Need Help ?

Home / Expert Answers / Other / Description An article has been chose to demonstrate either theory or application of the use of Cry

Description An article has been chose to demonstrate either theory or application of the use of Cry ...


Description An article has been chose to demonstrate either theory or application of the use of Cryptographic techniques. The article has been approved by the professor. Once approved, you must study the article and write a term paper (in the given template, which can be found under the Resources section) covering the following points: Section 0 (Your name, student id, etc.) Section 1 (Introduction and motivation): What is the main contribution of the article? What is the problem the authors claim to address? What is the motivation behind addressing this problem? Section 2 (Proposed work): What solution the authors have proposed to solve this problem? How authors have established their claims -- what experiments they have performed and what are their results?  Section 3 (Discussion and future work): Do you see any weaknesses or shortcomings in the proposed solution that can be addressed in the future? If yes, please elaborate. If not, why?  Section 4 (References): List the references you came across in this study. The template for the term paper can be found on BB under the Resources section. You are also required to prepare a PowerPoint presentation addressing the above aspects 2 attachments Slide 1 of 2 attachment_1 attachment_1 attachment_2 attachment_2 UNFORMATTED ATTACHMENT PREVIEW A Project Demo Article March 31, 2023 Abstract My abstract begins here... It starts with.... It is going to be a wonderful document. 1 Introduction This is my first project, which will be great. This is my first project, which will be great. This is my first project, which will be great. This is going to be wonderful. This is my first project, which will be great [1]. 1.1 Need hdjksahdowwfnlkfdsnfld hdjksahdowwfnlkfdsnfld hdjksahdowwfnlkfdsnfld hdjksahdowwfnlkfdsnfld hdjksahdowwfnlkfdsnfld hdjksahdowwfnlkfdsnfld . 1.2 Motivating Scenarios These days, it is easy to find a capstone project [2]. It is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project [3]. It is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project [4]. This is illustrated in Figure 1. 1 Figure 1: This is Figure 2: This is my figure called Peer Exit 2 Literature Review This is my first project, which will be great. This is my first project, which will be great. This is my first project, which will be great [5]. This is my first project, which will be great. Based on the motivation provided in Section 1.2, we describe it as follows. 2.1 Works Based on Criteria 1 These days, it is easy to find a capstone project. It is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project it is easy to find a capstone project, as shown in Table 1. This is formulated in Equation (1). y = f (x) (1) As per equation 1, y is a function of x, as follows. n p X y= (xi 5)2 C+ i=1 n Y1 i=1 2 ( ? ? xi ) (2) z = Qn 1 i=1 ( 1 (3) ? ? xi ) Table 1: This is my new table Number Odd/Even 34 20 1 4 6 ? represents the even numbers Theorem 1. Given y = x, z = y ? x. Proof. We show that it is.... Lemma 2. Given that.... Proof. This is the proof. My solution has the following properties: • The individual entries are indicated with a black dot, a so-called bullet. • this is cool. • The text in the entries may be of the following lengths: 1. Even. 2. Odd. References [1] K. H. Rosen, Discrete Mathematics and Its Applications, 7th ed. McGraw-Hill Higher Education, 2011. [2] V. Patil, S. B. Parikh, and P. K. Atrey, “Geosecure-o: A method for secure distance calculation for travel mode detection using outsourced gps trajectory data,” in 2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM), 2019, pp. 348–356. [3] C. Berge, The?orie des graphes et ses applications. Impr. nouvelle), Paris, 1958. 