Encrypting the File System on a Single-Board Computers Platform and Using Linux Unified Key Setup with Physical Access Keys

dc.citation.epage133
dc.citation.issue2
dc.citation.journalTitleДосягнення у кіберфізичних системах
dc.citation.spage128
dc.citation.volume9
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.affiliationSuez Canal University
dc.contributor.authorOnishchenko, Bohdan
dc.contributor.authorBanakh, Roman
dc.contributor.authorAbdallah A. Z. A. Ibrahim
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2025-11-06T08:48:13Z
dc.date.created2024-02-27
dc.date.issued2024-02-27
dc.description.abstractThe object of the research is the security of the file system of a single-board platform. As part of the research reported in this paper, a method has been proposed to protect the file system using encryption. Implementing a Linux Unified Key Setup paired with a password or Universal Serial Bus key has been demonstrated. The advantages of Linux Unified Key Setup for this task and the possibilities for system configuration and encryption method depending on the use case and hardware configuration has been outlined. As a result, the administrator of a single-board computer can store and work with sensitive information in a more secure environment. This will allow the user to be sure that their private information will not be accessible in case of theft or attempted hacking of the device.
dc.format.extent128-133
dc.format.pages6
dc.identifier.citationOnishchenko B. Encrypting the File System on a Single-Board Computers Platform and Using Linux Unified Key Setup with Physical Access Keys / Bohdan Onishchenko, Roman Banakh, Abdallah A. Z. A. Ibrahim // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2024. — Vol 9. — No 2. — P. 128–133.
dc.identifier.citationenOnishchenko B. Encrypting the File System on a Single-Board Computers Platform and Using Linux Unified Key Setup with Physical Access Keys / Bohdan Onishchenko, Roman Banakh, Abdallah A. Z. A. Ibrahim // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2024. — Vol 9. — No 2. — P. 128–133.
dc.identifier.doidoi.org/10.23939/acps2024.02.128
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/117386
dc.language.isoen
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofДосягнення у кіберфізичних системах, 2 (9), 2024
dc.relation.ispartofAdvances in Cyber-Physical Systems, 2 (9), 2024
dc.relation.references[1] LUKS On-Disk Format Specification. Available at: https://gitlab.com/cryptsetup/cryptsetup/-/wikis/LUKS-standard/on-disk-format.pdf (accessed on 14 October 2024).
dc.relation.references[2] Linux Unified Key Setup (LUKS) Disk Encryption Available at: https://wiki.archlinux.org/title/Dm-crypt/Encrypting_an_entire_system (accessed on 14 October 2024).
dc.relation.references[3] Optimized Implementation of Argon2 Utilizing the Graphics Processing Unit. 10.48550/arXiv.1602.03097. Iuorio, Andrea & Visconti, Andrea (2019). Understanding Optimizations and Measuring Performances of PBKDF2. 10.3390/app13169295
dc.relation.references[4] Lee, Sung-Won & Sim, Kwee-Bo (2021). Design and Hardware Implementation of a Simplified DAG-Based Blockchain and New AES-CBC Algorithm for IoT Security. Electronics, 10. 1127. 10.3390/electronics10091127.
dc.relation.references[5] Cano Quiveu, German & Ruiz-de-clavijo-Vazquez, Paulino & Bellido, Manuel & Juan-Chico, Jorge & Viejo Cortes, Julian & Guerrero, David & Ostúa, Enrique (2021). Embedded LUKS (E-LUKS): A Hardware Solution to IoT Security. Electronics, 10, 3036. 10.3390/electronics10233036.
dc.relation.references[6] Performance Analysis of Encryption Algorithms in Named Pipe Communication for Linux Systems. 10.55549/epstem.1518789
dc.relation.references[7] Saleh, Shaimaa & Al-Awamry, Amr & Taha, Ahmed (2024). Tailoring AES for resource-constrained IoT devices. Indonesian Journal of Electrical Engineering and Computer Science, 36, 290. 10.11591/ijeecs.v36.i1.pp290-301.
dc.relation.references[8] Parallel Implementations of ARX-Based Block Ciphers on Graphic Processing Units. 10.3390/math8111894
dc.relation.references[9] Banakh, Roman. (2018). Authentication method WPA/WPA2key parameters’ definition for IEEE 802.11 based honeypot. Radio Electronics, Computer Science, Control., 110–118. 10.15588/1607-3274-2018-1-13.
