skip to main content
10.1145/1366230.1366272acmconferencesArticle/Chapter ViewAbstractPublication PagescfConference Proceedingsconference-collections
research-article

Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture

Published: 05 May 2008 Publication History

Abstract

Starting with the implantable pacemaker, microelectronic implants have been around for more than 50 years. A plethora of commercial and research-oriented devices have been developed so far for a wide range of biomedical applications. In view of an envisioned expanding implant market in the years to come, our ongoing research work is focusing on the specification and design of a novel biomedical microprocessor core, carefully tailored to a large subset of existing and future biomedical applications. Towards this end, we have taken steps in identifying various tasks commonly required by such applications and profiling their behavior and requirements. One such task is decryption of incoming commands to an implant and encryption of outgoing (telemetered) biological data. Secure bidirectional information relaying in implants has been largely overlooked so far although protection of personal (biological) data is very crucial. In this context, we evaluate a large number of symmetric (block) ciphers in terms of various metrics: average and peak power consumption, total energy budget, encryption rate and efficiency, program-code size and security level. For our study we use XTREM, a performance and power simulator for Intel's XScale embedded processor. Findings indicate the best-performing ciphers across most metrics to be MISTY1 (scores high in 5 out of 6 imposed metrics), IDEA and RC6 (both present in 4 out of 6 metrics). Further profiling of MISTY1 indicates a clear dominance of load/store, move and logic-operation instructions which gives us explicit directions for designing the architecture of our novel processor.

