Survey on White-Box Attacks and Solutions

Authors

  • V. Porkodi Assistant Professor, Lebanese French University, Department of Information Technology, Erbil, Iraq
  • M. Sivaram Associate Professor, Lebanese French University, Department of Information Technology, Erbil, Iraq
  • Amin Salih Mohammed Assistant Professor, University of slahaddin, Department of Software Engineering, Erbil, Iraq
  • V. Manikandan Assistant Professor, Lebanese French University, Department of Information Technology, Erbil, Iraq

DOI:

https://doi.org/10.51983/ajcst-2018.7.3.1904

Keywords:

Wearables, Internet of Wearable Things, Personally Identifiable Information, Unauthorized Exposure, Privacy Challenges, Delegation of Use, Attack Surfaces

Abstract

This Research paper provides special white-box attacks and outputs from it. Wearable IoT units perform keep doubtlessly captured, then accessed within an unauthorized behavior due to the fact concerning their bodily nature. That case, they are between white-box attack systems, toughness the opponent may additionally have quantity,visibility about the implementation of the inbuilt crypto system including complete control over its solution platform. The white-box attacks on wearable devices is an assignment without a doubt. To serve as a countermeasure in opposition to these problems in such contexts, here analyzing encryption schemes in imitation of protecting the confidentiality concerning records against white-box attacks. The lightweight encryption, intention in accordance with protecting the confidentiality over data towards white-box attacks is the recently stability good algorithm. In that paper, we read the extraordinary algorithms too.

References

Shengling Wang, Rongfang Bie, Feng Zhao, Nan Zhang, Xiuzhen Cheng, and Hyeong-Ah Choi, “Security in Wearable Communications”, IEEE Network, September/October 2016.

Orlando Arias, Student Member, IEEE, Jacob Wurm, Khoa Hoang, and Yier Jin, Member, IEEE “Privacy and Security in Internet of Things and Wearable Devices”, IEEE Transactions on MultiScale Computing Systems, 2015.

Daojing He, Sammy Chan and Mohsen GuizanUser Privacy And Data Trustworthiness in Mobile Crowd Sensing”, IEEE Wireless Communication, February 2015.

Aleksandr Ometovy, Sergey Bezzateev?, Joona Kannistoy,JarmoHarjuy,SergeyAndreevy,”Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things”, IEEE, pp. 2327-4662, 2016.

Yaying Xiao Shanghai Jiao Tong University Shanghai, China, Xuejia Lai Shanghai Jiao “A Secure Implementation of White-Box AES”, IEEE, 2009.

K.-H. Rhee and D. Nyang “Protecting White- Box AES with DualCiphers” ICISC 2010, LNCS 6829, pp. 278–291, 2011

Yang Shi, Wujing Wei and Zongjian He“A Lightweight White-Box Symmetric Encryption Algorithmagainst Node Capture for WSNs”, Sensors, Vol. 15, pp. 11928-11952, 2015.

I. Muslukhov, S. T. Sun, P. Wijesekera, Y. Boshmaf and K. Beznosov, “Decoupling data-at-rest encryption and smartphone locking with wearable devices”, Pervasive and Mobile Computing, Vol. 32, No. 10, pp. 26-34, 2016.

Y. Shi, W. Wei, Z. He, and H. Fan, “An ultra-lightweight whitebox encryption scheme for securing resource-constrained IoT devices,” Computer Security Applications, Los Angeles, California, pp. 16-29, 2016.

Yang Shi, Xiaoping Wang, and Hongfei Fan, ” Light-Weight White-BoxEncryption Scheme with Random Padding for Wearable Consumer Electronic Devices”, IEEE Transactions on Consumer Electronics, Vol. 63, No. 1, February 2017.

Downloads

Published

05-11-2018

How to Cite

Porkodi, V., Sivaram, M., Mohammed, A. S., & Manikandan, V. (2018). Survey on White-Box Attacks and Solutions. Asian Journal of Computer Science and Technology, 7(3), 28–32. https://doi.org/10.51983/ajcst-2018.7.3.1904