dc.relation.references[10] Raspberry PI Official Site. Available at: https://www.raspberrypi.com/ (accessed on 14 October 2024).
dc.relation.references[11] Byun, Hyeonsu & Kim, Jueun & Jeong, Yunseok & Seok, Byoungjin & Gong, Seonghyeon & Lee, Changhoon (2024). A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks. Electronics. 13. 2433. 10.3390/electronics13132433.
dc.relation.references[12] Proxy Nova – Password Brute Force Calculator. Available at: https://www.proxynova.com/tools/brute-force-calculator/ (accessed on 14 October 2024).
dc.relation.referencesen[1] LUKS On-Disk Format Specification. Available at: https://gitlab.com/cryptsetup/cryptsetup/-/wikis/LUKS-standard/on-disk-format.pdf (accessed on 14 October 2024).
dc.relation.referencesen[2] Linux Unified Key Setup (LUKS) Disk Encryption Available at: https://wiki.archlinux.org/title/Dm-crypt/Encrypting_an_entire_system (accessed on 14 October 2024).
dc.relation.referencesen[3] Optimized Implementation of Argon2 Utilizing the Graphics Processing Unit. 10.48550/arXiv.1602.03097. Iuorio, Andrea & Visconti, Andrea (2019). Understanding Optimizations and Measuring Performances of PBKDF2. 10.3390/app13169295
dc.relation.referencesen[4] Lee, Sung-Won & Sim, Kwee-Bo (2021). Design and Hardware Implementation of a Simplified DAG-Based Blockchain and New AES-CBC Algorithm for IoT Security. Electronics, 10. 1127. 10.3390/electronics10091127.
dc.relation.referencesen[5] Cano Quiveu, German & Ruiz-de-clavijo-Vazquez, Paulino & Bellido, Manuel & Juan-Chico, Jorge & Viejo Cortes, Julian & Guerrero, David & Ostúa, Enrique (2021). Embedded LUKS (E-LUKS): A Hardware Solution to IoT Security. Electronics, 10, 3036. 10.3390/electronics10233036.
dc.relation.referencesen[6] Performance Analysis of Encryption Algorithms in Named Pipe Communication for Linux Systems. 10.55549/epstem.1518789
dc.relation.referencesen[7] Saleh, Shaimaa & Al-Awamry, Amr & Taha, Ahmed (2024). Tailoring AES for resource-constrained IoT devices. Indonesian Journal of Electrical Engineering and Computer Science, 36, 290. 10.11591/ijeecs.v36.i1.pp290-301.
dc.relation.referencesen[8] Parallel Implementations of ARX-Based Block Ciphers on Graphic Processing Units. 10.3390/math8111894
dc.relation.referencesen[9] Banakh, Roman. (2018). Authentication method WPA/WPA2key parameters’ definition for IEEE 802.11 based honeypot. Radio Electronics, Computer Science, Control., 110–118. 10.15588/1607-3274-2018-1-13.
dc.relation.referencesen[10] Raspberry PI Official Site. Available at: https://www.raspberrypi.com/ (accessed on 14 October 2024).
dc.relation.referencesen[11] Byun, Hyeonsu & Kim, Jueun & Jeong, Yunseok & Seok, Byoungjin & Gong, Seonghyeon & Lee, Changhoon (2024). A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks. Electronics. 13. 2433. 10.3390/electronics13132433.
dc.relation.referencesen[12] Proxy Nova – Password Brute Force Calculator. Available at: https://www.proxynova.com/tools/brute-force-calculator/ (accessed on 14 October 2024).
dc.relation.urihttps://gitlab.com/cryptsetup/cryptsetup/-/wikis/LUKS-standard/on-disk-format.pdf
dc.relation.urihttps://wiki.archlinux.org/title/Dm-crypt/Encrypting_an_entire_system
dc.relation.urihttps://www.raspberrypi.com/
dc.relation.urihttps://www.proxynova.com/tools/brute-force-calculator/
dc.rights.holder© Національний університет “Львівська політехніка”, 2024
dc.rights.holder© Onishchenko B., Banakh R., Ibrahim A. A. Z. A., 2024
dc.subjectEncryption
dc.subjectAlgorithms
dc.subjectAccess control Authentication
dc.subjectIOT
dc.subjectData protection
dc.subjectPasswords
dc.subjectCybersecurity
dc.titleEncrypting the File System on a Single-Board Computers Platform and Using Linux Unified Key Setup with Physical Access Keys
dc.typeArticle

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
2024v9n2_Onishchenko_B-Encrypting_the_File_128-133.pdf
Size:
415.7 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
2024v9n2_Onishchenko_B-Encrypting_the_File_128-133__COVER.png
Size:
527.45 KB
Format:
Portable Network Graphics

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: