Visible to the public Security Analysis of SAT\_Jo Lightweight Block Cipher for Data Security in Healthcare IoT

TitleSecurity Analysis of SAT\_Jo Lightweight Block Cipher for Data Security in Healthcare IoT
Publication TypeConference Paper
Year of Publication2019
AuthorsJoshitta, R. Shantha Mary, Arockiam, L., Malarchelvi, P. D. Sheba Kezia
Conference NameProceedings of the 2019 3rd International Conference on Cloud and Big Data Computing
PublisherAssociation for Computing Machinery
Conference LocationOxford, United Kingdom
ISBN Number978-1-4503-7165-0
Keywordscyber physical systems, Data security, healthcare IoT, lightweight block cipher, Lightweight Ciphers, pubcrawl, resilience, Resiliency, SAT_Jo, Scalability, security analysis
AbstractIn this fast moving world, every industry is advanced by a new technological paradigm called Internet of Things (IoT). It offers interconnectivity between the digital and the real world which will swiftly transform the style of doing business. It opens up a wide-ranging new array of dynamic opportunities in all industries and is fuelling innovation in every part of life. Due to the constrained nature of the devices in IoT environment, it is difficult to execute complex data encryption algorithms to enhance the security. Moreover, computation overhead caused by the existing cryptographic security algorithms is heavy and has to be minimized. To overcome these challenges, this paper presents the security analysis of the lightweight block cipher SAT\_Jo to ensure the data security in healthcare Internet of Things. It is based on SPN structure and runs for 31 rounds. It encrypts 64-bits of block length with key of 80 bits. Cadence NC-Verilog 5.1 is used for simulation and Cadence Encounter RTL Compiler v10.1 for synthesis. The implementations are synthesized for UMC 90 nm low-leakage Faraday library from technology libraries. Moreover, the proposed SAT\_Jo block cipher withstands in various attacks such as differential attack, linear attack and algebraic attack in healthcare IoT environment.
DOI10.1145/3358505.3358527
Citation Keyjoshitta_security_2019