References

[1]
3-WAY, BLOWFISH, DES, GOST, IDEA, RC5 source code. www.cis.udel.edu/~mills/database/schneier/.
[2]
SKIPJACK, LOKI91 source code. www.mirrors.wiretapped.net/security/cryptography/algorithms/skipjack/.
[3]
University of Michigan, Sim-Panalyzer 2.0. http://www.eecs.umich.edu/~panalyzer/.
[4]
Austin, T., Larson, E., and Ernst, D. SimpleScalar: an infrastructure for computer system modeling. IEEE Computer 35, 2 (February 2002), p. 59--67.
[5]
Berkman, J., and Prak, J. Biomedical microprocessor with analog I/O. In IEEE International Solid-State Circuits Conference - Digest of Technical Papers (19 February 1981), p. 168--169.
[6]
Brooks, D., Tiwari, V., and Martonosi, M. Wattch: A Framework for Architectural-Level Power Analysis and Optimizations. In ISCA?00 (2000), p. 83--94.
[7]
Burger, D., and Austin, T. The SimpleScalar tool set, version 2.0. ACM SIGARCH Computer Architecture News 25, 3 (June 1997), p. 13--25.
[8]
Chang, C.-C., Muftic, S., and Nagel, D. Measurement of energy costs of security in wireless sensor nodes. In 16th International Conference on Computer Communications and Networks (ICCCN) (2007), p. 95--102.
[9]
Chang, C.-C., Muftic, S., and Nagel, D. Measurement of energy costs of security in wireless sensor nodes. In 16th International Conference on Computer Communications and Networks (ICCCN) (2007), p. 95--102.
[10]
Chang, C.-C., Muftic, S., and Nagel, D. Measurement of energy costs of security in wireless sensor nodes. In 16th International Conference on Computer Communications and Networks (ICCCN) (2007), p. 95--102.
[11]
Chang, C.-C., Muftic, S., and Nagel, D. Measurement of energy costs of security in wireless sensor nodes. In 16th International Conference on Computer Communications and Networks (ICCCN) (2007), p. 95--102.
[12]
Ector, H., and Vardas, P. Current use of pacemakers, implantable cardioverter defibrillators, and resynchronization devices: data from the registry of the european heart rhythm association. European Heart Journal Supplements 9 (August 1988), p. 144--149.
[13]
Flick, B., and Orglmeister, R. A portable microsystem-based telemetric pressure and temperature measurement unit. In IEEE Transactions on Biomedical Engineering (Jan. 2000), vol. 47, p. 12--16.
[14]
Gaubatz, G., Kaps, J.-P., and Sunar, B. Public key cryptography in sensor networks - revisited. In Lecture Notes in Computer Science (2005), p. 2--18.
[15]
Grossschadl, J., Tillich, S., Rechberger, C., Hofmann, M., and Medwed, M. Energy evaluation of software implementations of block ciphers under memory constraints. In Conference on Design, automation and test in Europe (2007), p. 1110--1115.
[16]
Harrigal, C., and Walters, R. The development of a microprocessor controlled implantable device. In IEEE Proceedings of the 1990 Sixteenth Annual Northeast Bioengineering Conference (Mar. 1990), p. 137--138.
[17]
Intel Corporation. Intel XScale Microarchitecture for the PXA255 Processor: User?s Manual, March 2003.
[18]
Jeong, Y.-S., and Lee, S.-H. Hybrid key establishment protocol based on ecc for wireless sensor network. Lecture Notes in Computer Science 4611 (August 2007), p. 1233--1242.
[19]
Law, Y., Dourmen, J., and Hartel, P. Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks 2 (February 2006), p. 65--93.
[20]
Lenstra, A., and Verheul, E. Selecting cryptographic key sizes. Journal of Cryptology: the journal of the International Association for Cryptologic Research 14, 4 (2001), p. 255--293.
[21]
Lenstra, A., and Verheul, E. Selecting cryptographic key sizes. Journal of Cryptology: the journal of the International Association for Cryptologic Research 14, 4 (2001), p. 255--293.
[22]
Min, M., Parve, T., Kukk, V., and Kuhlberg, A. An implantable analyzer of bio-impedance dynamics - mixed signal approach. In IEEE Instrumentation and Measurement (Budapest, Hungary, 21-23 May 2001), p. 38--43.
[23]
Sawan, M., Robin, S., Provost, B., Eid, Y., and Arabi, K. A wireless implantable electrical stimulator based on two FPGAs. In Proceedings of the IEEE International Conference on Electronic Circuits and Systems (ICECS) (Piscataway, New Jersey, USA, 1996), vol. 2, p. 1092--1095.
[24]
Schwarz, M., Ewe, L., Hauschild, R., Hosticka, B., Huppertz, J., Kolnsberg, S., Mokwa, W., and Trieu, H. Single chip CMOS imagers and flexible microelectronic stimulators for a retina implant system. In Sensors and Actuators A: Physical (22 May 2000), vol. 83, p. 40--46.
[25]
Shults, M., Rhodes, R., Updike, S., Gilligan, B., and Reining, W. A telemetry-instrumentation system for monitoring multiple subcutaneously implanted glucose sensors. In IEEE Transactions on Biomedical Engineering (Oct. 1994), vol. 41, p. 937--942.
[26]
Smith, B., Tang, Z., Johnson, M., Pourmehdi, S., Gazdik, M., Buckett, J., and Peckham, P. An externally powered, multichannel, implantable stimulator-telemeter for control of paralyzed muscle. In IEEE Transactions on Biomedical Engineering (1998), vol. 45, p. 463--475.
[27]
Strydis, C., Gaydadjiev, G., and Vassiliadis, S. Implantable microelectronic devices: A comprehensive review. CE-TR-2006-01, Computer Engineering, Delft University of Technology, December 2006.
[28]
Valdastri, P., Menciassi, A., Arena, A., Caccamo, C., and Dario, P. An implantable telemetry platform system for in vivo monitoring of physiological parameters. In IEEE Transactions on Information Technology in Biomedicine (Sept. 2004), vol. 8, p. 271--278.
[29]
Venugopalan, R., Ganesan, P., Peddabachagari, P., Dean, A., Mueller, F., and Sichitiu, M. Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. In International Conference on Compilers, Architecture and Synthesis for Embedded Systems (2003), p. 188--197.
[30]
Wander, A., Gura, N., Eberle, H., Gupta, V., and Shantz, S. Energy analysis of public-key cryptography for wireless sensor networks. In 3rd IEEE International Conference on Pervasive Computing and Communications (2005), p. 324--328.
[31]
Wander, A., Gura, N., Eberle, H., Gupta, V., and Shantz, S. Energy analysis of public-key cryptography for wireless sensor networks. In 3rd IEEE International Conference on Pervasive Computing and Communications (2005), p. 324--328.
[32]
Wander, A., Gura, N., Eberle, H., Gupta, V., and Shantz, S. Energy analysis of public-key cryptography for wireless sensor networks. In 3rd IEEE International Conference on Pervasive Computing and Communications (2005), p. 324--328.
[33]
Wouters, P., Cooman, M. D., Lapadatu, D., and Puers, R. A low power multi-sensor interface for injectable microprocessor-based animal monitoring system. In Sensors and Actuators A: Physical (1994), vol. 41-42, p. 198--206.

