Browse > Article
http://dx.doi.org/10.3837/tiis.2013.05.009

Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks  

Wang, An (Institute for Advanced Study, Tsinghua University)
Zheng, Xuexin (Key Lab of Cryptologic Technology and Information Security Ministry of Education, Shandong University)
Wang, Zongyue (Key Lab of Cryptologic Technology and Information Security Ministry of Education, Shandong University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.5, 2013 , pp. 1094-1107 More about this Journal
Abstract
NTRU cryptosystem has been suggested for protecting wireless body area networks, which is secure in the sense of traditional cryptanalysis. In this paper, we fulfill the first power analysis attack on the ultra-low-power environment of wireless body area networks. Specifically, two practical differential power analyses on NTRU algorithm are proposed, which can attack the existing countermeasures of NTRU. Accordingly, we suggest three countermeasures against our attacks. Meanwhile, practical experiments show that although the attacks in this paper are efficient, our countermeasures can resist them effectively.
Keywords
Cryptography; wireless body area networks; power analysis attack; NTRU;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. Latre, B. Braem, I. Moerman, C. Blondia, P. Demeester, "A survey on wireless body area networks," in Proc. of Wireless Networks, vol. 17, no. 1, pp. 1-18, Springer, Heidelberg, 2011.   DOI
2 A.J. Menezes, P.C. Van Oorschot, and S.A. Vanstone, Handbook of applied cryptography. CRC Press, 1997.
3 A. Perrig, R. Szewczyk, JD. Tygar, V. Wen, DE. Culler, "Spins: security protocols for sensor networks," in Proc. of Wireless Networks, vol. 8, no. 5, pp. 521-534, Springer, Heidelberg, 2002.   DOI   ScienceOn
4 J. Hoffstein, J. Pipher, J. Silverman, "NTRU: A ring-based public key cryptosystem," in Proc. of Algorithmic Number Theory (ANTS III). LNCS, vol. 1423, pp. 267-288, Springer, Heidelberg, 1998.
5 IEEE Std P1363.1-2008, "IEEE standard specification for public key cryptographic techniques based on hard problems over lattices," 2009.
6 J. Hoffstein, J. Pipher, J.H. Silverman, "NSS: An NTRU lattice-based signature scheme," in Proc. of Eurocrypt 2001, LNCS, vol. 2045, pp. 211-228, Springer, Heidelberg, 2001.
7 F. Hu, Q. Hao, M. Lukowiak, Q. Sun, K. Wilhelm, S. Radziszowski, Y. Wu, "Trustworthy data collection from implantable medical devices via high-speed security implementation based on IEEE 1363," IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 6, pp. 1397-1404, 2010.   DOI   ScienceOn
8 F. Hu, K. Wilhelm, M. Schab, M. Lukowiak, S. Radziszowski, Y. Xiao, "NTRU-based sensor network security: a low-power hardware implementation perspective," Security Comm. Networks. vol. 2009, no. 2, pp. 71-81, 2009.
9 P. Kocher, J. Jaffe, B. Jun, "Differential power analysis," in Proc. of Crypto 1999, LNCS, vol. 1666, pp. 388-397, Springer, Heidelberg, 1999.
10 D. Canright, L. Batina, "A very compact perfectly masked S-Box for AES," in Proc. of ACNS 2008, LNCS, vol. 5037, pp. 446-459, Springer, Heidelberg, 2008.
11 H. Kim, S. Hong, J. Lim, "A fast and provably secure higher-order masking of AES S-Box," in Proc. of CHES 2011, LNCS, vol. 6917, pp. 95-107, Springer, Heidelberg, 2011.
12 C. Clavier, B. Feix, G. Gagnerot, M. Roussellet, V. Verneuil, "Improved collision-correlation power analysis on first order protected AES," in Proc. of CHES 2011, LNCS, vol. 6917, pp. 49-62, Springer, Heidelberg, 2011.
13 A. Moradi, O. Mischke, T. Eisenbarth, "Correlation-enhanced power analysis collision attack," in Proc. of CHES 2010, LNCS, vol. 6225, pp. 125-139, Springer, Heidelberg, 2010.
14 M. Lee, J. Song, D. Choi, D. Han, "Countermeasures against the power analysis attack for the NTRU public key cryptosystem," IEICE TRANSACTIONS on Fundamentals of Electronics, vol. E93-A, no. 1, pp. 153-163, 2010.   DOI   ScienceOn
15 A. Bhargava, M. Zoltowski, "Sensors and wireless communication for medical care," in Proc. of 14th International Workshop on Database and Expert Systems Applications, pp. 956-960, 2003.
16 G. Selimis, L. Huang, F. Masse, I. Tsekoura, M. Ashouei, F. Catthoor, J. Huisken, J. Stuyt, G. Dolmans, J. Penders, H. Groot, "A lightweight security scheme for wireless body area networks: design, energy, evaluation and proposed microprocessor design," Journal of Medical Systems, vol. 2011, no. 35, pp. 1289-1298, 2011.
17 M. Mana, M. Feham, B. Bensaber, "A light weight protocol to provide location privacy in wireless body area networks," International Journal of Network Security & Its Applications, vol. 3, no. 2, pp. 1-11, 2011.
18 P. Xiong, W. Zhang, G. Lu, "Secure neighbor relation in wireless sensor network," in Proc. of 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, IEEE, 2008.
19 A. Atici, L. Batina, B. Gierlichs, I. Verbauwhede, "Power analysis on NTRU implementations for RFIDs: First results," in Proc. of RFIDSec 2008, pp. 128-139, 2008.
20 F. Hu, Q. Hao, M. Lukowiak, "Implantable medical device communication security: pattern vs. signal encryption (position paper)," in Proc. of the 2nd USENIX Conference on Health Security and Privacy, pp. 1-2, USENIX Association, 2011.
21 E. Brier, C. Clavier, F. Olivier, "Correlation power analysis with a leakage model," in Proc. of CHES 2004, LNCS, vol. 3156, pp. 16-29, Springer, Heidelberg, 2004.
22 S. Mangard, E. Oswald, T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer, Heidelberg, 2007.
23 J. Irwin, D. Page, N.P. Smart, "Instruction stream mutation for non-deterministic processors," in Proc. of IEEE International Conference on Application-Specific Systems, Architectures and Processors, pp. 286-295, IEEE Computer Society, Los Alamitos, 2002.