Abstract
The Internet of Medical Things (IoMTs) are the group of medical devices connected to Internet, to perform the processes and services that support healthcare. The amount of data handled by medical devices grows exponentially, which means higher exposure of personal sensitive data. RSA, ECC and, other related public key cryptographic systems with countermeasures of power analysis and fault analysis, e.g., random masking, are often adapted by medical devices for guaranteing security and privacy. However, Shor algorithm has proven that they are not secure to quantum computer attacks. Fortunately, there exists a few quantum-resistant public key cryptographic schemes, e.g., Rainbow. To ensure end-to-end service delivery in the IoMTs under quantum attacks, there is a critical need for research into new designs and evaluation for the hardware security of new quantum-resistance cryptographic systems, e.g., rainbow, to make the medical devices more secure and reliable. Therefore, we present a physical analysis model of Rainbow by combining fault analysis and differential power analysis. The proposed model is implemented on cloud computing platform. Based on the experimental results, we successfully recover all the secret keys of Rainbow signature, which shows the importance of protecting multivariate signature with countermeasures on medical devices.




Similar content being viewed by others
References
Musavi SHA, Chowdhry BS, Kumar T et al (2015) Iots enable active contour modeling based energy efficient and thermal aware object tracking on FPGA[j]. Wirel Pers Commun 85(2):529–543
Aslam S, Hasan NU, Ju WJ et al (2046) Optimized energy harvesting, cluster-head selection and channel allocation for IoTs in smart Cities[J]. Sensors 16(12):2016
Guo J (2017) Smartphone-powered electrochemical biosensing dongle for emerging medical IoTs application[J]. IEEE Trans Ind Inf PP(99):1–1
Sharma V, Kumar R, Kaur R (2017) UAV-Assisted content-based sensor search in IoTs[J]. Electron Lett 53(11):724–726
Tahir Y, Yang S, Mccann JA (2017) BRPL: Backpressure RPL for High-throughput and mobile IoTs[J]. IEEE Trans Mob Comput PP(99):1–1
Saeed A, Ahmadinia A, Javed A et al (2016) Intelligent intrusion detection in low-power IoTs[J]. ACM Trans Internet Technol 16(4):27
Khalfi B, Hamdaoui B, Guizani M (2017) Extracting and exploiting inherent sparsity for efficient IoT support in 5G challenges and potential solutions[J]. IEEE Wirel Commun 24(5):68–73
Shin D, Hwang Y (2017) Integrated acceptance and sustainability evaluation of internet of medical things: a dual-level analysis[J]. Internet Res 27(9):00–00
Swift A (2015) 4 security threats to the internet of things[J]. Chin J Integr Med 21(2):102–107
Suciu G, Suciu V, Martian A et al (2015) Big data, internet of things and cloud Convergence—an architecture for secure E-Health Applications[J]. J Med Syst 39(11):141
Khan Y, Ostfeld AE, Lochner CM et al (2016) Monitoring of vital signs with flexible and wearable medical Devices[J]. Adv Mater 28(22):4373
Sametinger J, Rozenblit J, Lysecky R et al (2015) Security challenges for medical devices[J]. Commun ACM 58(4):74–82
Ivlev I, Vacek J, Kneppo P (2015) Multi-criteria decision analysis for supporting the selection of medical devices under uncertainty[J]. Eur J Oper Res 247(1):216–228
Camara C, Peris-Lopez P, Tapiador JE (2015) Security and privacy issues in implantable medical devices—a comprehensive survey[J]. J Biomed Inform 55(C):272
Tanev G, Tzolov P, Apiafi R (2015) A value blueprint approach to cybersecurity in networked medical Devices[J]. Mol Ther 5(6):17–25
Anderson S, Williams T (2017) Cybersecurity and medical devices: Are the ISO/IEC 80001-2-2 technical controls up to the Challenge?[J]. Computer Standards & Interfaces
Tang W, Jia S, Wang Y (2016) A short-time three-phase single-rail precharge logic against differential power analysis[J]. IEICE Trans Electron E99.C(8):956–962
Sarkar S, Banik S, Maitra S (2015) Differential fault attack against grain family with very few faults and minimal assumptions[J]. IEEE Trans Comput 64(6):1647–1657
Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332
Bernstein DJ, Lange T (2017) Post-quantum cryptography[J]. Nature 549(7671):188
Peng Z, Tang S (2017) Circulant rainbow: a new rainbow variant with shorter private key and faster signature generation[J]. IEEE Access PP(99):1–1
Ding J, Petzoldt A (2017) Current state of multivariate Cryptography[J]. IEEE Secur Priv 15(4):28–36
Tan Y, Tang S, Chen J et al (2016) Building a new secure variant of Rainbow signature scheme[J]. IET Inf Secur 10(2):53–59
Tan Y, Tang S, Wang T (2015) Adding variables variation to Rainbow - like scheme to enhance its security level against MinRank attack[J]. Security & Communication Networks 7(12):2326–2334
Takuya S, Tsukasa I, Shinsaku K et al (2014) Parallel implementation of multivariate public key cryptosystem rainbow using web Workers[J]. Ipsj Journal 55:2061–2071
Sumi T, Ishiguro T, Kiyomoto S et al (2014) Efficient implementation of multivariate public key cryptosystem rainbow on android mobile Phone[J]. Transactions of the Institute of Electronics Information & Communication Engineers A 97 :86–95
Shang PN, Gao ZL (2014) An authentication scheme based on the Light-Weight rainbow signature for wireless sensor Network[J]. Appl Mech Mater 519-520(21):185–188
Yi H, Tang S (2016) Very small FPGA processor for multivariate signatures[J] . Comput J 59(7):1091–1101. https://doi.org/10.1093/comjnl/bxw008
Yi H, Li W (2017) On the importance of checking multivariate public key cryptography for side-channel attacks: the case of enTTS Scheme[J]. Comput J 60(8):1197–1209. https://doi.org/10.1093/comjnl/bxx010
Marzouqi H, Al-Qutayri M, Salah K (2014) Review of gate-level differential power analysis and fault analysis countermeasures[J]. IET Inf Secur 8(1):51–66
Qu B, Gu D, Guo Z et al (2013) Differential power analysis of stream ciphers with LFSRs[j]. Computers & Mathematics with Applications 65(9):1291–1299
Souvignet T, Frinken J (2013) Differential power analysis as a digital forensic tool.[J]. Forensic Sci Int 230 (1C3):127–136
Avital M, Dagan H, Keren O et al (2015) Randomized multitopology logic against differential power Analysis[J]. IEEE Transactions on Very Large Scale Integration Systems 23(4):702–711
Mahanta HJ, Azad AK, Khan AK (2015) Differential power analysis: attacks and resisting techniques[J]. Adv Intell Syst Comput 340:349–358
Zhang JY, Jia H, Pang L (2014) The differential power analysis against AES based on template attack[J]. Information Security & Technology 76(13):1439–46
Lang LI, Ren-Fa LI, Ken-Li LI et al (2014) Differential power analysis attacks on PRESENT[j]. Application Research of Computers
Wang FY, Chen BT, Liu JF et al (2014) Chosen plaintext and second-order differential power analysis combination attack on masked AES[j]. Journal of Cryptologic Research
Tang W, Jia S, Wang Y (2016) A short-time three-phase single-rail precharge logic against differential power analysis[J]. Ieice Transactions on Electronics E99.C(8):956–962
Rajaram M, Vijaya J (2014) A defense mechanism for differential power analysis attack in AES[j]. J Comput Sci 11(2):291– 296
Masoumi M, Rezayati MH, Shi W (2015) An experimental setup for practical differential electromagnetic and power analysis of AES cryptosystem[J]. Int J Internet Technology and Secured Transactions 6(1):9–24
Acknowledgements
The authors acknowledge Shenzhen Science and Technology Program under Grant (No. JCYJ20170306144219159, No. JCYJ20160428092427867), Foundation for Distinguished Young TalentsinHigherEducationof Guangdong, China (No. 2017GkQNCX059), Special Funds for Shenzhen Strategic Emerging Industries and Future Industrial Development (No. 20170502142224600), Science and Technology Program of Shenzhen Polytechnic (No. 601722K20018).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yi, H., Nie, Z. On the security of MQ cryptographic systems for constructing secure Internet of medical things. Pers Ubiquit Comput 22, 1075–1081 (2018). https://doi.org/10.1007/s00779-018-1149-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-018-1149-y