TY - JOUR
T1 - Attacking the Edge-of-Things
T2 - A Physical Attack Perspective
AU - Gai, Keke
AU - Ding, Yaoling
AU - Wang, An
AU - Zhu, Liehuang
AU - Choo, Kim Kwang Raymond
AU - Zhang, Qi
AU - Wang, Zhuping
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2022/4/1
Y1 - 2022/4/1
N2 - The concepts between Internet of Things (IoT) and edge computing are increasingly intertwined, as an edge-computing architecture generally comprises a (large) number of diverse IoT devices. This, however, increases the potential attack vectors since any one of these connected IoT devices can be targeted to facilitate other malicious cyber activities. Physical attacks are generally harder to mitigate and less studied, in comparison to their cyber counterparts. Thus, in this article we present an attack framework targeting true random number generators (TRNGs), which are a key component in cryptosystems for edge devices. We then demonstrate how such a framework can guide our investigation of a commercial ASIC chip that runs ring-oscillator-based TRNG. Specifically, we show that our template power attack, low voltage fault attack, and voltage glitch fault attack do not require prior knowledge of the TRNG implementation.
AB - The concepts between Internet of Things (IoT) and edge computing are increasingly intertwined, as an edge-computing architecture generally comprises a (large) number of diverse IoT devices. This, however, increases the potential attack vectors since any one of these connected IoT devices can be targeted to facilitate other malicious cyber activities. Physical attacks are generally harder to mitigate and less studied, in comparison to their cyber counterparts. Thus, in this article we present an attack framework targeting true random number generators (TRNGs), which are a key component in cryptosystems for edge devices. We then demonstrate how such a framework can guide our investigation of a commercial ASIC chip that runs ring-oscillator-based TRNG. Specifically, we show that our template power attack, low voltage fault attack, and voltage glitch fault attack do not require prior knowledge of the TRNG implementation.
KW - Edge computing
KW - Fault analysis
KW - Internet of Things (IoT)
KW - Physical attacks
KW - Power analysis
KW - True random number generators (TRNGs)
UR - http://www.scopus.com/inward/record.url?scp=85114752891&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2021.3109917
DO - 10.1109/JIOT.2021.3109917
M3 - Article
AN - SCOPUS:85114752891
SN - 2327-4662
VL - 9
SP - 5240
EP - 5253
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 7
ER -