<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">23516</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2022.023516</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks</article-title>
<alt-title alt-title-type="left-running-head">Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks</alt-title>
<alt-title alt-title-type="right-running-head">Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Ansari</surname><given-names>Nadia Mustaqim</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><email>nadia.ansari@duet.edu.pk</email></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Hussain</surname><given-names>Rashid</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Arif</surname><given-names>Sheeraz</given-names></name><xref ref-type="aff" rid="aff-3">3</xref></contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Hussain</surname><given-names>Syed Sajjad</given-names></name><xref ref-type="aff" rid="aff-4">4</xref></contrib>
<aff id="aff-1"><label>1</label><institution>Department of Electronic Engineering, Dawood University of Engineering &#x0026; Technology</institution>, <addr-line>Karachi</addr-line>, <country>Pakistan</country></aff>
<aff id="aff-2"><label>2</label><institution>Faculty of Engineering Sciences and Technology, Hamdard University</institution>, <addr-line>Karachi</addr-line>, <country>Pakistan</country></aff>
<aff id="aff-3"><label>3</label><institution>Faculty of Information Technology, Salim Habib University</institution>, <addr-line>Karachi</addr-line>, <country>Pakistan</country></aff>
<aff id="aff-4"><label>4</label><institution>Faculty of Computer Sciences, SZABIST</institution>, <addr-line>Karachi</addr-line>, <country>Pakistan</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Nadia Mustaqim Ansari. Email: <email>nadia.ansari@duet.edu.pk</email></corresp>
</author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2022-02-21"><day>21</day>
<month>02</month>
<year>2022</year></pub-date>
<volume>72</volume>
<issue>1</issue>
<fpage>1861</fpage>
<lpage>1875</lpage>
<history>
<date date-type="received"><day>11</day><month>9</month><year>2021</year></date>
<date date-type="accepted"><day>10</day><month>1</month><year>2022</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022 Ansari et al.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Ansari et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_23516.pdf"></self-uri>
<abstract>
<p>The security of Internet of Things (IoT) is a challenging task for researchers due to plethora of IoT networks. Side Channel Attacks (SCA) are one of the major concerns. The prime objective of SCA is to acquire the information by observing the power consumption, electromagnetic (EM) field, timing analysis, and acoustics of the device. Later, the attackers perform statistical functions to recover the key. Advanced Encryption Standard (AES) algorithm has proved to be a good security solution for constrained IoT devices. This paper implements a simulation model which is used to modify the AES algorithm using logical masking properties. This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES. This model is used against SCA and particularly Power Analysis Attacks (PAAs). Simulation model is designed on MATLAB simulator. Results will give better solution by hiding power profiles of the IoT devices against PAAs. In future, the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic (WDDL) will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array (FPGA).</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Side channel attacks</kwd>
<kwd>power analysis attacks</kwd>
<kwd>network security</kwd>
<kwd>masking</kwd>
<kwd>advance encryption standard</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1"><label>1</label><title>Introduction</title>
<p>Internet-of-things (IoT) establishes connections between billions of smart devices, performing a diverse range of purposes. Connected devices will grow to almost 31 billion in the world of IoT [<xref ref-type="bibr" rid="ref-1">1</xref>]. These devices embedded with sensors, software to exchange and collect data with each other. In the early era, IoT was used only by specific people which were related to media and researchers. Day by day, most of the people taking interest in IoT. Some research areas in security of IoT devices are predictions and prevention of security issues, protected applications of the web, attacks of IoT devices, size of devices, performance of devices, power usage of devices, recognition of devices, and confirm availability at high demand. So, in 2008 first international conference was held in Switzerland on the topic of IoT. Twenty-three different countries participated in that conference and gave their input to explore the IoT world [<xref ref-type="bibr" rid="ref-2">2</xref>].</p>
<p>According to a published report in 2013, revenue generation using IoT-based devices, will be more than 300 billion by the end of the 20<sup>th</sup> century. So, when more devices communicate with each other than network complexity and hardware security will increase. By Statista (a statistical website) the number of devices around the world used for IoT network will noticeably increase from 20.35 billion to 75.44 billion from 2017 to 2025. Now researchers are working to explore the security of constrained devices including integrated circuits, microcontrollers, sensors, and wearable gadgets, among other similar hardware. With the exponential increase of its infrastructure, there are plethora security concerns. Hardware attacks are categorized by hardware trojan, side channel analysis, fault attacks, counterfeit chips, and reverse engineering [<xref ref-type="bibr" rid="ref-3">3</xref>].</p>
