@Article{cmc.2022.023516,
AUTHOR = {Nadia Mustaqim Ansari, Rashid Hussain, Sheeraz Arif, Syed Sajjad Hussain},
TITLE = {Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks},
JOURNAL = {Computers, Materials \& Continua},
VOLUME = {72},
YEAR = {2022},
NUMBER = {1},
PAGES = {1861--1875},
URL = {http://www.techscience.com/cmc/v72n1/46857},
ISSN = {1546-2226},
ABSTRACT = {The security of Internet of Things (IoT) is a challenging task for researchers due to plethora of IoT networks. Side Channel Attacks (SCA) are one of the major concerns. The prime objective of SCA is to acquire the information by observing the power consumption, electromagnetic (EM) field, timing analysis, and acoustics of the device. Later, the attackers perform statistical functions to recover the key. Advanced Encryption Standard (AES) algorithm has proved to be a good security solution for constrained IoT devices. This paper implements a simulation model which is used to modify the AES algorithm using logical masking properties. This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES. This model is used against SCA and particularly Power Analysis Attacks (PAAs). Simulation model is designed on MATLAB simulator. Results will give better solution by hiding power profiles of the IoT devices against PAAs. In future, the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic (WDDL) will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array (FPGA).},
DOI = {10.32604/cmc.2022.023516}
}