ABSTRACT
In this fast moving world, every industry is advanced by a new technological paradigm called Internet of Things (IoT). It offers interconnectivity between the digital and the real world which will swiftly transform the style of doing business. It opens up a wide-ranging new array of dynamic opportunities in all industries and is fuelling innovation in every part of life. Due to the constrained nature of the devices in IoT environment, it is difficult to execute complex data encryption algorithms to enhance the security. Moreover, computation overhead caused by the existing cryptographic security algorithms is heavy and has to be minimized. To overcome these challenges, this paper presents the security analysis of the lightweight block cipher SAT_Jo to ensure the data security in healthcare Internet of Things. It is based on SPN structure and runs for 31 rounds. It encrypts 64-bits of block length with key of 80 bits. Cadence NC-Verilog 5.1 is used for simulation and Cadence Encounter RTL Compiler v10.1 for synthesis. The implementations are synthesized for UMC 90 nm low-leakage Faraday library from technology libraries. Moreover, the proposed SAT_Jo block cipher withstands in various attacks such as differential attack, linear attack and algebraic attack in healthcare IoT environment.
- William Stallings, "Network Security Essentials (Applications and Standards)" Pearson Education, 2004, pp. 2--80.Google Scholar
- Lee I and Lee K, "The Internet of Things (IoT): Applications, investments and challenges for enterprises", Business Horizons, 2015, pp. 1--10, DOI: 10.1016/j.bushor.2015.03.008.Google Scholar
- Charles P. Pfleeger, Shari Lawrence Pfleeger, "Security in Computing", Pearson Education 2004 pp. 642--666.Google Scholar
- S. Santiago and L. Arockiam, "Energy Efficiency in Internet of Things: An Overview", International Journal of Recent Trends in Engineering & Research (IJRTER), Volume 2, 2016, pp. 475--482.Google Scholar
- Muhammad Usman, Irfan Ahmedy, M. Imran Aslamy, Shujaat Khan and Usman Ali Shah, "SIT: A Lightweight Encryption Algorithm for Secure Internet of Things", International Journal of Advanced Computer Science and Applications, Volume 8, Issue 1, 2017, pp. 1--10.Google ScholarCross Ref
- Wei Li, Wenwen Zhang, Dawu Gu, Zhi Tao, Zhihong Zhou, Ya Liu and Zhiqiang Liu, "Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things", KSII Transactions on Internet and Information Systems Volume 9, Issue. 1, 2015, pp. 793--810.Google ScholarCross Ref
- Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer and Eric M. Smith, "The Hummingbird-2 Lightweight Authenticated Encryption Algorithm", Lecture Notes in Computer Science, Volume 7055, 2011, pp. 19--31. DOI: https://doi.org/10.1007/978-3-642-25286-0_2Google ScholarDigital Library
- Wenling Wu and Lei Zhang, "LBlock: A Lightweight Block Cipher", Lecture Notes in Computer Science, Volume 6715, 2011, pp 327--344Google Scholar
- Shantha Mary Joshitta R and Arockiam L, "SAT_Jo: An enhanced Lightweight Block Cipher for the Internet of Things", IEEE International Conference on Intelligent Computing and Control Systems - ICICCS 2018, Madurai, India on 14--15, June, 2018, 10.1109/ICCONS.2018.8663068Google ScholarCross Ref
- Serge Mister and Carlisle Adams, "Practical S-Box Design", Nortel, 1997, pp. 1--17.Google Scholar
- Biryukov A and Perrin L, "State of the Art in Lightweight Symmetric Cryptography", Cryptology ePrint Archive, 2017, pp. 1--55.Google Scholar
- Jaber Hosseinzadeh and Maghsoud Hosseinzadeh, "A Comprehensive Survey on Evaluation of Lightweight Symmetric Ciphers: Hardware and Software Implementation", International Journal of Advances in Computer Science, Volume 5, Issue 4, 2016, pp. 31--41.Google Scholar
- Tay J. J, Wong M. L. D, Wong M. M, Zhang C and Hijazin I, "Compact FPGA implementation of PRESENT with Boolean S-Box", In the Proc. of the 6th Asia Symposium on Quality Electronic Design (ASQED), 2015, pp. 144--148, DOI: 10.1109/acqed.2015.7274024.Google ScholarCross Ref
- National Institute of Standards and Technology (NIST), "Advanced Encryption Standard (AES)", Federal information processing standards publication 197, November 26, 2001, Available at: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.Google Scholar
- Biham E and Shamir A, "Differential Cryptanalysis of the Data Encryption Standard", Springer-Verlag, 1993, pp. 1--188.Google ScholarCross Ref
- Biham E and Shamir A, "Differential cryptanalysis of DES-like Cryptosystems", Journal of Cryptology, Volume 4, Issue 1, 1991, pp. 3--72Google ScholarDigital Library
- Matsui M, "Linear cryptanalysis method for DES cipher In Advances in Cryptology", Springer-Verlag, Lecture Notes in Computer Science, Volume 765, 1994, pp. 386--397.Google ScholarCross Ref
- Chabaud F and Vaudenay S, "Links between Differential and Linear Cryptanalysis", Advances in Cryptology, Lecture Notes in Computer Science, Springer-Verlag, Volume 950, 1995, pp. 356--365.Google ScholarCross Ref
- Engels D, M. J. O. Saarinen and E. M. Smith, "The Hummingbird-2 lightweight authenticated encryption algorithm", Lecture Notes in Computer Science, Volume 7055, Springer, 2012, pp. 19--31, DOI: 10.1007/978-3-642-25286-0_2.Google ScholarDigital Library
- Albrecht M and Cid C, "Algebraic techniques in differential cryptanalysis", In the proc. of the FSE 2009, LNCS, Volume 5665, 2009, pp.193--208.Google Scholar
- R. Shantha Mary Joshitta and L. Arockiam, "Key Generation Algorithm using Soft Set for Data Security in Internet of Things", Proceedings of 3rd International Conference on Internet of Things, 2018, pp. 367--372.Google ScholarCross Ref
- R. Shantha Mary Joshitta and L. Arockiam, "Security in IoT Environment: A Survey", International Journal of Information Technology and Mechanical Engineering, Volume 2, No.7, 2016, pp. 1--8.Google Scholar
Index Terms
- Security Analysis of SAT_Jo Lightweight Block Cipher for Data Security in Healthcare IoT
Recommendations
Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
Advanced Computer Mathematics based Cryptography and Security TechnologiesBiclique cryptanalysis is an attack that improves the computational complexity by finding a biclique which is a kind of bipartite graph. We present a single-key full-round attack of lightweight block ciphers, HIGHT and Piccolo by using biclique ...
Cryptanalysis of mCrypton—A lightweight block cipher for security of RFID tags and sensors
mCrypton is a 64-bit lightweight block cipher designed for use in low-cost and resource-constrained applications such as RFID tags and sensors in wireless sensor networks. In this paper, we investigate the strength of this cipher against related-key ...
Healthcare Internet of Things (HIoT) data security enhancement using blockchain technology
In recent years, the Internet of Things (IoT) has attracted more attention after the integration of IoT devices with the cloud for data management. IoT is used for sharing data in healthcare services. However, security and privacy vulnerabilities still ...
Comments