<p>Side channel analysis is more considerable attack for the researchers. This attack involves analyzing the external outputs of the hardware and retrieving the information. Side channel attacks (SCA) is most powerful attack against encryption, but this attack is hard to implement. Initially, SCA was implemented at the edge node level. At this level, SCA are usually non-invasive and intentionally leaked information is extracted. Untraceable is the important characteristic of non-invasive attack and the result of this property is the addition of noise to the information which is leaked and hard to secure the whole process. SCAs based on processing time or power consumption of the device rather than plaintext or ciphertext messages. This information is observed during the computation of different security protocols. The process of SCA is to recover the information processed in Advanced Encryption Standard (AES) algorithm encrypted enable device by observing the power consumption, electromagnetic (EM) field, timing analysis, and acoustics of the devices as shown in <xref ref-type="fig" rid="fig-1">Fig. 1</xref> [<xref ref-type="bibr" rid="ref-4">4</xref>].</p>
<fig id="fig-1"><label>Figure 1</label><caption><title>Working of side channel analysis</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_23516-fig-1.png"/></fig>
<p>The most effective type of SCAs is power analysis attacks (PAAs) as they are easy to achieve in exercise and at relatively low cost for attackers. PAAs works on power calculation. Every PAA mechanism needs the usage of a particular power model of the IoT device for the forecast of the real power to be consumed by the device, by the observing specific procedure of the algorithm and choosing the output word for the attack because the power consumption of electronic circuits based on the bit word-processed by themselves. The power model is developed considering the logical characteristics of the data word. After that, consumption of actual power and power model are compared by using different variables. IoT devices operate at low power because they have short storage and complicated process; hence the algorithm may fail, and devices become corrupted. All mentioned reasons are very much helpful for PAA [<xref ref-type="bibr" rid="ref-5">5</xref>&#x2013;<xref ref-type="bibr" rid="ref-7">7</xref>].</p>
<p>Simple power analysis (SPA), Differential power analysis (DPA) and Correlation power analysis (CPA) are the main types of PAAs. In SPA, a single display shows the power trace of a cryptographic device and tries to establish the secret key based on the electrical levels over time. In DPA, statistical techniques are used to recognize differences in power traces, thus showing data leakage to guess the secret key. Generally, in CPA to identify the correlation between predicted output and the actual power output of an encrypted device by using the hamming weight power model [<xref ref-type="bibr" rid="ref-8">8</xref>].</p>
<p>Researchers use countermeasures for SCA and categorize them into masking techniques, hiding techniques, and code morphing techniques. Hiding relates to the hardware of the system and masking relates to changes in the algorithm through software [<xref ref-type="bibr" rid="ref-9">9</xref>]. When the function of cryptographic devices is performed then attackers perform DPA and apply statistical function on measured power consumption traces to recover the secret key [<xref ref-type="bibr" rid="ref-10">10</xref>]. The security of IoT devices should achieve a certain level without an increase in area and performance overhead by using reconfigurable voltage regulators [<xref ref-type="bibr" rid="ref-11">11</xref>]. Masking is a countermeasure against SCA, since it enhances the security. It can break the dependence between the power consumption and the intermediate values in the cryptographic algorithm. Following are the different types of masking schemes: Boolean masking, additive masking, multiplicative masking, mixed masking, gate level and algorithmic level masking [<xref ref-type="bibr" rid="ref-12">12</xref>].</p>
<p>In this manner, the National Institute of Science and Technology (NIST) endorsed the AES, in 2001. Higher security levels and low complexity are characteristics of AES. This algorithm has proved to be a good security solution for constrained IoT devices [<xref ref-type="bibr" rid="ref-13">13</xref>]. AES requires large memory size because it has 800 bytes of lookup tables, and if system wants more secure then increase the number of lookup tables as well as increase capacity. AES algorithm ensures stronger cloud-based secure storage. AES-128 offers more secure system, faster encryption speed and gives better throughput compared to another encryption algorithm. But still, improvement will further reduce hardware dependency, provide more security, and minimize overheads on the data [<xref ref-type="bibr" rid="ref-14">14</xref>].</p>
<p>AES is the most powerful symmetrical algorithm against SCA and is designed based on a block cipher. It plays a vital role in securing the network from attackers. It is supported for data privacy [<xref ref-type="bibr" rid="ref-15">15</xref>]. AES has four transformations:</p>
<p>1. Add Round Key 2. Substitution Byte 3. Shift Rows 4. Mix Column</p>
<p>Add a round key based on key extension algorithm. This algorithm runs parallel to the AES rounds and provides the key for each round. It has three functions.</p>
<p>1. Rotation Word 2. Substitution Word 3. Round Constant</p>
<p>One round of AES consists of 2 layers:
<list list-type="order">
<list-item><p>Non-linear Layer: Substitution Byte transformation is only non-linear function in AES.</p></list-item>
<list-item><p>Linear Layer
<list list-type="alpha-lower">
<list-item><p>Shift Rows is a linear part of the AES. b. Mix column is a linear part of the AES.</p></list-item>
</list></p></list-item>
</list></p>
<p>As above define the substitution byte is the only non-linear function and based on the values of Substitution Box (S-BOX) for encryption and INVERSE S-BOX for the decryption process. The backbone of the cryptographic system is S-BOX because of its non-linear property. It is based on substitution-permutation networks (SPNs) and built by Galois Field for the AES and Data Encryption Standard (DES) algorithm. Attackers use &#x2018;S&#x2019; boxes for differential attacks [<xref ref-type="bibr" rid="ref-16">16</xref>]. Using a polymorphic variant of the Advanced Encryption Standard (P-AES) increases data safety. The values will change with each new key in P-AES and in basic AES, Substitution Bytes, Shift Rows and Mix Columns transforms have been made dependent on the keys [<xref ref-type="bibr" rid="ref-17">17</xref>].</p>
