z-logo
open-access-imgOpen Access
Side-Channel Security on Key Exchange Protocol: Timing and Relay Attacks
Author(s) -
Mohd Anuar Mat Isa,
Habibah Hashim,
Syed Farid Syed Adnan,
Nur Nabila Mohamed,
Yasin Fitri Alias
Publication year - 2018
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v11.i2.pp688-695
Subject(s) - computer security , computer science , key exchange , key (lock) , relay , computer network , encryption , the internet , authentication (law) , security association , transport layer security , cryptocurrency , public key cryptography , cloud computing , world wide web , operating system , cloud computing security , power (physics) , physics , quantum mechanics , network access control
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Internet of Thing (IoT), cryptocurrency and blockchain, virtual intelligent, smart computing etc. To address the security issues in the Internet based computing systems, this paper explores the side-channel security for KEP, namely timing and relay attacks. Nowadays, various KEP variances are used by internet protocol such as IKEv2/3. The purpose of KEP is to enable a secret key(s) sharing between two or more computing systems on unsecure network. Later, the secret key(s) is used to encrypt all data transmitted for online systems such as internet banking, cryptocurrency transaction, IoT services etc. The timing attack was addressed by an adversary model and security assumptions. The relay attack on KEP was tested by an experiment testbed between a key fob and car using Raspberry Pi and RF module. The experiment result has shown that the propagation delay of KEP on RF communication is increased by 100% for each relay node. If the KEP runtime is increased greater than 50%, the KEP authentication key should be discarded to prevent the attacker from gaining access to the car.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here