Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks
Abstract
:1. Introduction
2. Preliminaries
2.1. Advanced Encryption Standard (AES)
2.2. SCAs
2.3. D-H Key Exchange Mechanism
- Private Key Generation: The IoT device and the server independently select their private keys, denoted as and , respectively. These private keys are large random integers chosen securely to ensure robustness against attacks.
- Public Key Calculation: Using the private keys, the respective public keys are computed as follows:
- Shared Key Derivation: Upon receiving the other party’s public key, the IoT device and the server calculate the shared symmetric key as follows:
2.4. Threat Model
- Attacker Capabilities: The attacker is assumed to have access to non-invasive tools capable of capturing physical leakages, such as electromagnetic emissions or power consumption traces, generated during the AES encryption process. The primary attack technique considered is Correlation Power Analysis (CPA), which statistically correlates these traces with hypothetical encryption keys to deduce the correct key.
- Attacker Limitations: The attacker is restricted to non-invasive methods and cannot physically tamper with the microcontroller or IoT device. Additionally, the attacker has no access to the device’s internal state and relies solely on external observations of emitted signals. The attack is further constrained by real-time requirements, limiting the feasibility of collecting an excessive number of traces in practical operational environments.
- Assumptions: The initial key exchange between the IoT device and the server is conducted securely, ensuring the integrity of the shared key.
2.5. Common Wireless Communication Protocols in the IoT
2.6. Glossary of Acronyms
3. Related Work
3.1. Hardware-Based Countermeasures
- Masking: Introduces random noise to intermediate computations, breaking the statistical dependency between leaked signals and secret keys, as demonstrated by Mangard et al. [27].
- Hiding: Utilizes techniques such as dynamic voltage and frequency scaling (DVFS) to reduce the signal-to-noise ratio of the leakage, effectively obscuring attack vectors [18].
3.2. Software-Based Countermeasures
- Dynamic Key Replacement: Mechanisms such as those proposed by Vuppala et al. [14] use MTD to periodically update cryptographic keys, reducing the risk of key reuse and subsequent SCAs.
- Lightweight Cryptographic Algorithms: Algorithms like PRESENT and SPECK are designed to minimize computational overhead, making them suitable for IoT applications [29]. However, their security against advanced SCAs, such as template attacks, remains a topic of ongoing research.
3.3. Comparison with Prior Research
4. Research Methodology
4.1. Experimental Framework
4.2. Client-Side Setup
4.3. Server-Side Setup
4.4. Dynamic AES Key Replacement Mechanism
- Initial Key Configuration and Key Replacement
- ▪
- Step 1: initialize the salt with .
- ▪
- Step 2: iterate over the 16 bytes of in four 4-byte blocks.
- ▪
- Step 3: for each byte, apply a bitwise XOR with the least significant 8 bits of the salt.
- ▪
- Step 4: right-shift the salt by 4 bits after processing each byte.
- ▪
- Step 5: update the corresponding byte in to produce .
- Dynamic Key Replacement Process
- D-H Key Exchange Implementation
5. Experimental Results
5.1. Experimental Setup
5.2. Verification of AES Encryption and Decryption
5.3. Time Efficiency Analysis of Dynamic Key Replacement
5.4. SCA Results with Different Key Replacement Frequencies
- Figure 12a: without any protection.
- Figure 12b: when the key was replaced every 50 encryption operations, the attacker was able to successfully retrieve 12 subkeys.
- Figure 12c: at a replacement interval of 30 encryption operations, only eight subkeys were compromised.
- Figure 12d: reducing the key replacement interval to 10 encryption operations resulted in only two compromised subkeys.
- Figure 12e: Replacing the key after every single encryption cycle limited the attacker’s success to just two subkeys.
5.5. Scalability of the Proposed Mechanism in IoT Environments
5.6. Security Analysis
5.6.1. Cryptographic Strength of Parameters
5.6.2. Confidentiality
5.6.3. Authentication
5.6.4. Integrity
5.6.5. Resistance to Known Attacks
- MITM attacks: Without an explicit authentication mechanism, the protocol may be vulnerable to MITM attacks. To mitigate this risk, enhancements such as pre-shared keys or certificate-based validation can be incorporated, ensuring that attackers cannot intercept or alter public keys during transmission. These measures strengthen the protocol’s ability to verify the authenticity of communicating parties.