3 Dunod (Orle?ans, [4] P. Atrey, “BrickHouse Security,” https://www.brickhousesecurity.com/ gps-trackers/, online; accessed 12 March 2021. [5] C. Berge, P. Atrey, and R. Mornan, “Two theorems in graph theory,” Proceedings of the National Academy of Sciences, vol. 43, no. 9, pp. 842–844, 1957. A Omitted Proof in Section 1 dhjskahdlkashflksdsadklsajfps 4 2022 IEEE International Symposium on Smart Electronic Systems (iSES) 2022 IEEE International Symposium on Smart Electronic Systems (iSES) | 979-8-3503-9922-6/22/$31.00 ©2022 IEEE | DOI: 10.1109/ISES54909.2022.00048 FPGA Based Light Weight Encryption of Medical Data for IoMT Devices using ASCON Cipher Kamal Raj Srinivasu Bodapati School of Computing and Electrical Engineering IIT Mandi, India kamalraj@ieee.org School of Computing and Electrical Engineering IIT Mandi, India srinivasu@iitmandi.ac.in Abstract—Internet of Things applications with various sensors in public network are vulnerable to cyber physical attacks. The technology of IoT in smart health monitoring systems popularly known as Internet of Medical Things (IoMT) devices. The rapid growth of remote telemedicine has witnessed in the post COVID era. Data collected over IoMT devices is sensitive and needs security, hence provided by enhancing a light weight encryption module on IoMT device. An authenticated Encryption with Associated Data is employed on the IoMT device to enhance the security to the medical wellness of patient. This paper presents FPGA-based implementation of ASCON-128, a light weight cipher for data encryption. A LUT6 based substitution box (SBOX) is implemented on FPGA as part of cipher permutation block. The proposed architecture takes 1330 number of LUTs, which is 35% less compared to the best existing design. Moreover, the proposed ASCON architecture has improved the throughput by 45% compared to the best existing design. This paper presents the results pertaining to encryption and decryption of medical data as well as normal images. Index Terms—ASCON,Encryption, Decryption, IoMT , Security, Smart health care systems provides the user interface for the authorised person like doctors to monitor the patient health and make decision in case of an emergency. The data communicated over a channel must be secure [7] since the sensor transferring the data pertaining to privacy of a person. The decision might be taken on arrival of some crucial data from IoT sensors and the data received over IoMT device must be authenticated. The IoT devices need security to avoid vulnerabilities or malfunctions in the data being recorded. IoMT devices require security to restrict them from any misuse and vulnerabilities. Hence, the research on Medical Cyber Physical Systems has grown rapidly [8]. Cryptographic primitives are a good choice to provide security to the IoT data. Since the IoT sensors have public access, encryption to the recorded data provides security by using encryption schemes such as authenticated encryption. Medical devices are portable, wearable, battery operated with low processing power and low memory. Hence, light weight encryption schemes are of primary interest for encrypting IoMT data. ASCON-128 is an authenticated encryption with associated data (AEAD) and it is one of the ?nalist of NIST lightweight cryptography competition. ASCON [9] is a light weight cryptography cipher. It uses 128-bit key for encryption and decryption, which is suitable for resource constraint device such as medical devices. I. I NTRODUCTION In smart cities, the networks with Internet of Things (IoT) devices collect the data from various sensors and transfer the data into a cloud storage. Billions of devices are already deployed to the Internet [1] to perform various tasks like remote monitoring and controlling in various applications. Sensors can be of various types and each sensor will have a different level of security as sensors are connected over a public network [2]. Similar to IoT devices, smart health monitoring devices are connected over Internet as Internet of Medical Things (IoMT) devices [3], [4]. Internet of Medical Things provides cost effective facility of transferring data to the cloud server over a network without the need of human computer interaction [5], [6]. The health monitoring devices can be connected either wired or wireless to the Internet. In the era of post COVID, the research on mobile health centers has grown rapidly where the data will be collected from various sensors and the recorded data is shared with trusted users such as hospitals over the Internet. These devices collect various parameters pertaining to the wellness of a person such as heart rate, blood pressure and glucose level. The collected data will be shared with the concerned