Dynamic encryption key design and management for memory data encryption in embedded systems

Author(s):  
Mei Hong ◽  
Hui Guo ◽  
Sri Parameswaran
2019 ◽  
Vol 8 (3) ◽  
pp. 8422-8427

Moving Target Defence (MTD) became an important research area in the wake of increased cyber security threats. As the attackers are gaining knowledge on existing methods, it is essential to have more dynamic approach that can defeat plans of attackers. As improving systems with higher level of security is a never ending process, MTD has got significance in military and other applications where critical digital infrastructure needs to be protected from adversaries. When attack surface is dynamically evolving with mutation strategy, it can lead to realization of MTD. As MTD increases complexity and uses dynamic encryption mechanism, the attack surface evolves from time to time confusing attacker. Traditional approaches like AES and DES alone will have their limitations. However, when they are used along with the concept of MTD strategies, it is possible to provide highly secure environment. In this paper, we proposed a framework with an underlying algorithm which ensures MTD with dynamically evolving attack surface and dynamic encryption standards based on DES. The experimental results revealed that the proposed scheme is effective and shows improved performance over its predecessor.


2021 ◽  
Author(s):  
Prasath J S

Abstract The technologies in monitoring and control of industrial process have changed due to the rapid growth of emerging technologies especially the most popular Internet of Things (IoT). The Internet is an essential part of day-to-day life and it is used to gather more information. The emerging trend in the field of industrial automation is the integration of embedded systems with wireless technologies which enables monitoring of process information through the internet. As the internet is the open environment, a lot of security issues and vulnerabilities arise to the industrial devices. The usage of internet in process monitoring enables attackers to monitor and change the process data. The unsecured industrial operations lead to failure of process equipment and safety issues to plant operators. The security mechanisms are essential in order to protect the embedded systems and wireless networks from unauthorized access. This proposed heterogeneous security algorithm includes symmetric, asymmetric and hash algorithms which strengthen the level of security. The novelty of the proposed work is it employs 128-bit key size for symmetric encryption, 1024-bit key size for asymmetric encryption along with the use of hash algorithm all together strengthens the security and it is tested in real time using embedded system with IoT. It takes less time for execution of data encryption and decryption. This proposed hybrid security algorithm is implemented and tested in an embedded system with wireless monitoring of process information through the internet. It ensures secure communication and monitoring of process data through the internet. The attacker cannot identify and modify the plant information transmitted across internet. This proposed work can be applied to industries dealing with sensitive process information.


2012 ◽  
Vol 1 (5) ◽  
pp. 115-117
Author(s):  
Jahnavi KRM Jahnavi KRM ◽  
◽  
Raghavendra Rao K ◽  
Padma Suvarna R

2019 ◽  
Vol 139 (7) ◽  
pp. 802-811
Author(s):  
Kenta Fujimoto ◽  
Shingo Oidate ◽  
Yuhei Yabuta ◽  
Atsuyuki Takahashi ◽  
Takuya Yamasaki ◽  
...  

2013 ◽  
Vol 133 (2) ◽  
pp. 111-115 ◽  
Author(s):  
Takashi Anezaki ◽  
Suriyon Tansuriyavong ◽  
Chikatoshi Yamada
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document