Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network
KSII Transactions on Internet and Information Systems
With the advancement and deployment of wireless communication techniques, wireless body area network (WBAN) has emerged as a promising approach for e-healthcare that collects the data of vital body parameters and movements for sensing and communicating wearable or implantable healthful related information. In order to avoid any possible rancorous attacks and resource abuse, employing lightweight ciphers is most effective to implement encryption, decryption, message authentication and digital
... nature for security of WBAN. As a typical lightweight cryptosystem with an extended sponge function framework, the PHOTON family is flexible to provide security for the RFID and other highly-constrained devices. In this paper, we propose a differential fault analysis to break three flavors of the PHOTON family successfully. The mathematical analysis and simulating experimental results show that 33, 69 and 86 random faults in average are required to recover each message input for PHOTON-80 /20/16, PHOTON-160/36/36 and PHOTON-224/32/32, respectively. It is the first result of breaking PHOTON with the differential fault analysis. It provides a new reference for the security analysis of the same structure of the lightweight hash functions in the WBAN. Introduction With the rapid development of wearable medical sensors and wireless communication, wireless body area network (WBAN) has emerged as a new application scenario that will revolutionalize the way of seeking healthcare . It has shown great potential in improving healthcare quality, and provides inherently a perfect way to sense ubiquitous health monitoring, computer assisted rehabilitation and emergency medical response systems as Fig. 1 shows. However, WBAN is the networks with high dynamic topology and their communication is vulnerable to all kind of vicious attacks, and the attackers can exploit WBAN to send deceptive information to beguile others. Furthermore, it takes great challenges coming from stringent resource constraints of in-body and on-body devices, and the high demand for both security/privacy and practicality/usability. Hence, employing cryptosystems, either while stored inside the WBAN or during their transmission outside of the WBAN, is widely recognized as one of the most effective approach for security of WBAN         . Due to the limitation of processing capability, storage space and power supply of RFID tag and other highly-constrained devices, classical cryptosystems cannot play directly roles in a variety of security applications, such as encryption, decryption, digital signature, and message authentication, etc. It is very critical to implement efficient lightweight cryptosystems in WBAN, i.e., lightweight cryptosystems are mostly desired     . Appliance of lightweight cryptosystems can reduce energy consumption for devices, and allow more network communications with lower-resource devices.