persons over a secure channel. The post processing of the patient data can be performed in the cloud server. Cloud server has large processing power and larger memory for storage. A web or mobile application 979-8-3503-9922-6/22/$31.00 ©2022 IEEE DOI 10.1109/iSES54909.2022.00048  _x000e__x000f_     _x000e_ _x000f__x000f_   _x000f_ _x000e_    Fig. 1. Proposed Architecture of IoMT Fig. 1 shows the proposed architecture for IoMT device for smart health monitoring. This paper presents FPGA-based design of ASCON-128 for encrypting the medical data received over a IoMT device. The proposed design is implemented on Artix-7 Nexys 4 FPGA. The proposed architecture uses round-based architecture and the comparisons were given with round-based implementation of ASCON in [10]. The proposed ASCON consumes 1330 number of LUTs and saves the LUT 196 Authorized licensed use limited to: UNIVERSITY AT ALBANY SUNY. Downloaded on February 24,2023 at 20:31:19 UTC from IEEE Xplore. Restrictions apply. consumption by 35 % in comparison to the existing design in [10]. Moreover, the proposed ASCON-128 has a throughput of 457 Mbps while the best existing design has 315.2 Mbps [10]. The paper is organized as follows. Section II describes literature survey on Internet of Medical Things and smart health monitoring systems. Section III explains the construction of ASCON cipher. Section IV proposes the FPGA design of ASCON cipher. Experimental results and comparisons are presented in section V. Section VI concludes the paper.     _x001e_ _x001f__x000e_           _x000e__x000f_     _x000e__x000f_              _x000e_     _x000e_        _x001a_ _x001b__x001c__x001d_ _x001a_ Fig. 2. Architecture for Encryption and Decryption of Medical Data  II. L ITERATURE SURVEY  _x001a__x001a__x001b__x001a__x001c__x001a__x001d_ Recent advances in smart health monitoring systems using IoMT devices is presented in [3]. There exist various technologies such as arti?cial intelligence, machine learning and the block chain technologies to secure the IoMT devices over a network [11], [12]. These techniques are used to enhance the security by providing tolerance to attacks such as denial of service. Security and privacy is the major concern for IoMT devices. From biomedical data collection to data transfer, a secure communication should be provided to provide security and privacy of patient. There exist various challenges while implementing secure health monitoring system, device authentication and data encryption are major concerns in smart heath monitoring systems. Medical devices are battery operated and they should have longer battery life and should be portable. Hence, lightweight authentication is required so that there is not much burden on the processor and the battery of the medical devices. RSA algorithm based data encryption is presented in [13] for secure health monitoring system in addition with alert technique using IoMT. The sensors are interfaced with CC3200 (micro-controller) with built in WiFi module. The sensor data is send to the MATLAB for RSA encryption and the encrypted data is send to Thingspeak which is a data processing and visualization platform. Based on the sensor data, an alert will be sent to the doctor in case of emergency [13]. Further, IoT based health monitoring system is presented in [14]. Authors in [15] presented a lightweight authentication scheme known as “PMsec” for IoMT systems. A FPGA-based PUF module is interfaced with the IoMT devices and the edge server, which ensures authentication of the device. New devices are ?rst enrolled with the edge server. Edge server generates digital signature of the IoMT devices using the PUF module employed on IoMT device and the edge server. A mutual authentication protocol for smart health monitoring devices is presented in [16]. Next, we explain ASCON-128 cipher speci?cations and architecture.  _x000e__x000e_      _x000e__x000e_ _x000e__x000e_      _x001d__x001e__x001f__x001f_ _x001f__x001f__x001d__x001a__x001e_! "    _x000e__x000e_          _x000e__x000e_    _x000e__x000e_  _x001d__x001e__x001f__x001f_ _x001b__x001a__x001e_#        _x000e__x000e_      _x000e__x000e_ _x000f_ _x000e__x000e_       $_x001a__x001b__x001a__x001c__x001a__x001d_ Fig. 3. ASCON Encryption [9] decryption will be performed at the base station using the same key. The basic structure of ASCON encryption and decryption is shown in Figures 3 and 4 respectively. The parameters required for designing the ASCON cipher are tabulated in Table I. ASCON [9] family ciphers have 320-bit state register. These state registers are updated after performing operations such as permutation, associated data process, plain text data process etc. Inside the permutation function, the 320-bit state register is further divided into ?ve 64-bit registers known as X0, X1, X2, X3, X4. Outside the permutation function, 320-bits are divided into rate (r) and capacity, de?ned as c = 320 ? rate(r). The rate (r) can be 64 or 128. The basic ASCON encryption has four blocks as follows : (i) initialization (ii) processing associated data (iii) processing plain text data and (iv) ?nalization. Similarly, decryption also has four steps, instead of processing plain text, decryption block processes the cipher text. Next, we will explain these blocks. 1) Initialization: Initialization has two operations, ?rst is permutation (pa ) and then xor operation to the internal state. As described earlier, the 320-bits are divided into ?ve 64-bit   _x001e__x001f__x001b__x001b__x001c_      !! _x000e_     !! _x000e_ !!   _x001e__x001f__x001b__x001b_ _x000e__x000f_ _x000e__x000f_   !! _x000e_       !!    _x000e_  !! _x000e_ _x000e__x000f__x000f_ _x000f_   !! $    _x001a__x001b__x001b__x001c__x001b__x001b__x001d_   !! "#_x001e_ !!    % _x001c__x001b__x001b__x001e__x001f_ _x001c_     Fig. 4. ASCON Decryption [9] TABLE I ASCON PARAMETERS [9] Parameter III. DATA E NCRYPTION USING ASCON-128 Key (K) Nonce (N) Rate (r) Capacity (c) Round (pa ) Round (pb ) The architecture of the proposed smart health monitoring system using authenticated encryption with associated data is shown in Fig. 2. The encryption will be performed in the medical device before sending to hospital network. The ASCON-128 128 128 64 256 12 6 Size ASCON-128a 128 128 128 192 12 8 197 Authorized licensed use limited to: UNIVERSITY AT ALBANY SUNY. Downloaded on February 24,2023 at 20:31:19 UTC from IEEE Xplore. Restrictions apply. A. ASCON Permutation state registers. First, the state registers are initialized with IV, key and nonce. IV is a 64-bit constant, where as key and nonce are of 128-bits each. Permutation is the most important part of ASCON cipher. Both encryption and decryption uses same permutation block and permutation operation consumes larger portion of the total area. It consists of three operations as given below: Adding Constant: In each round a constant cr is exored with internal state x2 as given below. IV = k||r||a||b||0288?2k IV =  80400c0600000000 For ASCON 128 80800c0800000000 For ASCON 128a S = IV ||K||N x 2 = x2 ? c r In the initialization, pa permutation is done. Then, the key is exored with the internal state of the ASCON. Substitution Layer: Substitution layer updates the value of 320-bit internal state of ASCON. 320-bit internal state is divided into ?ve 64-bit register and SBOX operation is performed in each bit for updating the values of internal state. S? ? pa (S) ? (0? ||K) TABLE II ROUND C ONSTANT (Cr )U SED IN EACH ROUND p12 0 1 2 3 4 5 p8 p6 0 1 p12 6 7 8 9 10 11 Constant (0? ||F 0) (0? ||E1) (0? ||D2) (0? ||C3) (0? ||B4) (0? ||A5) p8 2 3 4 5 6 7 p6 0 1 2 3 4 5 TABLE III 5- BIT SB OX OF ASCON [9] Constant (0? ||96) (0? ||87) (0? ||78) (0? ||69) (0? ||5A) (0? ||4B) x 0 1 2 3 4 5 6 7 2) Processing Associated Data: Each associated data block Ai is ?rst exored with r-bit internal state followed by pb round permutation operation. S? ? pb ((Sr ? Ai )||Sc ), 1 ? i ? s  After the process of associated data single bit of internal state is exored with 1.  S? ? S ? (0319 ||1)  3) Processing Plain-text: In each iteration, one block of plain text Pi is exored with internal state and cipher text is extracted followed by pb round permutation operation (except for last block). There is no permutation operation after the processing of last plain text block.  i x 8 9 10 11 12 13 14 15 S(x) 27 5 8 18 29 3 6 28 x 16 17 18 19 20 21 22 23 S(x) 30 19 7 14 0 13 17 24    x 24 25 26 27 28 29 30 31  S(x) 16 12 1 25 22 10 15 23            Fig. 5. ASCON S-Box [9];  is the logical AND operator  pb (C ||S ) , if 1 ? i ? t Ci ||Sc   ? Sr ? Pi Ci ? S= S(x) 4 11 31 20 26 21 9 2 The substitution box (SBOX) of ASCON cipher is given in Table III. The circuit for SBOX is shown in Fig. 5, which has ?ve inputs and ?ve outputs. Linear Diffusion Layer: In this layer the internal state is rotated and exored to get the ?nal result of permutation as de?ned below. c , if 1 ? i = t 4) Processing Cipher-text: In each iteration, each plain text is extracted by doing xor operation with the r-bits of the internal state followed by pb round permutation operation (except for last block). Then the internal state (r-bits) replaced by block of cipher text.  (x0 )  (x1 )  (x2 )  (x3 )  (x4 ) Pi ? ? Sr ? Ci S? ? pb (Ci ||Sc ) 5) Finalization: In ?nalization, key is exored with the internal state followed by pa round permutation operation. A 128-bit tag is extracted by doing xor operation with the internal state. = x0 ? (x0 >>> 19) ? (x0 >>> 28) = x1 ? (x1 >>> 61) ? (x1 >>> 39) = x2 ? (x2 >>> 1) ? (x2 >>> 6) = x3 ? (x3 >>> 10) ? (x3 >>> 17) = x4 ? (x4 >>> 7) ? (x4 >>> 41) 198 Authorized licensed use limited to: UNIVERSITY AT ALBANY SUNY. Downloaded on February 24,2023 at 20:31:19 UTC from IEEE Xplore. Restrictions apply. _x001a__x001b_ _x001c__x001d_ ) ) !! Permutation is the main part of the ASCON cipher, both encryption and decryption use same permutation block. This permutation block consumes major portion of the area in the hardware. This paper presents a round based implementation [10] of ASCON-128, one round of permutation is performed in one clock cycle. Permutation block accepts internal state values and gives the updated value of internal state. Further, substitution box (SBOX) consumes major portion of the area in permutation block. The SBOX of ASCON has ?ve inputs and ?ve outputs. Latest FPGA devices has a dual output LUT (LUT6 2) [17] as shown in Fig. 6. The functions with similar inputs can be mapped to single LUT and the outputs can be taken from dual output lines. The outputs of SBOX are computed from same inputs, the SBOX can be designed using LUT6 on 7-series FPGA. The SBOX of ASCON is implemented using LUT6 on Artix-7 as shown in Fig. 7. The SBOX takes only three LUTs.  _x001a_!  _x001f__x001f__x001b_ _x000e__x000f_   _x000e__x000e_   _x000f_    (  &_x000e_ _x001b_     "# _x000f_ # _x000e_ !! _x001e__x001f_ !! IV. P ROPOSED FPGA I MPLEMENTATION OF ASCON C IPHER       ) $ %  _x001b__x001b_'         _x000f_$_x001d_ _x001e__x001f_  (     _x001b__x001b_' Fig. 8. Proposed FPGA-based Architecture of ASCON-128                    Fig. 9. Implementation of ASCON cipher on FPGA         permutation type signal generated in the controller. When permutation type is ‘1’, it performs round pa permutation else it performs pb permutation. The operations such as processing associated data, plain text and cipher text will be performed in the additional operations block. Next, we present the hardware results and comparisons of proposed design with existing designs. Fig. 6. LUT6 Primitive in Artix-7 FPGA X0 X1 X2 X3 X4 LUT6_2 X0 X1 X2 X3 X4 V. H ARDWARE RESULTS AND C OMPARISONS ASCON-128 is designed in Verilog HDL and implemented on Artix-7 FPGA using Xilinx Vivado 2022 for encryption and decryption. The encrypted data from FPGA will be transferred to server through UART and the data is retrieved from the same during decryption. The encrypted data can be stored into cloud and can be retrieved at remote locations using same decryption key. Fig. 9 depicts the experimental setup of ASCON-128 implementation of FPGA. Fig. 9 shows the encryption of Lena image using proposed ASCON-128. IoMT device designed using a Arduino with ECG sensor (AD8232). The ECG data is collected and loaded into BRAM of FPGA and the recorded ECG data is encrypted using ASCON-128 on FPGA. Fig. 10 shows the ECG data and encrypted ECG data and the same is stored in the BRAM for decryption. Fig. 10 shows the decrypted ECG signal. Fig. 11 shows the layout of ASCON-128 on FPGA. The synthesis results of the proposed architecture are given in Table V. The permutation block consumes 524 LUTs while LUT6_2 LUT5 Fig. 7. Proposed ASCON S-BOX implemented using three LUTs on Artix-7 FPGA Fig. 8 depicts the proposed design of FPGA-based ASCON128 cipher, it has three modules as controller, additional operations and permutation blocks. The encryption of collected data will be performed in the IoMT device while decryption will be done at the server or hospitals. The architecture does the encryption when signal ENC/DEC is ‘1’ else it does the decryption. Two types of permutations are required in the ASCON-128 cipher as pa and pb , these are controlled using 199 Authorized licensed use limited to: UNIVERSITY AT ALBANY SUNY. Downloaded on February 24,2023 at 20:31:19 UTC from IEEE Xplore. Restrictions apply. Fig. 10. Encryption and Decryption of ECG data using ASCON Cipher on FPGA TABLE V FPGA C OMPARISON OF ASCON-128 C IPHER ; T P/A IS THROUGHPUT PER AREA Design Proposed Design A-128 (1-p) [10] A-128 (2-p) [10] A-128 (3-p) [10] ASCON-128 [18] ASCON-128 [19] Fig. 11. Layout of ASCON implementation on FPGA (Taken from Xilinx Vivado) LUT Count 3 524 1330 Flip Flop 0 0 870 TP/A Mbps/LUT 0.343 0.153 0.144 0.133 0.088 0.070 per cycle. The proposed architecture consumes 1330 LUTs by saving the hardware resources by 35 % comparing to roundbased design in [10]. Throughput and throughput per area are the other performance metrics to validate the proposed implementation of encryption and decryption blocks. The throughput can be calculated as shown in Equation (1). TABLE IV FPGA R ESULTS OF P ROPOSED D ESIGN OF ASCON C IPHER Hardware Block 5-bit S-BOX Permutation Complete Design Frequency LUT Throughput(TP) MHz Mbps Artix-7 Implementations 107 1330 457 Spartan-6 Implementation 206.262 2060 315.2 147.228 2720 392.61 126.080 3630 448.25 216 680 60.1 146.1 1640 114 Power 3mW 17mW 31mW the proposed SBOX using LUT6 primitive takes only three LUTs. Altogether, the proposed architecture consumes 1330 LUTs on Artix-7 FPGA. Further, the proposed architecture has consumed only 2% of LUTs on Artix-7 FPGA. Authors in [10] present various architectures of FPGAbased implementation of ASCON-128 such as unrolled, roundbased and serial architecture. The unrolled architecture in [10] consumes 22.63K number of LUTs with a throughput of 776.93 Mbps While the round-based architecture takes 2.06K number of LUTs with a throughput of 315.2 Mbps. Whereas serial architecture takes 1.03K number of LUTs with a throughput of 6.46 Mbps. Since the proposed architecture aims to use the encryption module in IoMT devices, we have implemented a light weight architecture using a round-based architecture with one round T hroughput = N o. of bits processed time (1) The proposed design has a throughput of 457 Mbps whereas the throughput of the design reported in [10] is 315.2 Mbps. Fig. 12 gives the comparison of area (number of LUTs) and throughput for the proposed cipher. The proposed design is having better performance in terms of area and throughput. Fig. 13 shows the comparison of throughput per area of various FPGA-based ASCON ciphers with proposed design. The proposed design is having 56% more thoughput per area compared to design in [10]. VI. C ONCLUSION This paper presents FPGA-based architecture for ASCON128. The proposed architecture is used for encryption and 200 Authorized licensed use limited to: UNIVERSITY AT ALBANY SUNY. Downloaded on February 24,2023 at 20:31:19 UTC from IEEE Xplore. Restrictions apply. Fig. 12. Comparison of LUT count and Throughput for various FPGA-based ASCON Ciphers Fig. 13. Throughput Per Area (Mbps/LUT) for various FPGA-based ASCON Ciphers [6] S. P. Mohanty, U. Choppali, and E. Kougianos, “Everything you wanted to know about smart cities: The internet of things is the backbone,” IEEE Consumer Electronics Magazine, vol. 5, no. 3, pp. 60–70, 2016. [7] S. M. Karunarathne, N. Saxena, and M. K. Khan, “Security and privacy in iot smart healthcare,” IEEE Internet Computing, vol. 25, no. 4, pp. 37–48, 2021. [8] F. Chen, Y. Tang, C. Wang, J. Huang, C. Huang, D. Xie, T. Wang, and C. Zhao, “Medical cyber-physical systems: A solution to smart health and the state of the art,” IEEE Transactions on Computational Social Systems, pp. 1–28, 2021. [9] F. M. Christoph Dobraunig, Maria Eichlseder and M. Schla?f-fer, “ASCON speci?cation,” https://ascon.iaik.tugraz.at/specification.html, Accessed Aug. 2022, 2008. [10] S. Khan, W.