Next Article in Journal
Calibration of C-Logit-Based SUE Route Choice Model Using Mobile Phone Data
Previous Article in Journal
The Human Takeover: A Call for a Venture into an Existential Opportunity
Previous Article in Special Issue
Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model
Open AccessFeature PaperArticle

Hardware Support for Security in the Internet of Things: From Lightweight Countermeasures to Accelerated Homomorphic Encryption

1
Univ. Grenoble Alpes, CNRS, Grenoble INP2, TIMA, 38000 Grenoble, France
2
Institute of Engineering, Univ. Grenoble Alpes, 38000 Grenoble, France
*
Author to whom correspondence should be addressed.
Information 2018, 9(5), 114; https://doi.org/10.3390/info9050114
Received: 29 March 2018 / Revised: 19 April 2018 / Accepted: 20 April 2018 / Published: 8 May 2018
(This article belongs to the Special Issue Security in the Internet of Things)
In the Internet of Things (IoT), many strong constraints have to be considered when designing the connected objects, including low cost and low power, thus limited resources. The confidentiality and integrity of sensitive data must however be ensured even when they have to be processed in the cloud. Security is therefore one of the design constraints but must be achieved without the usual level of resources. In this paper, we address two very different examples showing how embedded hardware/software co-design can help in improving security in the IoT context. The first example targets so-called “hardware attacks” and we show how some simple attacks can be made much more difficult at very low cost. This is demonstrated on a crypto-processor designed for Elliptic Curve Cryptography (ECC). A very lightweight countermeasure is implemented against Simple Power Analysis (SPA), taking advantage of the general processor usually available in the system. The second example shows how confidentiality in the cloud can be guaranteed by homomorphic encryption at a lower computational cost by taking advantage of a hardware accelerator. The proposed accelerator is very easy to implement and can easily be tuned to several encryption schemes and several trade-offs between hardware costs and computation speed. View Full-Text
Keywords: IoT security; integrated circuits; hardware accelerators; crypto-processors; ECC encryption; homomorphic encryption; lightweight; SPA; countermeasure IoT security; integrated circuits; hardware accelerators; crypto-processors; ECC encryption; homomorphic encryption; lightweight; SPA; countermeasure
Show Figures

Figure 1

MDPI and ACS Style

Leveugle, R.; Mkhinini, A.; Maistri, P. Hardware Support for Security in the Internet of Things: From Lightweight Countermeasures to Accelerated Homomorphic Encryption. Information 2018, 9, 114.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop