Cryptology ePrint Archive: Report 2015/529

Power Analysis Attacks against IEEE 802.15.4 Nodes

Colin O'Flynn and Zhizhang Chen

Abstract: IEEE 802.15.4 is a wireless standard used by a variety of higher-level protocols, including many used in the Internet of Things (IoT). A number of system on a chip (SoC) devices that combine a radio transceiver with a microcontroller are available for use in IEEE 802.15.4 networks. IEEE 802.15.4 supports the use of AES-CCM* for encryption and authentication of messages, and a SoC normally includes an AES accelerator for this purpose. This work measures the leakage characteristics of the AES accelerator on the Atmel ATMega128RFA1, and then demonstrates how this allows recovery of the encryption key from nodes running an IEEE 802.15.4 stack. While this work demonstrates the attack on a specific SoC, the results are also applicable to similar wireless nodes and to protocols built on top of IEEE 802.15.4.

Category / Keywords: implementation / AES, side-channel power analysis, DPA, IEEE 802.15.4

Original Publication (with major differences): Proceedings of COSADE 2016

Date: received 1 Jun 2015, last revised 10 Apr 2016

Contact author: coflynn at newae com

Available format(s): PDF | BibTeX Citation

Note: Update of paper - minor edits to extended version (extends COSADE 2016 paper)

Version: 20160411:033525 (All versions of this report)

Short URL: ia.cr/2015/529

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]