Obfuscated AES cryptosystem for secure medical imaging systems in IoMT edge devices

被引:7
作者
Chhabra, Surbhi [1 ]
Lata, Kusum [1 ]
机构
[1] LNM Inst Informat Technol, Dept Elect & Commun Engn, Jaipur 302031, Rajasthan, India
关键词
AES; Medical imaging systems; Hardware obfuscation; Hardware-software co-design; Internet of Medical Things; PUF; TRNG; Xilinx System Generator; ZedBoard; ENCRYPTION;
D O I
10.1007/s12553-022-00686-3
中图分类号
R-058 [];
学科分类号
摘要
Internet of Medical Things (IoMT) driven health is the most advantageous aspect of technology in the global healthcare industry. Incorporating personalized health data into the formal multimedia electronic health record has tremendous potential to enhance personalized healthcare. The transition from medical data paperwork to health records increases legibility, reduces the in-hospital congestion services, performs remote patient monitoring. Hence, the secure exchange of health records to the cloud is paramount. Many cryptography schemes provide peer-to-peer communication by ensuring health record confidentiality and integrity over public networks. This paper presents an effective and scalable Advanced Encryption Standard (AES) cryptosystem to ensure better resistance against well-acknowledged attacks and secure the health record, specifically medical imaging, successfully before transmission. The main contribution of this paper is to build a secure hardware-software co-design of a scalable and reconfigurable medical imaging processing system by integrating authentication-based approaches such as PUF and TRNG to the AES cryptosystem on ZedBoard with minimum possible overhead. Simulation and experimental results in terms of statistical tests, PUF evaluation metrics, authentication, and NIST analysis illustrate the efficacy of the proposed system. Furthermore, we have employed a threat model, analyzed several hardware attacks such as reverse engineering, side-channel attacks, differential attacks, key-sensitivity attacks, etc., and conducted an in-depth security evaluation to show the robustness and attack resiliency of our proposed medical imaging processing system.
引用
收藏
页码:971 / 986
页数:16
相关论文
共 37 条
[1]   A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine [J].
Abd-Eldayem, Mohamed M. .
EGYPTIAN INFORMATICS JOURNAL, 2013, 14 (01) :1-13
[2]   TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions [J].
Aghaie, Anita ;
Moradi, Amir .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :3470-3481
[3]  
Alassaf N., 2003, ARABIA
[4]   Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications [J].
Alassaf, Norah ;
Gutub, Adnan .
INTERNATIONAL JOURNAL OF E-HEALTH AND MEDICAL COMMUNICATIONS, 2019, 10 (04) :1-15
[5]  
Amaki T, 2011, IEEE INT SYMP CIRC S, P725
[6]  
[Anonymous], 2012, INT J DIGIT CONTENT
[7]  
[Anonymous], 2018, J Res Eng Appl Sci
[8]   An image encryption method based on chaos system and AES algorithm [J].
Arab, Alireza ;
Rostami, Mohammad Javad ;
Ghavami, Behnam .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (10) :6663-6682
[9]  
Basiri M. M. A., 2018, INT S VLSI DES TEST, P3
[10]  
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103, DOI DOI 10.1145/1655008.1655024