lunduniversity.lu.se

Electrical and Information Technology

Faculty of Engineering, LTH

Denna sida på svenska This page in English

Kalendarium

Lic. Thesis Seminar: On Lightweight Security for Constrained Environments (Jonathan Sönnerup)

Seminarium

From: 2020-06-10 13:15
Place: Online + E:1406, E-building, Ole Römers väg 3, LTH, Lund University
Contact: martin [dot] hell [at] eit [dot] lth [dot] se
Save event to your calendar


Topic: On Lightweight Security for Constrained Environments

Presenter: Jonathan SönnerupNetworks and SecurityDepartment of Electrical and Information Technology at Lund University

When; 10 june at 13.15

Online location: https://lu-se.zoom.us/j/64369594441

Physical location: E:1406, E-building, Ole Römers väg 3, LTH, Lund University

Reviewer:  Dr. Håkan Englund, Ericsson

Abstract: The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight IoT devices are used in several sectors, such as smart cities, smart homes, healthcare, and the manufacturing industry. IoT solutions help increase productivity by predictive maintenance and resource management in the industry. Devices with voice interfaces are spreading rapidly in the home automation markets. Hospitals utilize these ``smart'' devices to monitor patients and present diagnostics data, aiding physicians in their work.

It is safe to say that we will be surrounded with more and more connected devices. This opens up to potential attacks, where adversaries may try to disrupt critical services or steal sensitive information. To combat this, data needs to be secured in different ways. This dissertation presents cryptographic algorithms and their performance in lightweight constrained devices.

First, a new lightweight cryptographic algorithm, Grain-128AEAD, is presented. Grain-128AEAD is a stream cipher designed to be implemented in hardware at a low cost while still being fast. The new design improves on earlier versions by making previous attacks more difficult.

Next, Grain-128AEAD is implemented in hardware using multiple optimization techniques to fit different criteria. Trade-offs between throughput, power, and area are evaluated to analyze the suitability for both constrained devices but also for server back-ends.

Finally, the overhead when adding confidentiality and authenticity for communication in an IoT device is evaluated. Here, modern lightweight protocols are utilized in multiple use-cases to give an overview of the overhead in terms of bytes, time, and energy.