- Replay attacks: Incorporating time-sensitive parameters or nonces into the key exchange process effectively prevents replay attacks, where attackers attempt to reuse old keys to impersonate legitimate parties. These additions enhance the protocol’s robustness in real-world deployments by ensuring that each key exchange session remains unique and resistant to duplication.
- SCAs: While the protocol’s mathematical foundation ensures robust cryptographic security, its implementation on resource-constrained IoT devices may leave it vulnerable to SCAs, such as power analysis or electromagnetic leakage. To address this, the proposed dynamic key replacement mechanism mitigates the risk of SCAs by dynamically updating encryption keys after each cryptographic operation. This process ensures that even if partial information is leaked through physical signals, it becomes obsolete before it can be exploited. As a result, the mechanism significantly enhances the protocol’s resilience against SCAs, providing stronger protection for IoT devices in practical deployments.
5.6.6. Scalability and Real-World Deployment
5.6.7. Comparative Analysis
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Global Cellular IoT Connections Surpassed 4 Billion in 2024, Driven by 5G and LTE Cat 1 Bis. Available online: https://iot-analytics.com/global-cellular-iot-connections/ (accessed on 27 December 2024).
- Moini, S.; Tian, S.; Holcomb, D.; Szefer, J.; Tessier, R. Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs. IEEE J. Emerg. Sel. Top. Circuits Syst. 2021, 11, 357–370. [Google Scholar] [CrossRef]
- Yilmaz, B.B.; Prvulovic, M.; ZajićA, A. Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor. IEEE Trans. Inf. Forensics Secur. 2019, 15, 776–789. [Google Scholar] [CrossRef]
- Aljuffri, A.; Zwalua, M.; Reinbrecht, C.R.W.; Hamdioui, S.; Taouil, M. Applying Thermal Side-Channel Attacks on Asymmetric Cryptography. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2021, 29, 1930–1942. [Google Scholar] [CrossRef]
- Schaumont, P.; Tiri, K. Masking and Dual-Rail Logic Don’t Add Up. In Proceedings of the Cryptographic Hardware and Embedded Systems (CHES 2007), Vienna, Austria, 10–13 September 2007. [Google Scholar]
- Schramm, K.; Paar, C. Higher Order Masking of the AES. In Proceedings of the Topics in Cryptology-CT-RSA 2006, San José, CA, USA, 13–17 February 2006. [Google Scholar]
- Baseri, Y.; Chouhan, V.; Ghorbani, A. Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure. arXiv 2024, arXiv:2404.10659. [Google Scholar]
- Chng, S.; Lu, H.Y.; Kumar, A.; Yau, D. Hacker types, motivations and strategies: A comprehensive framework. Comput. Hum. Behav. Rep. 2022, 5, 100167. [Google Scholar] [CrossRef]
- Munoz, P.S.; Tran, N.; Craig, B.; Dezfouli, B.; Liu, Y. Analyzing the Resource Utilization of AES Encryption on IoT Devices. In Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2018), Honolulu, HI, USA, 12–15 November 2018. [Google Scholar]
- Fatima, S.; Rehman, T.; Fatima, M.; Khan, S.; Ali, M.A. Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing, In Proceedings of the 7th International Electrical Engineering Conference (IEEC 2022). Karachi, Pakistan, 25–26 March 2022. [Google Scholar]
- Devi, M.; Majumder, A. Side-Channel Attack in Internet of Things: A Survey, In Applications of Internet of Things; Springer: Singapore, 2021; pp. 213–222. [Google Scholar]
- Xing, Z.; Zhao, B.; Xu, B.; Ren, G.; Liu, Z. Enhanced Message Authentication Encryption Scheme Based on Physical-Layer Key Generation in Resource-Limited Internet of Things. KSII Trans. Internet Inf. Syst. (TIIS) 2024, 18, 2546–2563. [Google Scholar]
- Rawat, J.; Kumar, I.; Mohd, N.; Rana, K.K.S.; Pathak, N.; Gupta, R.K. IoT-Based Home Automation System Using ESP8266. In Proceedings of the International Conference on Innovative Computing and Communications (ICICC 2023), New Delhi, India, 17–18 February 2023. [Google Scholar]
- Vuppala, S.; Mady, A.E.; Kuenzi, A. Moving Target Defense Mechanism for Side-Channel Attacks. IEEE Syst. J. 2020, 14, 1810–1819. [Google Scholar] [CrossRef]
- Daemen, J.; Rijmen, V. The Design of Rijndael, 2nd ed.; Springer: Singapore, 2020. [Google Scholar]
- Kuo, C.W.; Tsai, K.Y.; Weng, W.M.; Lin, C.C.; Hong, Y.Y.; Wang, G.L. Implementation and Analysis of Side-Channel Attack Mitigation Based on Autoencoder. Commun. CCISA 2023, 29, 1–18. [Google Scholar]
- Lightweight Cryptography Standardization Process: NIST Selects Ascon. Available online: https://csrc.nist.gov/News/2023/lightweight-cryptography-nist-selects-ascon (accessed on 23 July 2023).
