Email: info@ijps.in | Mob: +91-9555269393

Submit Manuscript

Abstract

Lightweight Cryptographic Models for IoT Devices: A Deep Learning Approach to Power Side-Channel Attack Prevention

Luheb K Qurban

College of Education for Pure Science, Ibn Al-Haitham, University of Baghdad, Baghdad, 00964, Iraq.

49 - 61
Vol.19, Issue 1, Jan-Jun, 2025
Receiving Date: 2025-01-19
Acceptance Date: 2025-03-05
Publication Date: 2025-03-08
Download PDF

http://doi.org/10.37648/ijps.v19i01.005

Abstract

The implementation of lightweight cryptography is often found in unrolled architecture, which offers the advantages of low latency and high real-time performance but also runs the risk of Side-Channel Attack (SCA). These days, the Internet of Things has led to a variety of applications that need lightweight cryptographic primitives, including block cyphers, for safe and effective computation with little resources. The expense of developing machine learning (ML) models makes them potentially trade secrets. They must thus be shielded against harmful types of reverse engineering (such as in IP piracy). As machine learning continues to move to edge devices, partly for performance reasons and partly for privacy reasons, the models are now vulnerable to what are known as physical side-channel assaults. Earlier studies have shown that power-based side-channel assaults may recover such control flow in highly restricted contexts, but they depended on significant changes in computational stages or data dependencies to differentiate between states in a state machine. Using Field Programming Gate Arrays (FPGAs), we investigated possible security vulnerabilities involving side-channel assaults (SCAs) based on power analysis. We have significantly improved our study report in three ways. The power analysis or power profile of FPGA, which depends on the leakage of voltage fluctuations during certain encryption activities, was covered first. A physical source, such as an oscilloscope, or a remote source, such as delay line sensors, are used to detect the fluctuations in voltage of the cryptography module. Second, we spoke about possible power analysis-based SCAs that extracted the secret key using these voltage fluctuation readings. Third, we have created a framework for successful assaults and secret key predictions that is based on machine learning (ML) and deep learning (DL) algorithms. First off, using only 570 attack power traces, our proprietary convolutional neural networks (CNN) model successfully executed an attack and exposed all 16 bytes of the secret key. Second, the same architecture has been used to effectively attack the multi-layer perceptron (MLP) model using only 3200 traces. In terms of training time, prediction time, attack time, and the amount of power traces needed for a successful attack, we have improved overall.


Keywords: Side-Channel Attack (SCA); Multi-Layer Perceptron (MLP) Model; Field Programmable Gate Arrays (FPGAs); Machine Learning (ML)