<p>This research paper adequately investigates the literature on AES and their types in the IoT. Compares different encryption algorithms, then we analyze and explore the characteristics of AES which is used to provide security of different IoT devices. For prevention of SCAs on IoT devices, a proposed model is presented. This paper implements and resurrects a model which is based on enhancement of the AES algorithm using logical masking property and demonstrates hardware attacks with countermeasure algorithms on IoT devices comprehensively. This enhanced AES invariant algorithm masks the bit array by using the masking technique in converting AES substitution bytes effectively. This model is used for SCAs and particularly PAAs. Simulation model is designed on the MATLAB simulator by using a script. Results will validate and provide a better solution by hiding the power profile of IoT devices from the AES [<xref ref-type="bibr" rid="ref-18">18</xref>].</p>
<p>The rest of this research paper is organized as follows: In Section 2 methodology is present. Section 3 defines the implementation environment of the model. Section 4 shows the procedure and results. Section 5 defines the research contributions. Section 6 discusses the results obtained by implementing the proposed model. Section 7 shows the conclusions and future work of the research paper.</p>
</sec>
<sec id="s2"><label>2</label><title>Methodology</title>
<p>In literature the expansion of demand pushes towards improving information encryption algorithms. Cryptographic algorithms are used to provide security of the IoT devices, and it helps minimize the total implementation cost and covers various parameters such as power consumption, key size, throughput rate, and cycle rate. Symmetric lightweight and asymmetric lightweight ciphers are the types of lightweight cryptography. To cope with attacks, we have different encryption algorithms: As <xref ref-type="table" rid="table-1">Tab. 1</xref>, shows comparison of some encryption algorithm details which are used to secure the hardware of IoT environment. All algorithms have different pros and cons, but all mentioned algorithms, IoT devices support AES algorithm. To secure the data AES and RSA (Rivest-Shamir-Adleman) algorithm are used. DES (Data Encryption Standard) and 3DES (Triple Data Encryption Standard) isn&#x0027;t secure any longer and it can be broken easily. TWOFISH and BLOWFISH are slower than AES in terms of processing time. In RC2 (Rivest Cipher), encryption operation is not equal to decryption operation. RC5 and RC6 are now outdated. CAST (Carlisle Adams and Stafford Tavares) is less secure because it is open access algorithm. IDEA (International Data Encryption Algorithm) has many weak keys by design. DSA (Digital Signature Algorithm) is only used for authentication of data. ECC (Elliptic Curve Cryptography) has less computational power. Speed of ELGAMAL is low because memory size of ciphertext is double as plain text. SPECK specifically used for hardware attacks such as side channel attack and LiCi used to increase efficiency, minimize area, and low energy consumption of the system [<xref ref-type="bibr" rid="ref-19">19</xref>&#x2013;<xref ref-type="bibr" rid="ref-22">22</xref>].</p>
<table-wrap id="table-1"><label>Table 1</label><caption><title>Comparison of cryptographic algorithms [<xref ref-type="bibr" rid="ref-19">19</xref>&#x2013;<xref ref-type="bibr" rid="ref-22">22</xref>]</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">S. no.</th>
<th align="left">Algorithm<break/>name</th>
<th align="left">Type<break/>(symmetrical/<break/>asymmetrical/<break/>hash<break/>function)</th>
<th align="left">Published<break/>year</th>
<th align="left">Block<break/>size</th>
<th align="left">Key size<break/>(bits)</th>
<th align="left">structure</th>
<th align="left">Number of rounds</th>
<th align="left">Remarks</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">1</td>
<td align="left">DES</td>
<td align="left">Symmetric</td>
<td align="left">1975</td>
<td align="left">64</td>
<td align="left">54</td>
<td align="left">Feistel</td>
<td align="left">16</td>
<td align="left">Less secure (brute force search)</td>
</tr>
<tr>
<td align="left">2</td>
<td align="left">3DES</td>
<td align="left">Symmetric</td>
<td align="left">1995</td>
<td align="left">64</td>
<td align="left">56/112/168</td>
<td align="left">Feistel</td>
<td align="left">48</td>
<td align="left">Increase the runtime, now deprecated.</td>
</tr>
<tr>
<td align="left">3</td>
<td align="left">AES</td>
<td align="left">Symmetric</td>
<td align="left">2001</td>
<td align="left">128</td>
<td align="left">128/192/256</td>
<td align="left">SPN</td>
<td align="left">10/12/14</td>
<td align="left">Extremely effective on equipment.</td>
</tr>
<tr>
<td align="left">4</td>
<td align="left">RSA</td>
<td align="left">Asymmetric</td>
<td align="left">1977</td>
<td align="left">86/214</td>
<td align="left">1024</td>
<td align="left">X</td>
<td align="left">1</td>
<td align="left">Slow for big data.</td>
</tr>
<tr>
<td align="left">5</td>
<td align="left">TWOFISH</td>
<td align="left">Symmetric</td>
<td align="left">1997</td>
<td align="left">128</td>
<td align="left">128/192/256</td>
<td align="left">Feistel</td>
<td align="left">16</td>
<td align="left">Slower than the ESA.</td>
</tr>
<tr>
<td align="left">6</td>
<td align="left">BLOWFISH</td>
<td align="left">Symmetric</td>
<td align="left">1993</td>
<td align="left">64</td>
<td align="left">32&#x2013;448</td>
<td align="left">Feistel</td>
<td align="left">16</td>
<td align="left">Initialize slowly with each change button.</td>
</tr>
<tr>
<td align="left">7</td>
<td align="left">RC2</td>
<td align="left">Symmetric</td>
<td align="left">1987</td>
<td align="left">64</td>
<td align="left">1&#x2013;128 bytes</td>
<td align="left">Feistel</td>
<td align="left">18</td>
<td align="left">Encryption operation does not equal the decryption operation.</td>
</tr>
<tr>
<td align="left">8</td>
<td align="left">RC6</td>
<td align="left">Symmetric</td>
<td align="left">1998</td>
<td align="left">128</td>
<td align="left">128/192/256</td>
<td align="left">Feistel</td>
<td align="left">X</td>
<td align="left">Not generally used as RSA.</td>
</tr>
<tr>
<td align="left">9</td>
<td align="left">RC5</td>
<td align="left">Symmetric</td>
<td align="left">1994</td>
<td align="left">16/32/64</td>
<td align="left">0&#x2013;255</td>
<td align="left">Feistel</td>
<td align="left">0&#x2013;255</td>
<td align="left">Not on duty.</td>
</tr>
<tr>
<td align="left">10</td>
<td align="left">CAST</td>
<td align="left">Symmetric</td>
<td align="left">1996</td>
<td align="left">64</td>
<td align="left">40&#x2013;128</td>
<td align="left">Feistel</td>
<td align="left">12/16</td>
<td align="left">Royalty-free algorithm, free access for anyone therefore less secure.</td>
</tr>
<tr>
<td align="left">11</td>
<td align="left">IDEA</td>
<td align="left">Symmetric</td>
<td align="left">1991</td>
<td align="left">64</td>
<td align="left">128</td>
<td align="left">Lamasery scheme</td>
<td align="left">8.5</td>
<td align="left">The large number of weak keys were found.</td>
</tr>
<tr>
<td align="left">12</td>
<td align="left">DSA</td>
<td align="left">Asymmetric</td>
<td align="left">1991</td>
<td align="left">X</td>
<td align="left">X</td>
<td align="left">X</td>
<td align="left">X</td>
<td align="left">DSA data is not encrypted, we can only authenticate the data.</td>
</tr>
<tr>
<td align="left">13</td>
<td align="left">ECC</td>
<td align="left">Asymmetric</td>
<td align="left">1985</td>
<td align="left">X</td>
<td align="left">160</td>
<td align="left">Algebraic</td>
<td align="left">X</td>
<td align="left">Less power for calculation.</td>
</tr>
<tr>
<td align="left">14</td>
<td align="left">ELGAMAL</td>
<td align="left">Asymmetric</td>
<td align="left">1985</td>
<td align="left">514</td>
<td align="left">32 bytes</td>
<td align="left">X</td>
<td align="left">X</td>
<td align="left">Double-encrypt the text into clear text so that the speed is slow.</td>
</tr>
<tr>
<td align="left">15</td>
<td align="left">SPECK</td>
<td align="left">Symmetric</td>
<td align="left">2013</td>
<td align="left">128</td>
<td align="left">128</td>
<td align="left">SPN</td>
<td align="left">32</td>
<td align="left">Specifically used for hardware implementation with a micro-controller.</td>
</tr>
<tr>
<td align="left">16</td>
<td align="left">LiCi</td>
<td align="left">Symmetric</td>
<td align="left">2017</td>
<td align="left">64</td>
<td align="left">128</td>
<td align="left">Feistel and SPN</td>
<td align="left">31</td>
<td align="left">Use for to increase efficiency, reduce surface area and energy use.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The idea behind our design is to secure the data by using encryption algorithm. <xref ref-type="fig" rid="fig-2">Fig. 2</xref> is the generalized flow chart of the proposed work. So, we will discuss highlighted boxes 1 and 2. First box is &#x201C;Perform AES for encryption&#x201D; and the second box is &#x201C;Perform AES for decryption&#x201D;. In this part all the transformations have different properties and different values like add round key, substitution byte, shift rows, and mix column for encryption. Inverse substitution byte, Inverse shift rows and Inverse mix column for decryption. Attackers mainly observe the power consumption at a non-linear part of the AES, i.e., Substitution Byte and Substitution Word in add round key algorithm. Both of functions based on S-BOX.</p>
<fig id="fig-2"><label>Figure 2</label><caption><title>General flow chart of the proposed technique</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_23516-fig-2.png"/></fig>
</sec>
<sec id="s3"><label>3</label><title>Implementation Environment</title>
<p>Software tools and platform used to implement proposed algorithm is described in <xref ref-type="table" rid="table-2">Tab. 2</xref>.</p>
<table-wrap id="table-2"><label>Table 2</label><caption><title>System specification for implants</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Name</th>
<th align="left">Specification</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">IDE</td>
<td align="left">MATLAB</td>
</tr>
<tr>
<td align="left">Programming language</td>
<td align="left">C/C&#x002B;&#x002B;, MATLAB</td>
</tr>
<tr>
<td align="left">MATLAB Version</td>
<td align="left">MATLAB 2018a</td>
</tr>
<tr>
<td align="left">Operating System</td>
<td align="left">Windows 10 pro 64 bit</td>
</tr>
<tr>
<td align="left">Processor</td>
<td align="left">Intel Core Ii7 3rd generation, 2.4&#x2005;GHz.</td>
</tr>
<tr>
<td align="left">RAM</td>
<td align="left">4.00 GB</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>MATLAB is specially developed for engineers and scientists. It allows the creation or expression of matrices and mathematical tables directly. The use of toolboxes is very important. All toolboxes work together and integrate with parallel computer environments. In MATLAB several algorithms are directly accessible and used in design, interactive applications with immediate visual display with minimal time. Researchers can alter or replicate their work until they get the outcome as they want [<xref ref-type="bibr" rid="ref-23">23</xref>]. AES design on matrix. Plain text and key length, both consist of matrix. Similarly, MATLAB also works on a matrix so, it is easy to manipulate and use by researchers to implement AES in MATLAB and obtain desired results with graphic representation.</p>
</sec>
<sec id="s4"><label>4</label><title>Procedure and Results</title>
<p>In this section, we have improved the characteristics of the AES algorithm by using a logical masking technique in substitution byte transformation. Here are the steps to redesign and use the AES algorithm in a special way.