- Kocher, P.; Jaffe, J.; Jun, B. Differential Power Analysis. In Proceedings of the Advances in Cryptology—CRYPTO’ 99, Santa Barbara, CA, USA, 15–19 August 1999. [Google Scholar]
- Brier, E.; Clavier, C.; Olivier, F. Correlation Power Analysis with a Leakage Model. In Proceedings of the Cryptographic Hardware and Embedded Systems—CHES 2004, Cambridge, MA, USA, 11–13 August 2004. [Google Scholar]
- Messerges, T.S. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Proceedings of the Cryptographic Hardware and Embedded Systems—CHES 2000, Worcester, MA, USA, 17–18 August 2000. [Google Scholar]
- Zhang, Q.; Wang, A.; Niu, Y.; Shang, N.; Xu, R.; Zhang, G.; Zhu, L. Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9. Secur. Commun. Netw. 2018, 2018, 1–14. [Google Scholar] [CrossRef]
- Diffie, W.; Hellman, M.E. New Directions in Cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef]
- Santoso, F.K.; Vun, N.C.H. Securing IoT for smart home system. In Proceedings of the International Symposium on Consumer Electronics (ISCE 2015), Madrid, Spain, 24–26 June 2015. [Google Scholar]
- Collotta, M.; Pau, G. A Novel Energy Management Approach for Smart Homes Using Bluetooth Low Energy. IEEE J. Sel. Areas Commun. 2015, 33, 2988–2996. [Google Scholar] [CrossRef]
- Zualkernan, I.A.; Al-Ali, A.R.; Jabbar, M.A.; Zabalawi, I.; Wasfy, A. InfoPods: Zigbee-Based Remote Information Monitoring Devices for Smart-Homes. IEEE Trans. Consum. Electron. 2009, 55, 1221–1226. [Google Scholar] [CrossRef]
- Tsai, K.-L.; Leu, F.-Y.; You, I.; Chang, S.-W.; Hu, S.-J.; Park, H. Low-Power AES Data Encryption Architecture for a LoRaWAN. IEEE Access 2019, 7, 146348–146357. [Google Scholar] [CrossRef]
- Mangard, S.; Oswald, E.; Popp, T. Power Analysis Attacks, 1st ed.; Springer: New York, NY, USA, 2007. [Google Scholar]
- Nagata, M.; Miki, T.; Miura, N. Physical attack protection techniques for IC chip level hardware security. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2022, 30, 5–14. [Google Scholar] [CrossRef]
- Bogdanov, A.; Knudsen, L.R.; Leander, G.; Paar, C.; Poschmann, A.; Robshaw, M.J.B.; Seurin, Y.; Vikkelsoe, C. PRESENT: An ultra-lightweight block cipher. In Proceedings of the Cryptographic Hardware and Embedded Systems—CHES 2007: 9th International Workshop, Vienna, Austria, 10–13 September 2007. [Google Scholar]
- Tsai, K.L.; Huang, Y.L.; Leu, F.Y.; You, I.; Huang, Y.L.; Tsai, C.H. AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access 2018, 6, 45325–45334. [Google Scholar] [CrossRef]
- Kuo, C.W.; Lin, C.C.; Hong, Y.Y.; Liu, J.R.; Yeh, C.H.; Tsai, K.Y. Research and Analysis of the Effects of Different Shielding Materials on Resisting Side-Channel Attacks on IoT Device Microcontroller. In Proceedings of the 8th International Conference on Cryptography, Security and Privacy (CSP 2024), Osaka, Japan, 20–22 April 2024. [Google Scholar]
- Peng, S.Y.; Hong, W.C.; Li, J.T.; Huang, S.J. Framework for efficient SCA resistance verification of IoT devices. In Proceedings of the IEEE International Conference on Applied System Invention (ICASI 2018), Chiba, Japan, 13–17 April 2018. [Google Scholar]
- Wu, L.; Perin, G.; Picek, S. The best of two worlds: Deep learning-assisted template attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022, 3, 413–437. [Google Scholar] [CrossRef]
