Lic. Thesis Seminar: On Lightweight Security for Constrained Environments (Jonathan Sönnerup)
Place: Online + E:1406, E-building, Ole Römers väg 3, LTH, Lund University
Contact: martin [dot] hell [at] eit [dot] lth [dot] se
Save event to your calendar
Topic: On Lightweight Security for Constrained Environments
Presenter: Jonathan Sönnerup, Networks and Security, Department of Electrical and Information Technology at Lund University
When; 10 june at 13.15
Online location: https://lu-se.zoom.us/j/64369594441
Physical location: E:1406, E-building, Ole Römers väg 3, LTH, Lund University
Reviewer: Dr. Håkan Englund, Ericsson
Abstract: The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight IoT devices are used in several sectors, such as smart cities, smart homes, healthcare, and the manufacturing industry. IoT solutions help increase productivity by predictive maintenance and resource management in the industry. Devices with voice interfaces are spreading rapidly in the home automation markets. Hospitals utilize these ``smart'' devices to monitor patients and present diagnostics data, aiding physicians in their work.
It is safe to say that we will be surrounded with more and more connected devices. This opens up to potential attacks, where adversaries may try to disrupt critical services or steal sensitive information. To combat this, data needs to be secured in different ways. This dissertation presents cryptographic algorithms and their performance in lightweight constrained devices.
First, a new lightweight cryptographic algorithm, Grain-128AEAD, is presented. Grain-128AEAD is a stream cipher designed to be implemented in hardware at a low cost while still being fast. The new design improves on earlier versions by making previous attacks more difficult.
Next, Grain-128AEAD is implemented in hardware using multiple optimization techniques to fit different criteria. Trade-offs between throughput, power, and area are evaluated to analyze the suitability for both constrained devices but also for server back-ends.
Finally, the overhead when adding confidentiality and authenticity for communication in an IoT device is evaluated. Here, modern lightweight protocols are utilized in multiple use-cases to give an overview of the overhead in terms of bytes, time, and energy.