<list list-type="roman-lower">
<list-item><label>i.</label><p>Enter a plain text as string value from user.</p></list-item>
<list-item><label>ii.</label><p>Take an input key as string value from user.</p></list-item>
<list-item><label>iii.</label><p>Both inputs have string properties, so, convert them into decimal numbers by using the DOUBLE ( ) function of MATLAB.</p></list-item>
<list-item><label>iv.</label><p>By Key Expansion Algorithm generates round keys for every round of AES simultaneously.</p></list-item>
<list-item><label>v.</label><p>Then run the XOR operation between the plain text and the 1st round key using the BITXOR ( ) function of MATLAB.</p></list-item>
<list-item><label>vi.</label><p>We now have 16 distinct values. These values overwrite the S-BOX values.</p></list-item>
<list-item><label>vii.</label><p>We use S-BOX for the encryption process.</p></list-item>
<list-item><label>viii.</label><p>S-BOX is 16 x 16 array with decimal values. It means that this box has 16 rows and 16 columns in hexadecimal form start from 0 to F.</p></list-item>
<list-item><label>ix.</label><p>The 16 values mentioned in step no. (vi) are replaced by the values of S-BOX.</p></list-item>
<list-item><label>x.</label><p>Now shift rows transformation is performed by using circshift( ) function in MATLAB.</p></list-item>
<list-item><label>xi.</label><p>Similarly, Mix Column transformation is carried out by the Galois Field array function.</p></list-item>
<list-item><label>xii.</label><p>In last the output matrix performed XOR operation with round keys.</p></list-item>
<list-item><label>xiii.</label><p>Step no. (xii) is the last step of the 1st round. Likewise, the remaining rounds are conducted one by one and generate a new matrix using loop iterations.</p></list-item>
<list-item><label>xiv.</label><p>Finally, after 10th round, we have a ciphertext as shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>.</p></list-item>
</list></p>
<fig id="fig-3"><label>Figure 3</label><caption><title>Output from the AES algorithm</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_23516-fig-3.png"/></fig>
<p>Furthermore, the algorithm converts all values into hexadecimal values as 27 is a decimal number and 1B is a hexadecimal conversion of this number. Thus, 1 and B convert addresses of row and column. This means that 1 row and B column contain the value 175 and replaced by 27. Simultaneously, all the values replaced by their specific row and column. In the decryption process, we use inverse SBOX table in substitution bytes and key expansion algorithm process of AES by using reverse key mechanism. Therefore, starting with SBOX, value of 8th row and 8th column is C4 in hexadecimal and 196 in decimal, this value is generated by the mentioned steps. All input values are replaced by specific SBOX values, and the collective data are sent to the next transformations of AES, which is shift rows and mix column. To process S-box transformations, we propose to use a new SBOX lookup table which is recalculated each time when AES is performed.
</p>
<fig id="fig-6">
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_23516-fig-6.png"/>
</fig>
<p>The variable i and j are used for the loop structure and R is the return value after process the equation. When we apply MATLAB code for the above flow diagram, then the output is given below:
</p>
<fig id="fig-7">
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_23516-fig-7.png"/>
</fig>
<p>When we apply the proposed algorithm in the above code the result is given below:</p>
<p>In <xref ref-type="fig" rid="fig-4">Fig. 4</xref>, graph shows the output values of 1<sup>st</sup> to 10<sup>th</sup> round of AES algorithm without implementation of masking property as define in algorithm 1. The graph has 16 different values with a different power level, so attackers execute statistical functions on a set of measured energy consumption tracks to retrieve the secret key. Likewise, the graph shows in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>, the output of 10 rounds of the AES algorithm with the implementation of the proposed masking property as defined in Algorithm 2, in the code section of the script in MATLAB. We select two levels, i.e., 0 and 5. Level 0 shows low level of power and 5 shows high level of power in algorithm 2, the masking logic is applied so that the result displayed in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>. The graph shows the output values from the 1<sup>st</sup> to 10<sup>th</sup> rounds of AES. The chart has 16 different values with the same power level as the previous one, so attackers face the challenge of observing different energy consumption values. The unit of y-axis is power in watt and x-axis labels are number of rounds of AES i.e., 1, 2, 3, &#x2026;.16.</p>
<fig id="fig-4"><label>Figure 4</label><caption><title>Result of Algorithm 1</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_23516-fig-4a.png"/><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_23516-fig-4b.png"/></fig>
<fig id="fig-5"><label>Figure 5</label><caption><title>Result of Algorithm 2</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_23516-fig-5a.png"/><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_23516-fig-5b.png"/></fig>
</sec>
<sec id="s5"><label>5</label><title>Research Contributions</title>
<p>This paper is extended version of &#x201C;Invariant of AES algorithm implementations against side channel attacks in IoT devices&#x201D;, which was presented in ICCOINS 2021 conference and published in IEEE Xplore. In this paper, we work on hiding the power traces of encrypted text using masking technique and get result from the simulation model design on MATLAB. The basic design of simulation was performed in published paper. This paper was based on proposal of generalize AES implementation on MATLAB.</p>
</sec>
<sec id="s6"><label>6</label><title>Discussion</title>
<p>Attackers analyze different values per differential power analysis (DPA) and retrieve the key. Moreover, this process takes a long time. Thousands of patterns are analyzed by DPA, but attackers perform this activity. Thus, with the help of the proposed algorithm attackers cannot analyze the power and fail to retrieve the key. Also, many researchers provide better solutions against PAAs with different masking techniques like Boolean masking. Results will provide a better solution than that available in the literature to protect IoT device infrastructure against side channel attacks. Temperature and humidity data from the DHT11 and DHT22 sensors will be used as a preliminary experimental configuration. During the attack scenario stages, we will consider clock sampling, which is the vulnerable parameter of the sensor through the correlation analysis. During the counter-measures phase, the data from DHT11 and DHT22 sensors will go through industry standard for encrypting and decrypting hex strings using AES-128.This analysis will be used as a benchmark for the proposed method.</p>
</sec>
<sec id="s7"><label>7</label><title>Conclusions and Future Work</title>
<p>This paper implements and resurrects a model which is based on the enhancement of the AES algorithm using logical masking property and demonstrates hardware attacks with countermeasure algorithms on IoT devices comprehensively. This enhanced AES invariant algorithm masks the bit array by using the masking technique in converting AES substitution bytes effectively. The model is used for SCAs and PAAs. The simulation model is designed on the MATLAB simulator by using a script. All the results of AES rounds shows that different values occur in each round. These values can be easily analyzed by the attacker with the help of PAA attack. When we apply algorithm 2 on MATLAB, all the different values give an equal power level and hide the different power level. The results will validate and provide a better solution by masking the power profile of IoT devices with respect to SCA.</p>
<p>When we apply algorithm 2 in MATLAB, all the different values have the same value and hide the different power. This analysis will provide a reference point for the proposed method. In the future, the lightweight AES algorithm with the proposed false key mechanism and power reduction technique such as wave dynamic differential logic (WDDL) will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable field array (FPGA).</p>
<p>The results have been implemented using 128-bit AES codes available on GitHub Community Forum and the MATLAB function and codes available online for the initial implementation [<xref ref-type="bibr" rid="ref-24">24</xref>].</p>
</sec>
</body>
<back>
<ack>
<p>This paper is an extended version of &#x201C;Invariant of AES algorithm implementations against side channel attacks in IoT devices&#x201D;, which was presented at ICCOINS 2021 conference and published in IEEE Xplore. This work was carried out with the support of Y. Weize and S. Kose, &#x201C;A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks,&#x201D; IEEE Transactions on Circuits and System, vol. 64, no. 11, pp. 2934&#x2013;2944, 2017. This work is an extension of author&#x0027;s PhD. Research proposal from Hamdard University. The results have been implemented using Advanced Encryption Standard (AES) 128-Bit codes available GitHub Community Forum and MATLAB Function and codes available online for the purpose of initial implementation.</p>
</ack>
<fn-group>
<fn fn-type="other"><p><bold>Funding Statement:</bold> This work partially supported by the Research Committee of Hamdard University, Karachi Pakistan (<uri xlink:href="https://www.hamdard.edu.pk">www.hamdard.edu.pk</uri>) and partially supported by the Office of Research Innovation &#x0026; Commercialization (ORIC) of the Dawood University of Engineering &#x0026; Technology Karachi Pakistan (<uri xlink:href="https://www.duet.edu.pk">www.duet.edu.pk</uri>).</p></fn>
<fn fn-type="conflict"><p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the recent study.</p></fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Dutta</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Ghosh</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Bayoumi</surname></string-name></person-group>, &#x201C;<article-title>Lightweight cryptography for internet of insecure things: A survey</article-title>,&#x201D; in <conf-name>Computing and Communication Workshop and Conf., 9th Annual Conf., CCWC 2019. Proc.: Institute of Electrical and Electronics Engineers (IEEE)</conf-name>, <conf-loc>Las Vegas, NV, USA</conf-loc>, pp. <fpage>0475</fpage>&#x2013;<lpage>0481</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Bansal</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Nanda</surname></string-name> and <string-name><given-names>M. N.</given-names> <surname>Husain</surname></string-name></person-group>, &#x201C;<article-title>Security and privacy aspects for internet of things</article-title>,&#x201D; in <conf-name>Inventive Computation Technologies, 6th Int. Conf., ICICT 2021. Proc.: Institute of Electrical and Electronics Engineers (IEEE)</conf-name>, <conf-loc>Coimbatore, India</conf-loc>, pp. <fpage>199</fpage>&#x2013;<lpage>204</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Jia</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Peng</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name> and <string-name><given-names>P.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved</article-title>,&#x201D; <source>IEEE Internet of Things Journal</source>, vol. <volume>6</volume>, no. <issue>2</issue>, pp. <fpage>1606</fpage>&#x2013;<lpage>1616</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. A. A.