Protocol | Frequency (GHz) | Data Transmission Speed (Max) | Communication Distance | Power Consumption | Advantages |
---|---|---|---|---|---|
Wi-Fi | 2.4/5 | 1 Gbps | 50–100 m | High | High-frequency bandwidth, high speed, supported by extensive infrastructure |
Bluetooth | 2.4 | 3 Mbps | 10–100 m | Low | Low power consumption, suitable for small devices with long-term operation |
Zigbee | 2.4 | 250 kbps | 10–100 m | Low | Low power consumption, supports multi-node mesh networks |
LoRa | Sub-GHz | 50 kbps | 2–15 km | Ultra-low | Long-range coverage, ultra-low power consumption |
Acronym | Full Form |
---|---|
5G | Fifth-Generation Mobile Network |
AES | Advanced Encryption Standard |
CPA | Correlation Power Analysis |
D-H | Diffie–Hellman |
IoT | Internet of Things |
MAC | Message Authentication Code |
MITM | Man-in-the-Middle |
MTD | Moving Target Defense |
RSA | Rivest–Shamir–Adleman Encryption |
SCA | Side-Channel Attack |
Wi-Fi | Wireless Fidelity |
Ref. | Method | Key Feature | Overhead | SCA Resistance |
---|---|---|---|---|
[3] | Backside Buried Metal | Real-time attack detection | High (fabrication cost) | Strong for EM and fault attacks |
[4] | Dynamic Key Replacement | Periodic key updates using MTD | Moderate | Limited by update frequency |
[27] | Masking | Adds random noise to computations | High (hardware mods) | Strong for power analysis |
[30] | Key Simplification + D-Box Updates | Reduced encryption cycles and dynamic key updates | Low | Resilient to replay attacks |
IoT Device (A) | Public Information | Server (B) |
---|---|---|
Private Key Selection | Private Key Selection | |
a = 777 | ||
Public Key Calculation | Public Key Calculation | |
Public Key Exchange | Public Key Exchange | |
Shared Secret Calculation | Shared Secret Calculation | |
D-H Key Exchange Frequency | Every 1 Message | Every 10 Messages | Every 30 Messages | Every 50 Messages |
---|---|---|---|---|
Total time for transmitting 3000 encrypted messages (ms) | 150,995 | 69,011 | 45,415 | 36,969 |
Average time per message (ms) | 50 | 23 | 15 | 12 |
Key Replacement Frequency | Without Key Replacement | 1 | 10 | 30 | 50 |
---|---|---|---|---|---|
Number of traces required | 55 | >20,000 | >20,000 | >20,000 | >20,000 |
Number of subkeys compromised | 16 | 2 | 2 | 8 | 12 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kuo, C.-W.; Wei, W.; Lin, C.-C.; Hong, Y.-Y.; Liu, J.-R.; Tsai, K.-Y. Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks. Future Internet 2025, 17, 43. https://doi.org/10.3390/fi17010043
Kuo C-W, Wei W, Lin C-C, Hong Y-Y, Liu J-R, Tsai K-Y. Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks. Future Internet. 2025; 17(1):43. https://doi.org/10.3390/fi17010043
Chicago/Turabian StyleKuo, Chung-Wei, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu, and Kuo-Yu Tsai. 2025. "Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks" Future Internet 17, no. 1: 43. https://doi.org/10.3390/fi17010043
APA StyleKuo, C.-W., Wei, W., Lin, C.-C., Hong, Y.-Y., Liu, J.-R., & Tsai, K.-Y. (2025). Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks. Future Internet, 17(1), 43. https://doi.org/10.3390/fi17010043