-K. Lee, and S. O. Hwang, “Scalable and Ef?cient Hardware Architectures for Authenticated Encryption in IoT Applications,” IEEE Internet of Things Journal, vol. 8, no. 14, pp. 11 260–11 275, 2021. [11] F. Pesapane, M. B. Suter, M. Codari, F. Patella, C. Volonte?, and F. Sardanelli, “Regulatory issues for arti?cial intelligence in radiology,” in Precision medicine for investigators, practitioners and providers. Elsevier, 2020, pp. 533–543. [12] J. Sengupta, S. Ruj, and S. D. Bit, “A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot,” Journal of Network and Computer Applications, vol. 149, p. 102481, 2020. [13] S. Joshi and S. Joshi, “A sensor based secured health monitoring and alert technique using iomt,” in 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT), 2019, pp. 152–156. [14] K. Wei, L. Zhang, Y. Guo, and X. Jiang, “Health monitoring based on internet of medical things: Architecture, enabling technologies, and applications,” IEEE Access, vol. 8, pp. 27 468–27 478, 2020. [15] V. P. Yanambaka, S. P. Mohanty, E. Kougianos, and D. Puthal, “Pmsec: Physical unclonable function-based robust and lightweight authentication in the internet of medical things,” IEEE Transactions on Consumer Electronics, vol. 65, no. 3, pp. 388–397, 2019. [16] B. D. Deebak and F. Al-Turjman, “Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 2, pp. 346–360, 2021. [17] F. Wang, L. Zhu, J. Zhang, L. Li, Y. Zhang, and G. Luo, “Dual-output lut merging during fpga technology mapping,” in 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2020, pp. 1–9. [18] P. Yalla and J.-P. Kaps, “Evaluation of the caesar hardware api for lightweight implementations,” pp. 1–6, 2017. [19] W. Diehl, F. Farahmand, A. Abdulgadir, J.-P. Kaps, and K. Gaj, “Face-off between the caesar lightweight ?nalists: Acorn vs. ascon,” pp. 330–333, 2018. decryption of wellness data of the patients with IoMT devices. A LUT6 based SBOX is proposed, which takes only three LUTs to implement a 5-input and 5-output SBOX of ASCON128. The proposed ASCON is a round-based architecture which computes one round per one cycle. A recent design of ASCON-128 requires 2060 number of LUTs, while the proposed design requires 1330 number of LUTs with a savings of 35 %. The performance of the proposed ASCON is validated in terms of throughput. The proposed ASCON has a throughput of 457 Mbps While a design with three rounds per cycle has a throughput of 448.25 Mbps The throughput of the proposed ASCON architecture can be improved by increasing the number of rounds per cycle. The proposed ASCON with light weight, more throughput can be used as encryption module in portable IoMT devices. R EFERENCES [1] I. Butun, P. O?sterberg, and H. Song, “Security of the internet of things: Vulnerabilities, attacks, and countermeasures,” IEEE Communications Surveys Tutorials, vol. 22, no. 1, pp. 616–644, 2020. [2] A. Dean and M. Opoku Agyeman, “A study of the advances in iot security,” in ISCSIC ’18: Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control. United States: Association for Computing Machinery (ACM), Sep. 2018, pp. 1–5, 2nd International Symposium on Computer Science and Intelligent Control ; Conference date: 21-09-2018 Through 23-09-2018. [3] A. Ghubaish, T. Salman, M. Zolanvari, D. Unal, A. Al-Ali, and R. Jain, “Recent advances in the internet-of-medical-things (iomt) systems security,” IEEE Internet of Things Journal, vol. 8, no. 11, pp. 8707–8718, 2021. [4] Y. YIN, Y. Zeng, X. Chen, and Y. Fan, “The internet of things in healthcare: An overview,” Journal of Industrial Information Integration, vol. 1, pp. 3–13, 2016. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2452414X16000066 [5] N. Boutros-Saikali, K. Saikali, and R. A. Naoum, “An IoMT Platform to Simplify the Development of Healthcare Monitoring Applications,” in 2018 Third International Conference on Electrical and Biomedical Engineering, Clean Energy and Green Computing (EBECEGC), 2018, pp. 6–11. 201 Authorized licensed use limited to: UNIVERSITY AT ALBANY SUNY. Downloaded on February 24,2023 at 20:31:19 UTC from IEEE Xplore. Restrictions apply. Purchase answer to see full attachment Explanation & Answer: 4 pages User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.



Radioactive Tutors

Radio Active Tutors is a freelance academic writing assistance company. We provide our assistance to the numerous clients looking for a professional writing service.

NEED A CUSTOMIZE PAPER ON THE ABOVE DETAILS?
Order Now


OR

Get outline(Guide) for this assignment at only $10

Get Outline $10

**Outline takes 30 min - 2 hrs depending on the complexity and size of the task
Designed and developed by Brian Mubichi (mubix)
WhatsApp