Cargando…

Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications

Wireless sensor networks (WSN) have deeply influenced the working and living styles of human beings. Information security and privacy for WSN is particularly crucial. Cryptographic algorithms are extensively exploited in WSN applications to ensure the security. They are usually implemented in specif...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, WeiZheng, Deng, Zhuo, Wang, Jin, Sangaiah, Arun Kumar, Cai, Shuo, Almakhadmeh, Zafer, Tolba, Amr
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6832598/
https://www.ncbi.nlm.nih.gov/pubmed/31652631
http://dx.doi.org/10.3390/s19204598
_version_ 1783466210719956992
author Wang, WeiZheng
Deng, Zhuo
Wang, Jin
Sangaiah, Arun Kumar
Cai, Shuo
Almakhadmeh, Zafer
Tolba, Amr
author_facet Wang, WeiZheng
Deng, Zhuo
Wang, Jin
Sangaiah, Arun Kumar
Cai, Shuo
Almakhadmeh, Zafer
Tolba, Amr
author_sort Wang, WeiZheng
collection PubMed
description Wireless sensor networks (WSN) have deeply influenced the working and living styles of human beings. Information security and privacy for WSN is particularly crucial. Cryptographic algorithms are extensively exploited in WSN applications to ensure the security. They are usually implemented in specific chips to achieve high data throughout with less computational resources. Cryptographic hardware should be rigidly tested to guarantee the correctness of encryption operation. Scan design improves significantly the test quality of chips and thus is widely used in semiconductor industry. Nevertheless, scan design provides a backdoor for attackers to deduce the cipher key of a cryptographic core. To protect the security of the cryptographic system we first present a secure scan architecture, in which an automatic test control circuitry is inserted to isolate the cipher key in test mode and clear the sensitive information at mode switching. Then, the weaknesses of this architecture are analyzed and an enhanced scheme using concept of test authorization is proposed. If the correct authorization key is applied within the specific time, the normal test can be performed. Otherwise, only secure scan test can be performed. The enhanced scan scheme ensures the security of cryptographic chips while remaining the advantages of scan design.
format Online
Article
Text
id pubmed-6832598
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-68325982019-11-25 Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications Wang, WeiZheng Deng, Zhuo Wang, Jin Sangaiah, Arun Kumar Cai, Shuo Almakhadmeh, Zafer Tolba, Amr Sensors (Basel) Article Wireless sensor networks (WSN) have deeply influenced the working and living styles of human beings. Information security and privacy for WSN is particularly crucial. Cryptographic algorithms are extensively exploited in WSN applications to ensure the security. They are usually implemented in specific chips to achieve high data throughout with less computational resources. Cryptographic hardware should be rigidly tested to guarantee the correctness of encryption operation. Scan design improves significantly the test quality of chips and thus is widely used in semiconductor industry. Nevertheless, scan design provides a backdoor for attackers to deduce the cipher key of a cryptographic core. To protect the security of the cryptographic system we first present a secure scan architecture, in which an automatic test control circuitry is inserted to isolate the cipher key in test mode and clear the sensitive information at mode switching. Then, the weaknesses of this architecture are analyzed and an enhanced scheme using concept of test authorization is proposed. If the correct authorization key is applied within the specific time, the normal test can be performed. Otherwise, only secure scan test can be performed. The enhanced scan scheme ensures the security of cryptographic chips while remaining the advantages of scan design. MDPI 2019-10-22 /pmc/articles/PMC6832598/ /pubmed/31652631 http://dx.doi.org/10.3390/s19204598 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wang, WeiZheng
Deng, Zhuo
Wang, Jin
Sangaiah, Arun Kumar
Cai, Shuo
Almakhadmeh, Zafer
Tolba, Amr
Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications
title Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications
title_full Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications
title_fullStr Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications
title_full_unstemmed Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications
title_short Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications
title_sort securing cryptographic chips against scan-based attacks in wireless sensor network applications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6832598/
https://www.ncbi.nlm.nih.gov/pubmed/31652631
http://dx.doi.org/10.3390/s19204598
work_keys_str_mv AT wangweizheng securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications
AT dengzhuo securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications
AT wangjin securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications
AT sangaiaharunkumar securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications
AT caishuo securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications
AT almakhadmehzafer securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications
AT tolbaamr securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications