Compact modular multiplier design for strong security capabilities in resource-limited Telehealth IoT devices

被引:1
作者
Ibrahim, Atef [1 ,2 ]
Gebali, Fayez [2 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Comp Engn Dept, Alkharj 16278, Saudi Arabia
[2] Univ Victoria, ECE Dept, Victoria, BC, Canada
关键词
IoT security; Telehealth IoT devices; IoT systems; Cyber physical security; Crypto processors; Modular multipliers; Systolic arrays; SYSTOLIC ARRAY ARCHITECTURE; DIGIT-SERIAL; GF(2(M)); INTERNET; THINGS;
D O I
10.1016/j.jksuci.2022.06.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Telehealth is an emerging model of delivering quality health to remote communities and stay-at-home users. This is motivated by the rising health care costs and by the benefits of many patients staying at home as opposed to extended hospital stays. Telehealth relies on IoT technology, but IoT devices present the weakest security link to the system. The challenge is to implement strong security capabilities in resource-limited IoT devices. This justifies the use of elliptic curve cryptography (ECC) over the other traditional and resource-consumed approaches such as RSA. Efficient modular multiplication is a basic operation needed for ECC systems. Therefore, the compact and efficient implementation of this operation will significantly affect the performance of ECC in resource-limited applications. This work presents a compact serial-in/serial-out word-based systolic implementation of modular multiplication. The proposed structure is derived using a formal and systematic technique for mapping regular iterative algorithms (RIA) onto processor arrays. The proposed methodology enables control of the processor array workload as well as the workload of each processing element. Controlling the processor word size allows control of system speed, latency, and area. The proposed processor structure saves area and energy consumption by a factor up to 96.3% and 98.5%, respectively.(c) 2022 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
引用
收藏
页码:6847 / 6854
页数:8
相关论文
共 39 条
[1]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[2]   Dual-Basis Superserial Multipliers for Secure Applications and Lightweight Cryptographic Architectures [J].
Bayat-Sarmadi, Siavash ;
Kermani, Mehran Mozaffari ;
Azarderakhsh, Reza ;
Lee, Chiou-Yng .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2014, 61 (02) :125-129
[3]   Pediatric Otolaryngology Telehealth in Response to COVID-19 Pandemic: Lessons Learned and Impact on the Future Management of Pediatric Patients [J].
Belcher, Ryan H. ;
Phillips, James ;
Virgin, Frank ;
Werkhaven, Jay ;
Whigham, Amy ;
Wilcox, Lyndy ;
Wootten, Christopher T. .
ANNALS OF OTOLOGY RHINOLOGY AND LARYNGOLOGY, 2021, 130 (07) :788-795
[4]   Scalable and systolic Montgomery multipliers over GF(2m) [J].
Chen, Chin-Chin ;
Lee, Chiou-Yng ;
Lu, Erl-Huei .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) :1763-1771
[5]  
Chen LH, 2011, INT J INNOV COMPUT I, V7, P1193
[6]   Concurrent error detection in Montgomery multiplication over GF(2m) [J].
Chiou, CW ;
Lee, CY ;
Deng, AW ;
Lin, JM .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (02) :566-574
[7]   Efficient systolic modular multiplier/squarer for fast exponentiation over GF(2m) [J].
Choi, Se-Hyu ;
Lee, Keon-Jik .
IEICE ELECTRONICS EXPRESS, 2015, 12 (11)
[8]   Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications [J].
Di Matteo, Stefano ;
Baldanzi, Luca ;
Crocetti, Luca ;
Nannipieri, Pietro ;
Fanucci, Luca ;
Saponara, Sergio .
ENERGIES, 2021, 14 (15)
[9]   "A decade's worth of work in a matter of days": The journey to telehealth for the whole population in Australia [J].
Dykgraaf, Sally Hall ;
Desborough, Jane ;
de Toca, Lucas ;
Davis, Stephanie ;
Roberts, Leslee ;
Munindradasa, Ashvini ;
McMillan, Alison ;
Kelly, Paul ;
Kidd, Michael .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2021, 151 (151)
[10]   Multifactor authentication scheme using physically unclonable functions [J].
Fakroon, Moneer ;
Gebali, Fayez ;
Mamun, Mohammad .
INTERNET OF THINGS, 2021, 13