Authors:
Kazuhide Fukushima
1
;
Damien Marion
2
;
Yuto Nakano
1
;
Adrien Facon
2
;
Shinsaku Kiyomoto
1
and
Sylvain Guilley
2
Affiliations:
1
KDDI Research, Inc., 2-1-15 Ohara, Fujimino, Saitama 356-8502 and Japan
;
2
Secure-IC S.A.S., 80 avenue des Buttes de Coësmes Rennes, 35700 and France
Keyword(s):
Internet of Things (IoT), Low-Power Wide-Area (LPWA), LoRaWAN, Side-channel Analysis, Correlation Power Analysis (CPA), Electromagnetic(EM)-leakage, AES.
Related
Ontology
Subjects/Areas/Topics:
Computer-Supported Education
;
Enterprise Information Systems
;
Information Systems Analysis and Specification
;
Information Technologies Supporting Learning
;
Security
;
Security and Privacy
Abstract:
The Internet of things (IoT) has come into widespread use, and data protection and integrity are critical for connected IoT devices in order to maintain security and privacy. Low-power wide-area (LPWA) technologies for IoT wireless communication achieve data protection and integrity by using encryption and message authentication. However, side-channel analysis techniques exist that have the capacity to recover secret information from a device. In this paper, we apply a side-channel analysis technique to the payload encryption process and message authentication code generation process on a real LoRaWAN end-device. The entire AES-128 key for the payload encryption can be recovered with 260 electromagnetic(EM)-leakage traces and 12 bytes of the key for message authentication code generation can be recovered with 140 EM-leakage traces.