Survey on White-Box Attacks and Solutions

Authors

  • V. Porkodi Assistant Professor, Lebanese French University, Department of Information Technology, Erbil, Iraq
  • M. Sivaram Associate Professor, Lebanese French University, Department of Information Technology, Erbil, Iraq
  • Amin Salih Mohammed Assistant Professor, University of slahaddin, Department of Software Engineering, Erbil, Iraq
  • V. Manikandan Assistant Professor, Lebanese French University, Department of Information Technology, Erbil, Iraq

DOI:

https://doi.org/10.51983/ajcst-2018.7.3.1904

Keywords:

Wearables, Internet of Wearable Things, Personally Identifiable Information, Unauthorized Exposure, Privacy Challenges, Delegation of Use, Attack Surfaces

Abstract

This Research paper provides special white-box attacks and outputs from it. Wearable IoT units perform keep doubtlessly captured, then accessed within an unauthorized behavior due to the fact concerning their bodily nature. That case, they are between white-box attack systems, toughness the opponent may additionally have quantity,visibility about the implementation of the inbuilt crypto system including complete control over its solution platform. The white-box attacks on wearable devices is an assignment without a doubt. To serve as a countermeasure in opposition to these problems in such contexts, here analyzing encryption schemes in imitation of protecting the confidentiality concerning records against white-box attacks. The lightweight encryption, intention in accordance with protecting the confidentiality over data towards white-box attacks is the recently stability good algorithm. In that paper, we read the extraordinary algorithms too.

References

S. Wang, R. Bie, F. Zhao, N. Zhang, X. Cheng, and H.-A. Choi, "Security in Wearable Communications," IEEE Network, vol. 30, no. 5, pp. 38-43, Sep./Oct. 2016.

O. Arias, J. Wurm, K. Hoang, and Y. Jin, "Privacy and Security in Internet of Things and Wearable Devices," IEEE Transactions on MultiScale Computing Systems, 2015.

D. He, S. Chan, and M. Guizani, "User Privacy And Data Trustworthiness in Mobile Crowd Sensing," IEEE Wireless Communication, vol. 22, no. 1, pp. 42-47, February 2015.

A. Ometov, S. Bezzateev, J. Kannisto, J. Harju, and S. Andreev, "Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things," IEEE, pp. 2327-4662, 2016.

Y. Xiao, X. Lai, "A Secure Implementation of White-Box AES," IEEE, 2009.

K.-H. Rhee and D. Nyang, "Protecting White-Box AES with Dual Ciphers," ICISC 2010, LNCS 6829, pp. 278–291, 2011.

Y. Shi, W. Wei, and Z. He, "A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs," Sensors, vol. 15, pp. 11928-11952, 2015.

I. Muslukhov, S. T. Sun, P. Wijesekera, Y. Boshmaf, and K. Beznosov, "Decoupling data-at-rest encryption and smartphone locking with wearable devices," Pervasive and Mobile Computing, vol. 32, no. 10, pp. 26-34, 2016.

Y. Shi, W. Wei, Z. He, and H. Fan, "An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices," Computer Security Applications, Los Angeles, California, pp. 16-29, 2016.

Y. Shi, X. Wang, and H. Fan, "Light-Weight White-Box Encryption Scheme with Random Padding for Wearable Consumer Electronic Devices," IEEE Transactions on Consumer Electronics, vol. 63, no. 1, February 2017.

Downloads

Published

09-10-2018

How to Cite

Porkodi, V., Sivaram, M., Mohammed, A. S., & Manikandan, V. (2018). Survey on White-Box Attacks and Solutions. Asian Journal of Computer Science and Technology, 7(3), 28–32. https://doi.org/10.51983/ajcst-2018.7.3.1904