Figure - available from: Mathematics
This content is subject to copyright.
Ascon operation in authenticated encryption and decryption procedures.

Ascon operation in authenticated encryption and decryption procedures.

Source publication
Article
Full-text available
In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot. These wearables usually do not have cryptographic protocols to guarantee data security. This study analyzes the existing security in these devices, and simulate malware pro...

Citations

... Considerable work has been conducted on this topic in the last few years (cf. [4][5][6][7][8][9][10][11][12], where further references can be found). ...
... Step 7 We choose a random value rϵZ * p such that r ̸ = sh i for P i ϵρ and the adversary does not query r, 2r, . . . , lr to the random oracle H. ...
Article
Full-text available
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares. Hierarchical secret sharing schemes (HSSSs) build upon Shamir’s scheme by organizing participants into different levels based on priority. Within HSSS, participants at each level can reconstruct the secret if a specified number, denoted as the threshold value (t), or more of them are present. Each level has a predetermined threshold value. If the number of participants falls below the threshold at any level, higher-level participants must be involved in reconstructing the secret at lower levels. Our paper proposes schemes that implement hierarchical access structures and enable the sharing of multiple secrets. Additionally, our proposed scheme includes share verification. We have analyzed potential attacks and demonstrated the scheme’s resistance against them. Through security analysis and comparison with existing schemes, we highlight the novelty and superiority of our proposed approach, contributing to advancements in secure information-sharing practices.
... Similarly, Wang et al. [44] , and Ren et al. [35] have worked on low latency cloud-based indoor localization system and secure, anonymous data aggregation schemes, respectively. Considerable work has been done on this topic during the last few years (cf.; [9,12,19,24,26,32,34,36,42] where further references can be found). ...
Preprint
Full-text available
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares. Hierarchical secret sharing schemes (HSSSs) build upon Shamir’s scheme by organizing participants into different levels based on priority. Within HSSS, participants at each level can reconstruct the secret if a specified number, denoted as the threshold value (t), or more of them are present. Each level has a predetermined threshold value. If the number of participants falls below the threshold at any level, higher-level participants must be involved in reconstructing the secret at lower levels. Our paper proposes schemes that implement hierarchical access structures and enable the sharing of multiple secrets. Additionally, our proposed scheme includes share verification. We have analyzed potential attacks and demonstrated the scheme’s resistance against them. Through security analysis and comparison with existing schemes, we highlight the novelty and superiority of our proposed approach, contributing to advancements in secure information sharing practices.
... This attack is often executed using artificial intelligence techniques, which can identify trends and link sensory data with user activities. Because of their noninvasive nature, they are challenging to manage and pose severe threats [72] [78]. Side-channel attacks can be active or passive. ...
... Data collection, integration, analytic techniques, real-time monitoring, alerting systems, response and intervention, feedback loops, and security and privacy are all components of continuous monitoring and anomaly detection. Early warning of possible threats allows healthcare providers to respond more readily and organize their actions more efficiently [78]. Continuous monitoring and anomaly detection in the SHS provides benefits such as improved patient outcomes and safety, increased efficiency and cost-effectiveness in healthcare delivery, and the ability to identify and respond quickly to cybersecurity incidents [139][140]. ...
Article
Full-text available
Cutting-edge technologies have been widely employed in healthcare delivery, resulting in transformative advances and promising enhanced patient care, operational efficiency, and resource usage. However, the proliferation of networked devices and data-driven systems has created new cybersecurity threats that jeopardize the integrity, confidentiality, and availability of critical healthcare data. This review paper offers a comprehensive evaluation of the current state of cybersecurity in the context of smart healthcare, presenting a structured taxonomy of its existing cyber threats, mechanisms and essential roles. This study explored cybersecurity and smart healthcare systems (SHSs). It identified and discussed the most pressing cyber threats and attacks that SHSs face, including fake base stations, medjacking, and Sybil attacks. This study examined the security measures deployed to combat cyber threats and attacks in SHSs. These measures include cryptographic-based techniques, digital watermarking, digital steganography, and many others. Patient data protection, the prevention of data breaches, and the maintenance of SHS integrity and availability are some of the roles of cybersecurity in ensuring sustainable smart healthcare. The long-term viability of smart healthcare depends on the constant assessment of cyber risks that harm healthcare providers, patients, and professionals. This review aims to inform policymakers, healthcare practitioners, and technology stakeholders about the critical imperatives and best practices for fostering a secure and resilient smart healthcare ecosystem by synthesizing insights from multidisciplinary perspectives, such as cybersecurity, healthcare management, and sustainability research. Understanding the most recent cybersecurity measures is critical for controlling escalating cyber threats and attacks on SHSs and networks and encouraging intelligent healthcare delivery.
... The impact of using lightweight block and stream cipher algorithms on power consumption is reviewed in [5]. Several papers are devoted to the safety of wearable medical devices [6][7][8]. Most works use elliptic curves cryptography (ECC) to ensure secure communication. ...
Article
Full-text available
This paper presents a new threshold signature scheme based on Damgaard’s work. The proposed scheme allows for changing the message signature threshold, thereby improving the flexibility of the original Damgaard scheme. This scheme can be applied as a user authentication system using wearable devices. Based on the hardness of lattice problems, this scheme is resistant to attacks on a quantum computer, which is an advantage over the currently used multi-factor authentication schemes. The scheme’s security relies on the computational complexity of the Module-LWE and Module-SIS problems, as well as the Shamir secret sharing scheme’s security.
... As a separate subgroup of papers not directly related to AxC, lightweight security on wearables and resource constrained devices appears. The main concepts addressed are trade-o s between the needed levels of security/privacy vs. cryptography primitive strength through, e.g., the length of asymmetric/symmetric keys used for data encryption/decryption [97,98]. Those aspects directly a ect the execution time and energy consumption and can be considered as approximation approaches on a higher level of abstraction. ...
Article
Full-text available
As modern 5G systems are being deployed, researchers question whether they are sufficient for the oncoming decades of technological evolution. Growing numbers of interconnected intelligent devices put these networks under tremendous pressure, demanding their development. Paving the way for beyond 5G and 6G systems, commonly denoted by B5G herein, therefore means seeking enablers to increase efficiency from different perspectives. One novel look on this is the application of inexact computations where nine 9s reliability is not needed, for example, in non-critical mobile broadband traffic. The paradigm of Approximate Computing (AxC) focuses on such areas where constrained quality degradation results in savings that benefit the users and operators. This paper surveys the state-of-the-art publications on the intersection of AxC and B5G systems, identifying and emphasizing trends and tendencies in existing work and directions for future research. The work highlights resource allocation algorithms as particularly mesmerizing in the former, while research related to Intelligent Reflective Surfaces appears the most prominent in the latter. In both, problems are often NP-hard and, thus, only solvable using heuristics or approximations, Successive Convex Approximation and Reinforcement Learning are most frequently applied.
... In addition, they are not feasible for systems that include wearable devices, such as HARSs. In addition, studies such as [23,24] refer to authentication protocols via wireless sensor networks and wearable devices using individual cryptographic solutions, not a holistic approach. Thus, there is no total assessment to offer protection at all stages of the system procedures. ...
Article
Full-text available
Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are considered assistive technology, they seem to neglect the aspects of security and privacy. This problem occurs due to the pervasive nature of sensor-based HARSs. Sensors are devices with low power and computational capabilities, joining a machine learning application that lies in a dynamic and heterogeneous communication environment, and there is no generalized unified approach to evaluate their security/privacy, but rather only individual solutions. In this work, we studied HARSs in particular and tried to extend existing techniques for these systems considering the security/privacy of all participating components. Initially, in this work, we present the architecture of a real-life medical IoT application and the data flow across the participating entities. Then, we briefly review security and privacy issues and present possible vulnerabilities of each system layer. We introduce an architecture over the communication layer that offers mutual authentication, solving many security and privacy issues, particularly the man-in-the-middle attack (MitM). Relying on the proposed solutions, we manage to prevent unauthorized access to critical information by providing a trustworthy application.
Article
Full-text available
In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in resource-constrained environments. This cipher suite provides authenticated encryption with associated data and hash functionality. NIST’s Ascon proposal consists of two symmetric ciphers, Ascon-128 and Ascon-128a, a hash function, Ascon-HASH, an extendible output function, Ascon-XOF, and a new cipher variant, Ascon-80pq, with increased resistance to quantum attacks. This study presents an overview of the mathematical background, security principles and key properties of the Ascon cipher suite. In addition, a comprehensive performance evaluation of Ascon on various Arduino platforms, such as Arduino DUE, Arduino Mega2560, Arduino Nano Every and Arduino Nano ESP32, is performed. A detailed comparative analysis of these implementations is also provided.
Article
To protect secrecy without compromising data, the study outlines a strong security framework for communications between mobile devices and servers and recommends encryption as the best option. Traditional encryption techniques are not immediately transferable due to the limitations of e-health data, including its size, redundancy, and bandwidth especially when patient data is moving across public networks. Patient privacy may be compromised as a result of this security flaw. Strong encryption measures must be put in place in the healthcare industry to combat this and ensure that confidential patient data may only be retrieved securely and by authorised personnel, protecting data integrity and privacy. To strengthen communication in the healthcare industry, the study presents a new, simplified encryption and decryption technique. We carefully examine, evaluate, and then benchmark this technique against accepted encryption standards.
Article
Full-text available
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals-Dilithium, Falcon, and Sphincs+ for digital signatures. This paper provides a comparative evaluation of these algorithms across key metrics. The results indicate varying strengths and weaknesses for each algorithm, underscoring the importance of context-specific deployments. Our findings indicate that Dilithium offers advantages in low-power scenarios, Falcon excels in signature verification speed, and Sphincs+ provides robust security at the cost of computational efficiency. These results underscore the importance of context-specific deployments in specific and resource-constrained technological applications, like IoT, smart cards, blockchain, and vehicle-to-vehicle communication.