References
  1. Sagu, A.; Gill, N.S.; Gulia, P.; Singh, P.K.; Hong, W.C. Design of Metaheuristic Optimization Algorithms for Deep Learning Model for Secure IoT Environment. Sustainability 2023, 15, 2204.
  2. Eskandari, M.; Janjua, Z.H.; Vecchio, M.; Antonelli, F. Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices. IEEE Internet Things J. 2020, 7, 6882–6897.
  3. Almiani, M.; AbuGhazleh, A.; Al-Rahayfeh, A.; Atiewi, S.; Razaque, A. Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 2020, 101, 102031, Modeling and Simulation of Fog Computing.
  4. Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 8–10 July 2009; pp. 1–6.
  5. Saba, T.; Rehman, A.; Sadad, T.; Kolivand, H.; Bahaj, S.A. Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 2022, 99, 107810.
  6. Ngo, D.M.; Lightbody, D.; Temko, A.; Pham-Quoc, C.; Tran, N.T.; Murphy, C.C.; Popovici, E. HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security. Future Internet 2023, 15, 9.
  7. Dhananjay, K.; Salman, E. Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher. Electronics 2021, 10, 1438.
  8. Morales Romero, J.d.J.; Reyes Barranca, M.A.; Tinoco Varela, D.; Flores Nava, L.M.; Espinosa Garcia, E.R. SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA. Micromachines 2022, 13, 1872.
  9. Mangard, S.; Oswald, E.; Popp, T. Power Analysis Attacks: Revealing the Secrets of Smart Cards; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2008; Volume 31.
  10. Zhou, F.; Zhang, B.; Wu, N.; Bu, X. The design of compact SM4 encryption and decryption circuits that are resistant to bypass attack. Electronics 2020, 9, 1102.
  11. ]Bhasin, S.; Guilley, S.; Sauvage, L.; Danger, J.L. Unrolling cryptographic circuits: A simple countermeasure against side-channel attacks. In Proceedings of the Cryptographers’ Track at the RSA Conference, San Francisco, CA, USA, 1–5 March 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 195–207.
  12. Pub, F. Data encryption standard (des). In FIPS PUB; NIPS: Gaithersburg, MD, USA, 1999; pp. 46–583.
  13. Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 15–19 August 1999; Springer: Berlin/Heidelberg, Germany, 1999; pp. 388–397.
  14. Nalla Anandakumar, N. SCA Resistance Analysis on FPGA Implementations of Sponge Based MACPHOTON. In Proceedings of the International Conference for Information Technology and Communications, Bucharest, Romania, 11–12 June 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 69–86.
  15. Singh, A., Chawla, N., Ko, J. H., Kar, M., & Mukhopadhyay, S. (2018). Energy efficient and side-channel secure cryptographic hardware for IoT-edge nodes. IEEE Internet of Things Journal, 6(1), 421-434.
  16. Illuri, B., & Jose, D. (2021). RETRACTED ARTICLE: Design and implementation of hybrid integration of cognitive learning and chaotic countermeasures for side channel attacks. Journal of Ambient Intelligence and Humanized Computing, 12(5), 5427-5441.
  17. Alabdulwahab, S., Cheong, M., Seo, A., Kim, Y. T., & Son, Y. (2025). Enhancing deep learning-based sidechannel analysis using feature engineering in a fully simulated IoT system. Expert Systems with Applications, 266, 126079.
  18. Ahmed, A. A., Hasan, M. K., Aman, A. H., Safie, N., Islam, S., Ahmed, F. R. A., ... & Rzayeva, L. (2024). Review on hybrid deep learning models for enhancing encryption techniques against side channel attacks. IEEE Access.
  19. Abbas Ahmed, A., Kamrul Hasan, M., Azman Mohd Noah, S., & Hafizah Aman, A. (2024). Design of timedelay convolutional neural networks (TDCNN) model for feature extraction for side-channel attacks. International Journal of Computing and Digital Systems, 16(1), 341-351.
  20. Younus, Y. M., Ibraheem, A. S., & Tuama, M. H. (2024). Improved Machine Learning Techniques for Precise DoS Attack Forecasting in Cloud Security. (Humanities, social and applied sciences) Misan Journal of Academic Studies, 23(52), 122-132.
  21. Fattah, A., Mutashar, H. J., & Usman, O. L. (2024). Design of Deep Learning Techniques for Side-Channel Attacks on Masked 128-bit AES Implementations. AlKadhim Journal for Computer Science, 2(1), 86-96.
  22. Alzuabidi, I. A. (2024). Application of machine learning techniques for countering side-channel attacks in cryptographic systems. Alkadhim J. Comput. Sci, 2(3).
  23. Banu, A. J., Prathiba, A., Shyam Krishna, S., Peddhibhotla, S., & Kanchana Bhaaskaran, V. S. (2024). Profiled Side Channel Power Attack on Charge Balancing Symmetric Pre‐Resolve Adiabatic Logic PRESENT S‐Box Using Convolutional Neural Networks. Smart Grids as Cyber Physical Systems: Smart Grids Paving the Way to Smart Cities, 2, 245-275.
  24. Ahmed, S., Ahmad, N., Shah, N. A., Abro, G. E. M., Wijayanto, A., Hirsi, A., & Altaf, A. R. (2025). Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC with DFA Countermeasure Strategies. IEEE Access.
  25. G. Zaid, L. Bossuet, A. Habrard, and A. Venelli, “Methodology for efficient cnn architectures in profiling attacks,” IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020, no. 1, pp. 1–36, 2020.
  26. M. Jin, M. Zheng, H. Hu, and N. Yu, “An enhanced convolutional neural network in side-channel attacks and its visualization,” arXiv preprint arXiv:2009.08898, 2020.
  27. T. Kubota, K. Yoshida, M. Shiozaki, and T. Fujino, “Deep learning side-channel attack against hardware implementations of aes,” Microprocessors and Microsystems, vol. 87, p. 103383, 2021.
  28. J. Kim, S. Picek, A. Heuser, S. Bhasin, and A. Hanjalic, “Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis,” IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 148–179, 2019.
  29. A. Al Arafat, Z. Guo, and A. Awad, ‘‘Vr-spy: A side-channel attack on virtual key-logging in vr headsets,’’ in Proc. IEEE Virtual Reality 3D User Interfaces, Mar. 2021, pp. 564–572,
  30. B. Colombier, V.-F. Dragoi, P.-L. Cayrel, and V. Grosso, ‘‘Messagerecovery profiled side-channel attack on the classic McEliece cryptosystem,’’ IACR Cryptol. ePrint Arch., vol. 1, pp. 1–24, Nov. 2022.
  31. D. Das, J. Danial, A. Golder, S. Ghosh, A. R. Wdhury, and S. Sen, ‘‘Deep learning side-channel attack resilient AES-256 using current domain signature attenuation in 65nm CMOS,’’ in Proc. IEEE Custom Integr. Circuits Conf. (CICC), Mar. 2020, pp. 1–4.
  32. K. E. Narayana and K. Jayashree, ‘‘Survey on cross virtual machine side channel attack detection and properties of cloud computing as sustainable material,’’ Mater. Today, Proc.,
  33. Ghazal, Taher M., et al., 'Private blockchain-based encryption framework using computational intelligence approach.' Egyptian Informatics Journal 23.4 (2022): 69-75.
  34. D. Kwon, Hong, et. al., 'Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks,' in IEEE Access, vol. 10, pp. 5957-5967, 2022.
  35. Illuri, B., Jose, RETRACTED ARTICLE: Design and implementation of hybrid integration of cognitive learning and chaotic countermeasures for side channel attacks. J Ambient Intell Human Comput 12, 5427– 5441 (2021).
  36. C. Wang, Dani, et. al., 'TripletPower: Deep-Learning Side-Channel Attacks over Few Traces,' 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), San Jose, CA, USA, 2023, pp. 167- 178.
Back