Management of the security in smart secure devices

نویسندگان

  • B. Robisson
  • M. Agoyan
چکیده

1 Introduction Security is a key component for information technologies and communication. It undoubtedly represents one of the main tools of its rise because it introduces confidence which is necessary for users. Among the security threats, vulnerability of electronic material that implements cryptography (such as smart card), for services of confidentiality, authentication and data integrity, is perhaps the most important. Indeed, some unfaithful means, or 'attacks', on this material make it possible to extract confidential information like encoding keys and thus to lower the security of all the protected transmission chain of information. There are three main kinds of such``physical'' attacks. The first kind, called``side channel attacks'', exploits the fact that some physical values such as the power consumption, the electromagnetic radiation or the duration of computation of the chip depend on its internal computations [KJ99,MP07]. It is of particular concern, since it does not destroy the physical integrity of smart cards and it can be quickly mounted with cheap instrumentation equipments. The second type, called``fault attacks'', consists in modifying the circuit's behavior in order to bypass hardware or software protections or to exploit computational errors [BS97,PQ03]. The faults are injected into the device by various means as laser, glitches on clock [AD10], spikes on voltage supply or electromagnetic perturbations. The third type, called``invasive attacks'' [KK99], consists in analyzing the design of the chip by using destructive means such as abrasion, chemical etching and then probing the most informative signals with, for example, focused ion beam. A lot of protections have been proposed to counter those attacks. The first kind (further called " sensors ") gives information about the state of the system either by measuring the light, the voltage, the frequency or the temperature of the chip or by detecting error during computations. This detection is generally based on spatial redundancy (ie. realizing the same computation several times in parallel) or temporal redundancy (i.e. realizing the same computation several times) [MR10,NR10]. The second kind (further called " actuators ") does not modify the functional behavior of the circuit but only secures it. To reduce sensibility to side channel attacks, noise has been added to the power consumption, for example, by using an internal clock, by randomizing the order of the instructions, by adding dummy operations or by masking the internal computations that can be predicted by the attacker [RP09,CK09]. Another way to reduce sensibility to side channel attacks consists …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Intelligent Energy Management System for Office Buildings Using Traffic Control System

Rapid advances in new sciences and technologies result in high penetration of smart devices and services in daily life. In this regard, smart buildings are one of the prominent examples which have dramatically improved not only the accuracy and efficiency of buildings but also the speed of daily routines. Recently, integration of the cutting-edge technologies has been traversing from residentia...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Smart Grid of Big Data Information Management on Secure Cloud Computing Framework

Smart grid is a modern electrical grid technology that improves the efficiency and reliability. The main challenges of smart grids are how to manage different types of front-end intelligent devices such as smart meters and how to process a huge amount of data received from these devices. Cloud computing, a technology that provides computational resources on demands to address these challenges. ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011