Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Adversarial Attack Protection Scalar Multiplication for WSNs Resistance Machine-Learning Side-channel Attack

Adversarial Attack Protection Scalar Multiplication for WSNs Resistance Machine-Learning... Wireless sensor networks (WSNs) have limited storage and low processing capabilities. However, these devices may be captured by opponents, so the security requirements are particularly strict. With the development of side-channel attacks based on the machine-learning, designing a safe elliptic curve scalar multiplication for computing-limited devices like WSNs has become a major challenge. Based on the adversarial attack technology, a secure scalar multiplication is proposed in this article. The main contributions are: (1) We propose an efficient non-zero form (NZF) encoding algorithm that can be applied to various types of elliptic curves; (2) we have designed a secure scalar multiplication algorithm that can resist against conventional side-channel attacks such as SPA, DA, DPA, RPA, and ZPA; and (3) we propose an adversarial protection mechanism based on blind point technology and NZF coding, which can prevent side-channel attacks based on machine learning. The algorithm has no precomputation and is suitable for low communication frequency, low calculation amount, and high security requirements. Especially, it can be applied to lightweight equipment such as WSN and IoT. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM Transactions on Sensor Networks (TOSN) Association for Computing Machinery

Adversarial Attack Protection Scalar Multiplication for WSNs Resistance Machine-Learning Side-channel Attack

ACM Transactions on Sensor Networks (TOSN) , Volume 18 (3): 13 – Jun 2, 2022

Loading next page...
 
/lp/association-for-computing-machinery/adversarial-attack-protection-scalar-multiplication-for-wsns-oFfb0gCWCR

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 2022 Copyright held by the owner/author(s). Publication rights licensed to ACM.
ISSN
1550-4859
eISSN
1550-4867
DOI
10.1145/3486679
Publisher site
See Article on Publisher Site

Abstract

Wireless sensor networks (WSNs) have limited storage and low processing capabilities. However, these devices may be captured by opponents, so the security requirements are particularly strict. With the development of side-channel attacks based on the machine-learning, designing a safe elliptic curve scalar multiplication for computing-limited devices like WSNs has become a major challenge. Based on the adversarial attack technology, a secure scalar multiplication is proposed in this article. The main contributions are: (1) We propose an efficient non-zero form (NZF) encoding algorithm that can be applied to various types of elliptic curves; (2) we have designed a secure scalar multiplication algorithm that can resist against conventional side-channel attacks such as SPA, DA, DPA, RPA, and ZPA; and (3) we propose an adversarial protection mechanism based on blind point technology and NZF coding, which can prevent side-channel attacks based on machine learning. The algorithm has no precomputation and is suitable for low communication frequency, low calculation amount, and high security requirements. Especially, it can be applied to lightweight equipment such as WSN and IoT.

Journal

ACM Transactions on Sensor Networks (TOSN)Association for Computing Machinery

Published: Jun 2, 2022

Keywords: Scalar multiplication

References