Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications
Wireless sensor networks (WSN) have deeply influenced the working and living styles of human beings. Information security and privacy for WSN is particularly crucial. Cryptographic algorithms are extensively exploited in WSN applications to ensure the security. They are usually implemented in specif...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-10-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/19/20/4598 |
_version_ | 1811301263101394944 |
---|---|
author | WeiZheng Wang Zhuo Deng Jin Wang Arun Kumar Sangaiah Shuo Cai Zafer Almakhadmeh Amr Tolba |
author_facet | WeiZheng Wang Zhuo Deng Jin Wang Arun Kumar Sangaiah Shuo Cai Zafer Almakhadmeh Amr Tolba |
author_sort | WeiZheng Wang |
collection | DOAJ |
description | Wireless sensor networks (WSN) have deeply influenced the working and living styles of human beings. Information security and privacy for WSN is particularly crucial. Cryptographic algorithms are extensively exploited in WSN applications to ensure the security. They are usually implemented in specific chips to achieve high data throughout with less computational resources. Cryptographic hardware should be rigidly tested to guarantee the correctness of encryption operation. Scan design improves significantly the test quality of chips and thus is widely used in semiconductor industry. Nevertheless, scan design provides a backdoor for attackers to deduce the cipher key of a cryptographic core. To protect the security of the cryptographic system we first present a secure scan architecture, in which an automatic test control circuitry is inserted to isolate the cipher key in test mode and clear the sensitive information at mode switching. Then, the weaknesses of this architecture are analyzed and an enhanced scheme using concept of test authorization is proposed. If the correct authorization key is applied within the specific time, the normal test can be performed. Otherwise, only secure scan test can be performed. The enhanced scan scheme ensures the security of cryptographic chips while remaining the advantages of scan design. |
first_indexed | 2024-04-13T07:05:39Z |
format | Article |
id | doaj.art-95846124ee324cf3b00233411000af52 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-13T07:05:39Z |
publishDate | 2019-10-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-95846124ee324cf3b00233411000af522022-12-22T02:57:00ZengMDPI AGSensors1424-82202019-10-011920459810.3390/s19204598s19204598Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network ApplicationsWeiZheng Wang0Zhuo Deng1Jin Wang2Arun Kumar Sangaiah3Shuo Cai4Zafer Almakhadmeh5Amr Tolba6College of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410114, ChinaCollege of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410114, ChinaCollege of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410114, ChinaSchool of Computing Science and Engineering, Vellore Institute of Technology (VIT), Vellore 632014, Tamil Nadu, IndiaCollege of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410114, ChinaComputer Science Department, Community College, King Saud University, Riyadh 11437, Saudi ArabiaComputer Science Department, Community College, King Saud University, Riyadh 11437, Saudi ArabiaWireless sensor networks (WSN) have deeply influenced the working and living styles of human beings. Information security and privacy for WSN is particularly crucial. Cryptographic algorithms are extensively exploited in WSN applications to ensure the security. They are usually implemented in specific chips to achieve high data throughout with less computational resources. Cryptographic hardware should be rigidly tested to guarantee the correctness of encryption operation. Scan design improves significantly the test quality of chips and thus is widely used in semiconductor industry. Nevertheless, scan design provides a backdoor for attackers to deduce the cipher key of a cryptographic core. To protect the security of the cryptographic system we first present a secure scan architecture, in which an automatic test control circuitry is inserted to isolate the cipher key in test mode and clear the sensitive information at mode switching. Then, the weaknesses of this architecture are analyzed and an enhanced scheme using concept of test authorization is proposed. If the correct authorization key is applied within the specific time, the normal test can be performed. Otherwise, only secure scan test can be performed. The enhanced scan scheme ensures the security of cryptographic chips while remaining the advantages of scan design.https://www.mdpi.com/1424-8220/19/20/4598cryptographywireless sensor networkshardware securityscan-based attack |
spellingShingle | WeiZheng Wang Zhuo Deng Jin Wang Arun Kumar Sangaiah Shuo Cai Zafer Almakhadmeh Amr Tolba Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications Sensors cryptography wireless sensor networks hardware security scan-based attack |
title | Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications |
title_full | Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications |
title_fullStr | Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications |
title_full_unstemmed | Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications |
title_short | Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications |
title_sort | securing cryptographic chips against scan based attacks in wireless sensor network applications |
topic | cryptography wireless sensor networks hardware security scan-based attack |
url | https://www.mdpi.com/1424-8220/19/20/4598 |
work_keys_str_mv | AT weizhengwang securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications AT zhuodeng securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications AT jinwang securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications AT arunkumarsangaiah securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications AT shuocai securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications AT zaferalmakhadmeh securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications AT amrtolba securingcryptographicchipsagainstscanbasedattacksinwirelesssensornetworkapplications |