attacker. Analysis of hardware security metrics, like Measurements To Disclose (MTD), Signal-to-Noise Ratio (SNR), Mutual Information (MI) and Test Vector Leakage Assessment (TVLA) render this proposed four-dimensional approach to be highly resilient against the attacks, with minimal area and power overheads. The testing of the designs is performed for Application Specific Integrated Circuit (ASIC) using Synopsys and Cadence tools with UMC 65 nm technology node, and on Field Programmable Gate Array (FPGA) using Side-channel Attack Standard Evaluation BOard (SASEBO). Upon amalgamation of all the four works into one, the results showed negative area and power overheads of -2.91% and -5.61 %, respectively, when referenced with an AES design with LUT-based S-box, apart from being resilient to CPA attack with 1 million plaintexts. A compromise in throughput is incurred owing to the usage of excessive clocks, however satisfying the moderate-speed IoT applications.
dc.identifier.otherROLL NO.166102102
dc.identifier.urihttps://gyan.iitg.ac.in/handle/123456789/2991
dc.language.isoen
dc.relation.ispartofseriesTH-3465
dc.titleDesign and analysis of countermeasures for securing IoT edge devices against power analysis attacks
dc.typeThesis

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
TH-3465_166102102.pdf
Size:
16.6 MB
Format:
Adobe Portable Document Format
Description:
ABSTRACT
Loading...
Thumbnail Image
Name:
Abstract-TH-3465_166102102.pdf
Size:
114.71 KB
Format:
Adobe Portable Document Format
Description:
THESIS

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: