Abstract
The concepts between Internet of Things (IoT) and edge computing are increasingly intertwined, as an edge-computing architecture generally comprises a (large) number of diverse IoT devices. This, however, increases the potential attack vectors since any one of these connected IoT devices can be targeted to facilitate other malicious cyber activities. Physical attacks are generally harder to mitigate and less studied, in comparison to their cyber counterparts. Thus, in this article we present an attack framework targeting true random number generators (TRNGs), which are a key component in cryptosystems for edge devices. We then demonstrate how such a framework can guide our investigation of a commercial ASIC chip that runs ring-oscillator-based TRNG. Specifically, we show that our template power attack, low voltage fault attack, and voltage glitch fault attack do not require prior knowledge of the TRNG implementation.
| Original language | English |
|---|---|
| Pages (from-to) | 5240-5253 |
| Number of pages | 14 |
| Journal | IEEE Internet of Things Journal |
| Volume | 9 |
| Issue number | 7 |
| DOIs | |
| Publication status | Published - 1 Apr 2022 |
Keywords
- Edge computing
- Fault analysis
- Internet of Things (IoT)
- Physical attacks
- Power analysis
- True random number generators (TRNGs)
Fingerprint
Dive into the research topics of 'Attacking the Edge-of-Things: A Physical Attack Perspective'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver