{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:58:53Z","timestamp":1760241533106,"version":"build-2065373602"},"reference-count":27,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T00:00:00Z","timestamp":1525737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>In the Internet of Things (IoT), many strong constraints have to be considered when designing the connected objects, including low cost and low power, thus limited resources. The confidentiality and integrity of sensitive data must however be ensured even when they have to be processed in the cloud. Security is therefore one of the design constraints but must be achieved without the usual level of resources. In this paper, we address two very different examples showing how embedded hardware\/software co-design can help in improving security in the IoT context. The first example targets so-called \u201chardware attacks\u201d and we show how some simple attacks can be made much more difficult at very low cost. This is demonstrated on a crypto-processor designed for Elliptic Curve Cryptography (ECC). A very lightweight countermeasure is implemented against Simple Power Analysis (SPA), taking advantage of the general processor usually available in the system. The second example shows how confidentiality in the cloud can be guaranteed by homomorphic encryption at a lower computational cost by taking advantage of a hardware accelerator. The proposed accelerator is very easy to implement and can easily be tuned to several encryption schemes and several trade-offs between hardware costs and computation speed.<\/jats:p>","DOI":"10.3390\/info9050114","type":"journal-article","created":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T02:48:08Z","timestamp":1525747688000},"page":"114","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Hardware Support for Security in the Internet of Things: From Lightweight Countermeasures to Accelerated Homomorphic Encryption"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8664-412X","authenticated-orcid":false,"given":"R\u00e9gis","family":"Leveugle","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP<sup>2<\/sup>, TIMA, 38000 Grenoble, France"},{"name":"Institute of Engineering, Univ. Grenoble Alpes, 38000 Grenoble, France"}]},{"given":"Asma","family":"Mkhinini","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP<sup>2<\/sup>, TIMA, 38000 Grenoble, France"}]},{"given":"Paolo","family":"Maistri","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP<sup>2<\/sup>, TIMA, 38000 Grenoble, France"}]}],"member":"1968","published-online":{"date-parts":[[2018,5,8]]},"reference":[{"key":"ref_1","unstructured":"(2017, November 30). Internet of Things Research Study, Hewlett Packard Entreprise. Available online: http:\/\/files.asset.microfocus.com\/4aa5-4759\/en\/4aa5-4759.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ronen, E., and Shamir, A. (2016, January 21\u201324). Extended functionality attacks on IoT devices: The case of smart lights. Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P), Saarbr\u00fccken, Germany.","DOI":"10.1109\/EuroSP.2016.13"},{"key":"ref_3","first-page":"31","article-title":"Security issues in smart home and mobile health system: Threat analysis, possible countermeasures and lessons learned","volume":"9","author":"Olawumi","year":"2017","journal-title":"Int. J. Inf. Technol. Secur."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Moore, C., O\u2019Neill, M., O\u2019Sullivan, E., Dor\u00f6z, Y., and Sunar, B. (2014, January 1\u20135). Practical homomorphic encryption: A survey. Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), Melbourne, VIC, Australia.","DOI":"10.1109\/ISCAS.2014.6865753"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","article-title":"The sorcerer\u2019s apprentice guide to fault attacks","volume":"94","author":"Choukri","year":"2006","journal-title":"Proc. IEEE"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Lepoint, T., and Naehrig, M. (2014, January 28\u201330). A comparison of the homomorphic encryption schemes FV and YASHE. Proceedings of the 7th International Conference on Cryptology in Africa, Progress in Cryptology\u2014AFRICACRYPT 2014, Marrakesh, Morocco.","DOI":"10.1007\/978-3-319-06734-6_20"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Jayet-Griffon, C., Cornelie, M.-A., Maistri, P., Elbaz-Vincent, P.H., and Leveugle, R. (2015, January 7\u20139). Polynomial Multipliers for Fully Homomorphic Encryption on FPGA. Proceedings of the 2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig), Mexico City, Mexico.","DOI":"10.1109\/ReConFig.2015.7393335"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"G\u00fcneysu, T., and Handschuh, H. (2015). Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware. Cryptographic Hardware and Embedded Systems\u2014CHES 2015, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-662-48324-4"},{"key":"ref_9","first-page":"157","article-title":"High-Speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems","volume":"62","author":"Chen","year":"2015","journal-title":"IEEE Trans. Circ. Syst."},{"key":"ref_10","unstructured":"(2017, November 21). Black Hat USA 2015: The Full Story of How That Jeep Was Hacked. Available online: https:\/\/www.kaspersky.com\/blog\/blackhat-jeep-cherokee-hack-explained\/9493\/."},{"key":"ref_11","unstructured":"(2017, November 21). Lethal Medical Device Hack Taken to Next Level. Available online: https:\/\/www.cso.com.au\/article\/404909\/lethal_medical_device_hack_taken_next_level."},{"key":"ref_12","unstructured":"(2017, November 21). Firmware Update to Address Cybersecurity Vulnerabilities Identified in Abbott\u2019s (Formerly St. Jude Medical\u2019s) Implantable Cardiac Pacemakers: FDA Safety Communication, Available online: https:\/\/www.fda.gov\/medicaldevices\/safety\/alertsandnotices\/ucm573669.htm."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Aldini, A., Gorrieri, R., and Martinelli, F. (2005). A Tutorial on Physical Security and Side-Channel Attacks. Foundations of Security Analysis and Design III, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/11554578"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Ronen, E., Shamir, A., Achi-Or Weingarten, A., and O\u2019Flynn, C. (2017, January 22\u201324). IoT goes nuclear: Creating a ZigBee chain reaction. Proceedings of the IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.14"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_16","unstructured":"Miller, V. (1986, January 11\u201315). Use of elliptic curves in cryptography. Proceedings of the Advances in Cryptology (CRYPTO), Santa Barbara, CA, USA."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Backenstrass, T., Blot, M., Ponti\u00e9, S., and Leveugle, R. (2016, January 4\u20136). Protection of ECC computations against Side-Channel Attacks for lightweight implementations. Proceedings of the 1st IEEE International Verification and Security Workshop, Sant Feliu de Guixols, Catalunya, Spain.","DOI":"10.1109\/IVSW.2016.7566598"},{"key":"ref_19","unstructured":"Rivest, R.L., Adleman, L., and Dertouzos, M.L. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation, Academia Press."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2009). A Fully Homomorphic Encryption Scheme. [Ph.D. Dissertation, Stanford University].","DOI":"10.1145\/1536414.1536440"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., and Vaikuntanathan, V. (2012, January 8\u201310). (Leveled) fully homomorphic encryption without bootstrapping. Proceedings of the ACM 3rd Innovations in Theoretical Computer Science Conference (ITCS), Cambridge, MA, USA.","DOI":"10.1145\/2090236.2090262"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Smart, N.P., and Vercauteren, F. (2010, January 26\u201328). Fully homomorphic encryption with relatively small key and ciphertext sizes. Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography (PKC\u201910), Paris, France.","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/TEC.1959.5219515","article-title":"The residue number system","volume":"EC-8","author":"Garner","year":"1959","journal-title":"IRE Trans. Electron. Comput."},{"key":"ref_24","unstructured":"Gathen, J., and Gerhard, J. (2013). Modern Computer Algebra, Cambridge University Press. [3rd ed.]."},{"key":"ref_25","unstructured":"Ponti\u00e9, S., Bourge, A., Prost-Boucle, A., Maistri, P., Muller, O., Leveugle, R., and Rousseau, F. (September, January 31). HLS-based methodology for fast iterative development applied to Elliptic Curve arithmetic. Proceedings of the Euromicro\/IEEE Conference on Digital System Design (DSD), Limassol, Cyprus."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Mkhinini, A., Maistri, P., Leveugle, R., and Tourki, R. (2017, January 19\u201321). HLS design of a hardware accelerator for homomorphic encryption. Proceedings of the IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), Dresden, Germany.","DOI":"10.1109\/DDECS.2017.7934578"},{"key":"ref_27","unstructured":"Prost-Boucle, A. (2017, November 30). Augh Project. Available online: http:\/\/tima.imag.fr\/sls\/research-projects\/augh\/."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/9\/5\/114\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:03:41Z","timestamp":1760195021000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/9\/5\/114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,8]]},"references-count":27,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2018,5]]}},"alternative-id":["info9050114"],"URL":"https:\/\/doi.org\/10.3390\/info9050114","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2018,5,8]]}}}