</given-names> <surname>Ghani</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Konstantas</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Mahyoub</surname></string-name></person-group>, &#x201C;<article-title>A comprehensive it attacks survey based on a building-blocked reference model</article-title>,&#x201D; <source>International Journal of Advanced Computer Science and Applications</source>, vol. <volume>9</volume>, no. <issue>3</issue>, pp. <fpage>355</fpage>&#x2013;<lpage>373</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Bellizia</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Scotti</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Trifiletti</surname></string-name></person-group>, &#x201C;<article-title>On-chip analog current equalizer as a countermeasure against side-channel attacks in CMOS nanometer technology</article-title>,&#x201D; in <conf-name>Mixed Design of Integrated Circuits and Systems, 23rd Int. Conf., MIXDES 2016. Proc.: Institute of Electrical and Electronics Engineers (IEEE)</conf-name>, <conf-loc>Lodz, Poland</conf-loc>, pp. <fpage>229</fpage>&#x2013;<lpage>234</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Bellizia</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Bongiovanni</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Monsurro</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Scotti</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Trifiletti</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Secure double rate registers as an RTL countermeasure against power analysis attacks</article-title>,&#x201D; <source>IEEE Transactions on Very Large Scale Integration Systems</source>, vol. <volume>26</volume>, no. <issue>7</issue>, pp. <fpage>1368</fpage>&#x2013;<lpage>1376</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B. L. R.</given-names> <surname>Stojkoska</surname></string-name> and <string-name><given-names>K. V.</given-names> <surname>Trivodaliev</surname></string-name></person-group>, &#x201C;<article-title>A review of internet of things for smart home: Challenges and solutions</article-title>,&#x201D; <source>Journal of Cleaner Production</source>, vol. <volume>140</volume>, no. <issue>3</issue>, pp. <fpage>1454</fpage>&#x2013;<lpage>1464</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O.</given-names> <surname>Lo</surname></string-name>, <string-name><given-names>W. J.</given-names> <surname>Buchanan</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Carson</surname></string-name></person-group>, &#x201C;<article-title>Power analysis attacks on the AES-128s-box using differential power analysis (DPA) and correlation power analysis (CPA)</article-title>,&#x201D; <source>Journal of Cyber Security Technology</source>, vol. <volume>1</volume>, no. <issue>2</issue>, pp. <fpage>88</fpage>&#x2013;<lpage>107</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K. S.</given-names> <surname>Chong</surname></string-name>, <string-name><given-names>J. S.</given-names> <surname>Ng</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>N. K. Z.</given-names> <surname>Lwin</surname></string-name>, <string-name><given-names>N. A.</given-names> <surname>Kyaw</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Dual-hiding side-channel-attack resistant FPGA-based asynchronous-logic AES: Design, countermeasures and evaluation</article-title>,&#x201D; <source>IEEE Journal on Emerging and Selected Topics in Circuits and Systems</source>, vol. <volume>3357</volume>, no. <issue>2</issue>, pp. <fpage>343</fpage>&#x2013;<lpage>356</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Gurunath</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Agarwal</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Nandi</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Samanta</surname></string-name></person-group>, &#x201C;<article-title>An overview: Security issue in IoT network</article-title>,&#x201D; in <conf-name>IoT in Social, Mobile, Analytics and Cloud, 2nd Int. Conf., I-SMAC 2018. Proc.: Institute of Electrical and Electronics Engineers (IEEE)</conf-name>, <conf-loc>Palladam, India</conf-loc>, pp. <fpage>104</fpage>&#x2013;<lpage>107</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Makhdoom</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Abolhasan</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Lipman</surname></string-name>, <string-name><given-names>R. P.</given-names> <surname>Liu</surname></string-name> and <string-name><given-names>W.</given-names> <surname>Ni</surname></string-name></person-group>, &#x201C;<article-title>Anatomy of threats to the internet of things</article-title>,&#x201D; <source>IEEE Communications Surveys &#x0026; Tutorials</source>, vol. <volume>21</volume>, no. <issue>2</issue>, pp. <fpage>1636</fpage>&#x2013;<lpage>1675</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B. A.</given-names> <surname>Dao</surname></string-name>, <string-name><given-names>T. T.</given-names> <surname>Hoang</surname></string-name>, <string-name><given-names>A. T.</given-names> <surname>Le</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Tsukamoto</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Suzaki</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Exploiting the back-gate biasing technique as a countermeasure against power analysis attacks</article-title>,&#x201D; <source>IEEE Accessing</source>, vol. <volume>9</volume>, pp. <fpage>24768</fpage>&#x2013;<lpage>24786</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Kose</surname></string-name></person-group>, &#x201C;<article-title>Efficient and secure on-chip reconfigurable voltage regulation for IoT devices</article-title>,&#x201D; in <conf-name>Great Lakes Symposium on VLSI, GLSVLSI 2017</conf-name>, <conf-loc>Banff, Alberta, Canada</conf-loc>, pp. <fpage>369</fpage>&#x2013;<lpage>374</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Yuan</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Li</surname></string-name> and <string-name><given-names>W.