ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode
Cited 1 time in scopus Download 63 time Share share facebook twitter linkedin kakaostory
Authors
Sang-su Lee, Jong-sik Moon, Yong-je Choi, Daewon Kim, Seungkwang Lee
Issue Date
2024-07
Citation
Sensors, v.24, no.13, pp.1-18
ISSN
1424-8220
Publisher
Multidisciplinary Digital Publishing Institute (MDPI)
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.3390/s24134163
Abstract
To enhance security in the semiconductor industry’s globalized production, the Defense Advanced Research Projects Agency (DARPA) proposed an authentication protocol under the Supply Chain Hardware Integrity for Electronics Defense (SHIELD) program. This protocol integrates a secure hardware root-of-trust, known as a dielet, into integrated circuits (ICs). The SHIELD protocol, combined with the Advanced Encryption Standard (AES) in counter mode, named CTR-SHIELD, targets try-and-check attacks. However, CTR-SHIELD is vulnerable to desynchronization attacks on its counter blocks. To counteract this, we introduce the DTR-SHIELD protocol, where DTR stands for double counters. DTR-SHIELD addresses the desynchronization issue by altering the counter incrementation process, which previously solely relied on truncated serial IDs. Our protocol adds a new AES encryption step and requires the dielet to transmit an additional 100 bits, ensuring more robust security through active server involvement and message verification.
KSP Keywords
AES Encryption, AES-CTR, Advanced encryption standard, CTR mode, Counter mode, Desynchronization attacks, DoS Attacks, Research project, Secure hardware, Semiconductor industry(SI), authentication protocol
This work is distributed under the term of Creative Commons License (CCL)
(CC BY)
CC BY