Cited By

View all
  • (2023)On the Implementation of Data Security for Neurostimulation Devices2023 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS46773.2023.10181903(1-5)Online publication date: 21-May-2023
  • (2020)Evaluating Cryptographic Performance of Raspberry Pi Clusters2020 IEEE High Performance Extreme Computing Conference (HPEC)10.1109/HPEC43674.2020.9286247(1-9)Online publication date: 22-Sep-2020
  • (2018)Smart HealthcareFoundations and Trends in Electronic Design Automation10.1561/100000005412:4(401-466)Online publication date: 30-May-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CF '08: Proceedings of the 5th conference on Computing frontiers
May 2008
334 pages
ISBN:9781605580777
DOI:10.1145/1366230
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 May 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. implantable devices
  2. microarchitectural profiling
  3. symmetric encryption
  4. ultra-low power

Qualifiers

  • Research-article

Conference

CF '08
Sponsor:
CF '08: Computing Frontiers Conference
May 5 - 7, 2008
Ischia, Italy

Acceptance Rates

Overall Acceptance Rate 273 of 785 submissions, 35%

Upcoming Conference

CF '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)On the Implementation of Data Security for Neurostimulation Devices2023 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS46773.2023.10181903(1-5)Online publication date: 21-May-2023
  • (2020)Evaluating Cryptographic Performance of Raspberry Pi Clusters2020 IEEE High Performance Extreme Computing Conference (HPEC)10.1109/HPEC43674.2020.9286247(1-9)Online publication date: 22-Sep-2020
  • (2018)Smart HealthcareFoundations and Trends in Electronic Design Automation10.1561/100000005412:4(401-466)Online publication date: 30-May-2018
  • (2017)Ideas and Challenges for Securing Wireless Implantable Medical Devices: A ReviewIEEE Sensors Journal10.1109/JSEN.2016.263397317:3(562-576)Online publication date: 1-Feb-2017
  • (2013)A system architecture, processor, and communication protocol for secure implantsACM Transactions on Architecture and Code Optimization10.1145/2541228.255531310:4(1-23)Online publication date: 1-Dec-2013
  • (2013)Survey and comparison of message authentication solutions on wireless sensor networksAd Hoc Networks10.1016/j.adhoc.2012.08.01111:3(1221-1236)Online publication date: 1-May-2013
  • (2012)Architecture-level fault-tolerance for biomedical implants2012 International Conference on Embedded Computer Systems (SAMOS)10.1109/SAMOS.2012.6404163(104-112)Online publication date: Jul-2012
  • (2010)ImpBench revisited: An extended characterization of implant-processor benchmarks2010 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation10.1109/ICSAMOS.2010.5642073(126-135)Online publication date: Jul-2010
  • (2009)Evaluating Various Branch-Prediction Schemes for Biomedical-Implant Processors2009 20th IEEE International Conference on Application-specific Systems, Architectures and Processors10.1109/ASAP.2009.37(169-176)Online publication date: Jul-2009
  • (2008)Profiling of lossless-compression algorithms for a novel biomedical-implant architectureProceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis10.1145/1450135.1450160(109-114)Online publication date: 19-Oct-2008
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media