论文标题

轻巧的密码学(LWC)框架以确保物联网中的内存堆

A lightweight cryptography (LWC) framework to secure memory heap in Internet of Things

论文作者

Khalifa, Mahmoud, Algarni, Fahad, Khan, Mohammad Ayoub, Ullah, Azmat, Aloufic, Khalid

论文摘要

设备的广泛网络以及从物联网(IoT)产生的大量数据引起了研究人员的注意。 Java是嵌入式应用程序的最常见平台,例如物联网,无线传感器网络(WSN),近场通信(NFC)和射频标识(RFID)。对象编程语言(例如Java,Swift,PHP和C ++)在任何对象运行后都使用垃圾收集,该对象运行会为攻击创建安全漏洞,例如下一个内存地址职业(NMAO),内存重播,学习任务行为(LTB)。当攻击超过对周围连接的设备的目标设备超过目标设备时,安全风险会增加。不适当或错误的操作会导致能源损失和成本增加。在本文中,提出了一种保护物联网系统操作免受内存堆渗透和地址修改攻击的安全方法。提出的方法通过在运行时加密对象垃圾收集来防止攻击。为了形成独特的签名机制,使用特定单向哈希算法的加密哈希函数(CHF)。提出的框架使用基于L功能的ECC和一次性密钥(OTK)来保护内存堆。我们的方法与开放系统一起使用,其中不考虑对操作系统的影响。事实证明,提出的方法是强大而有效的,可以通过更好地检测恶意攻击来帮助在几种物联网应用程序中实现更高水平的安全性。

The extensive networking of devices and the large amount of data generated from the Internet of Things (IoT) has brought security issues to the attention of the researcher. Java is the most common platform for embedded applications such as IoT, Wireless Sensors Networks (WSN), Near Field Communications (NFC) and Radio Frequency Identification (RFID). The object programming languages such as Java, SWIFT, PHP and C++ use garbage collection after any object run which creates security loophole for attacks such as Next Memory Address Occupation (NMAO), memory replay, Learning Tasks Behaviors (LTB). The security risk increases in IoT when attacks exceeds the target device to the surrounding connected devices. Inappropriate or wrong operations causes energy loss and increased costs. In this paper, a security method to protect IoT system operation from memory heap penetration and address modification attack is proposed. The proposed method prevents directed attack by encrypting the object Garbage Collection at run time. To form a unique signature mechanism, the Cryptographic Hash Function (CHF) which employs a specific one-way hash algorithm. The proposed framework uses L-function based ECC and one-time Key (OTK) to secure the memory heap. Our method is used with open system where the effect on the operating system is not considered. The proposed method proved to be powerful and efficient which can help in achieving higher levels of security across several IoT applications, by enabling better detection of malicious attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源