Research Associate @ Nanyang Technological University
Peer Reviewed
Internet of Things applications with various sensors in public network are vulnerable to cyber physical attacks. The technology of IoT in smart health monitoring systems popularly known as Internet of Medical Things (IoMT) devices. The rapid growth of remote telemedicine has witnessed in the post COVID era. Data collected over IoMT devices is sensitive and needs security, hence provided by enhancing a light weight encryption module on IoMT device. An authenticated Encryption with Associated Data is employed on the IoMT device to enhance the security to the medical wellness of patient. This paper presents FPGA-based implementation of ASCON-128, a light weight cipher for data encryption. A LUT6 based substitution box (SBOX) is implemented on FPGA as part of cipher permutation block. The proposed architecture takes 1330 number of LUTs, which is 35% less compared to the best existing design. Moreover, the proposed ASCON architecture has improved the throughput by 45% compared to the best existing design. This paper presents the results pertaining to encryption and decryption of medical data as well as normal images.
The Internet of Things(IoT) can transfer data between the sensor node and the cloud server with the Internet’s help for various automated tasks like remote monitoring and controlling. IoT has various applications in different sections, including healthcare, also called the Internet of Medical Things(IoMT). IoT used in healthcare applications can collect patient’s biomedical data through medical sensors, which is sent to the cloud server with the help of the Internet. IoT/IoMT systems are having serious challenging concerns such as data security and IoT device’s security. Hence, this paper proposes a Physically Unclonable Function(PUF) based lightweight mutual authentication and key agreement protocol for IoT/IoMT devices. A lightweight AEAD cipher, ASCON, and a PUF are used for mutual authentication and key agreement between the IoT/IoMT device and the server. The agreed key is used for encrypting the sensor node data using ASCON cipher. The protocol is implemented in Artix-7 FPGA, and the formal verification is performed using the automated tool Proverif. The proposed protocol takes 912 bits of communication cost, which is 13% less compared to the best existing protocol. Further, the protocol requires a node storage cost of 128 bits, which is only 66% of the best existing protocol.
under Reviewed
We present the protected hardware implementation of the Module-Lattice-Based Digital Signature Standard (MLDSA). ML-DSA is an extension of Dilithium 3.1, which is the winner of the Post Quantum Cryptography (PQC) competition in the digital signature category. The proposed design is based on the existing high-performance Dilithium 3.1 design. We implemented existing Dilithium masking gadgets in hardware, which were only implemented in software. The masking gadgets are integrated with the unprotected ML-DSA design and functional verification of the complete design is verified with the Known Answer Tests (KATs) generated from an updated ML-DSA software implementation. We also present the practical power side-channel attack experimental results by implementing masking gadgets on the standard sidechannel evaluation FPGA board and collecting power traces up-to 1 million traces. The proposed protected design has the overhead of 1.127x LUT, 1.2x Flip-Flop, and 378x execution time compared to unprotected design. The experimental results show that it resists side-channel attacks.