</given-names> <surname>Zhao</surname></string-name></person-group>, &#x201C;<article-title>FPGA based optimization for masked AES implementation</article-title>,&#x201D; in <conf-name>Circuits and Systems, 54th Int. Midwest Symposium, MWSCAS 2011. Proc.: Institute of Electrical and Electronics Engineers (IEEE)</conf-name>, <conf-loc>Seoul, Korea (South)</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>4</lpage>, <year>2011</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Ray</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Jin</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Raychowdhury</surname></string-name></person-group>, &#x201C;<article-title>The changing computing paradigm with internet of things: A tutorial introduction</article-title>,&#x201D; <source>IEEE Design &#x0026; Test</source>, vol. <volume>33</volume>, no. <issue>2</issue>, pp. <fpage>76</fpage>&#x2013;<lpage>96</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Weize</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Kose</surname></string-name></person-group>, &#x201C;<article-title>A lightweight masked AES implementation for securing IoT against CPA attacks</article-title>,&#x201D; <source>IEEE Transactions on Circuits and Systems</source>, vol. <volume>64</volume>, no. <issue>11</issue>, pp. <fpage>2934</fpage>&#x2013;<lpage>2944</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Altigani</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Hasan</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Barry</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Naserelden</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>Elsadig</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>A polymorphic advanced encryption standard-a novel approach</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>9</volume>, pp. <fpage>20191</fpage>&#x2013;<lpage>20207</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>N. M.</given-names> <surname>Ansari</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Hussain</surname></string-name>, <string-name><given-names>S. S.</given-names> <surname>Hussain</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Arif</surname></string-name></person-group>, &#x201C;<article-title>Invariant of AES algorithm implementations against attacks in IoT devices</article-title>,&#x201D; in <conf-name>Computer &#x0026; Information Sciences, Int. Conf. ICCOINS 2021. Proc.: Institute of Electrical and Electronics Engineer (IEEE)</conf-name>, <conf-loc>Kuching, Malaysia</conf-loc>, pp. <fpage>84</fpage>&#x2013;<lpage>89</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Singh</surname></string-name>, <string-name><given-names>P. K.</given-names> <surname>Sharma</surname></string-name>, <string-name><given-names>S. Y.</given-names> <surname>Moon</surname></string-name> and <string-name><given-names>J. H.</given-names> <surname>Park</surname></string-name></person-group>, &#x201C;<article-title>Advanced lightweight encryption algorithms for IoT devices: Survey, challenges and solutions</article-title>,&#x201D; <source>Journal of Ambient Intelligence Humanized Computng</source>, pp. <fpage>1</fpage>&#x2013;<lpage>18</lpage>, <year>2017</year>. <uri>http://dx.doi.org/10.1007/s12652-017-0494-4</uri>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K. P.</given-names> <surname>Choudhury</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Kakoty</surname></string-name></person-group>, &#x201C;<article-title>Comparative analysis of different modified advanced encryption standard algorithms over conventional advanced encryption standard algorithm</article-title>,&#x201D; <source>International Journal of Current Research and Review</source>, vol. <volume>9</volume>, no. <issue>22</issue>, pp. <fpage>31</fpage>&#x2013;<lpage>34</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Tang</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Lokibe</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Kusaka</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Nogami</surname></string-name></person-group>, &#x201C;<article-title>An approach for attacking speck on microcontroller with correlation power analysis</article-title>,&#x201D; in <conf-name>Computing and Networking Workshops, 8th Int. Symposium, CANDARW 2020. Proc.: Institute of Electrical and Electronics Engineer (IEEE)</conf-name>, <conf-loc>Naha, Japan</conf-loc>, pp. <fpage>368</fpage>&#x2013;<lpage>372</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A. C. C.</given-names> <surname>Torreno</surname></string-name>, <string-name><given-names>M. T. G. D.</given-names> <surname>Leon</surname></string-name>, <string-name><given-names>M. D.</given-names> <surname>Rosales</surname></string-name> and <string-name><given-names>A. B.</given-names> <surname>Alvarez</surname></string-name></person-group>, &#x201C;<article-title>Power and area oriented implementations of lightweight cryptographic algorithms for wireless sensor networks</article-title>,&#x201D; in <conf-name>Region 10, Conf., TENCON 2020. Proc.: Institute of Electrical and Electronics Engineer (IEEE)</conf-name>, <conf-loc>Osaka, Japan</conf-loc>, pp. <fpage>473</fpage>&#x2013;<lpage>477</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Siddiqui</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Khalid</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Murtaza</surname></string-name>, <string-name><given-names>M. E.</given-names> <surname>Haq</surname></string-name> and <string-name><given-names>M. A.</given-names> <surname>Azam</surname></string-name></person-group>, &#x201C;<article-title>A novel algebraic technique for the design of computational substitution-boxes using the action of matrices on Galois field</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>197630</fpage>&#x2013;<lpage>197643</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Madhu</surname>, </string-name></person-group><uri xlink:href="https://github.com/autoMAD/MATLAB_PROJECTS/tree/master/Advanced%20Encryption%20Standard%20(AES)%20128-Bit">https://github.com/autoMAD/MATLAB_PROJECTS/tree/master/Advanced%20Encryption%20Standard%20(AES)%20128-Bit</uri>, <year>2013</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>