More secure Internet of Things using robust encryption algorithms against side channel attacks

AT Lo'Ai, TF Somani - 2016 IEEE/ACS 13th international …, 2016 - ieeexplore.ieee.org
… And since we are talking about protecting physical devices connected to the Internet, we
think that … Then, we present the recent timing and fault Side Channel Attacks on cryptosystem …

Practical techniques for securing the Internet of Things (IoT) against side channel attacks

HD Tsague, B Twala - Internet of things and big data analytics toward next …, 2018 - Springer
… a detailed overview of side channel attacks as it pertains to devices used in IoT environments
in developing countries; the focus will be to raise awareness of this type of attacks and how …

Side-channel attacks in the internet of things: threats and challenges

A Zankl, H Seuschek, G Irazoqui… - Research anthology on …, 2021 - igi-global.com
… Such information leaks are generally studied in the area of side-channel attacks, a subset
of which will be addressed in this chapter. In literature, the field of microarchitectural attacks (…

Side-channel attack in Internet of Things: A survey

M Devi, A Majumder - … of Internet of Things: Proceedings of ICCCIOT 2020, 2021 - Springer
… The side-channel attacks are the attacks which are based on side-… IoT attacks taxonomy,
existing attacks of side-channel attack, counter major against different side-channel attacks. The …

Side-channel attacks in the internet of things

A Zankl, H Seuschek, G Irazoqui… - Solutions for Cyber …, 2017 - books.google.com
… Such information leaks are generally studied in the area of side-channel attacks, a subset
of which will be addressed in this chapter. In literature, the field of microarchitectural attacks (…

Power analysis side channel attacks and countermeasures for the internet of things

C Liptak, S Mal-Sarkar… - 2022 IEEE Physical …, 2022 - ieeexplore.ieee.org
… -channel attacks. The power consumption of a device … side channel attacks and evaluating
different types of power analysis attacks; (b) developing taxonomy of side channel attacks in …

A survey of side-channel attacks on caches and countermeasures

Y Lyu, P Mishra - Journal of Hardware and Systems Security, 2018 - Springer
… cache and memory side-channel attacks, mainly focusing on cache attacks. This paper is …
algorithms, which are heavily exploited by side-channel attacks. In Section 4, we introduce the …

A defense mechanism for timing-based side-channel attacks on IoT traffic

N Prates, A Vergütz, RT Macedo… - … 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
… We assume non-invasive timing-based side-channel attacks on network traffic model following
[… Xiao, and MS Pathan, “A method for countering snoopingbased side channel attacks in …

Defending against packet-size side-channel attacks in IoT networks

S Xiong, AD Sarwate… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
… Even with deployment of the anonymity mixes, as the side-channel attacks imply, the … Our
goal is to generalize a packet obfuscation mechanism against packet-size side-channel attacks

A review of internet of things architecture, technologies and analysis smartphone-based attacks against 3D printers

M Bilal - arXiv preprint arXiv:1708.04560, 2017 - arxiv.org
… in the form of side channel attacks against highly intensive 3D … (IP) of side channel attacks
investigate against 3D printer in the … the side channel attacks after reconstructing the objects