Secured Data Collection
Secured Data Collection
1, FEBRUARY 2019
once a cloud server is negotiated, especially when a cloud II. S ECURITY C HALLENGES AND T HREAT M ODELS
server is under attacks by the insider or cloud provider. The FOR I OT-BASED H EALTHCARE
IoT paradigm still requires efficient solutions to protect patient
In this section, we discuss challenges to data security in
data against cyber threats/attacks throughout the way from the
IoT-based healthcare and security threat models.
IoT sensors toward the healthcare provider.
In this paper, we envisage to contribute to the protection of
IoT-based healthcare data. At first, we study the privacy and A. Security Challenges in IoT-Based Healthcare
security concerns with healthcare data acquisition and trans- Over past several years, sensor technologies and cloud com-
mission. Then, we present a secure data collection scheme puting technologies are speedily industrialized with numerous
for IoT-based healthcare system named SecureData with facilities, services, and applications incorporating the technolo-
the aim to tackle security concerns like the above. As shown gies into our daily life that has appeared as a healthcare IoT
in Fig. 1, SecureData scheme is composed of four layers: platform. Meanwhile, patients including seniors are increas-
1) IoT network sensors/devices layer; 2) Fog layer; 3) cloud ingly depending on the IoT services, including the elderly
computing layer; and 4) healthcare service provider. care services. In smart IoT-based healthcare applications, we
We mainly contribute to the first three layers. For the first now wear wireless sensing devices and the devices gather and
two layers, SecureData includes two techniques: 1) light- incorporate patients’ private physiological information (data)
weight field programmable gate array (FPGA) hardware-based and relay the data to a personal wireless IoT device. For
cipher algorithm and 2) secret cipher share algorithm. That example, patients’ health data includes ECG, fetal monitors,
is, for the first two layers, SecureData includes two tech- temperature, or blood glucose levels. Similarly, in Fig. 2, we
niques: 1) light-weight FPGA hardware-based KATAN ciphers provide a Fog layer node that can store the access logs data
for secured communication and 2) secret cipher share algo- each day of all the patients and staffs. Those logs’ data is
rithm. For the KATAN ciphers, we study KATAN algorithm as obviously privacy-sensitive data, which should be big data
one representative encryption algorithm of block ciphers [17] encompassing all the patients’ IDs, names, health data, and
and we optimize it on the FPGA hardware platform. In the health status. The Fog layer can utilize the Fog nodes to miti-
secret cipher sharing, a whole cipher is broken into a num- gate a tremendous amount of loads on the patients’ Web logs
ber of shares at the Fog computing layer. The shares are data storage, data management, and data communication while
sent through secure communication separately toward the being able to protect the privacy of the data.
cloud. We apply the Slepian–Wolf coding-based secret shar- The data is then transferred to data storage for patient health
ing (SW-SCSS) in SecureData. Share repairing is used in diagnostics. Nevertheless, a good amount of data transmit-
case of data loss or compromise for patients’ data privacy. At ted by IoT sensor system is sensitive data. As a result, the
the cloud computing layer, SecureData include a number sensitive data collection is subject to performance of the secu-
of cloud data servers [18], [19] to guarantee patients’ personal rity and privacy algorithms and protocols. Regarding a cloud
data privacy. computing environment for healthcare, there are many secure
Our contributions in this paper are fourfold. algorithms/protocols to safeguard patient private and health
1) We first investigate security challenges with data collec- information. Current schemes offer general security architec-
tion and then propose a secured data collection scheme tures and protocols, however, they still have various weakness
for IoT-based healthcare called SecureData. and are limited to ensure security and privacy to health data.
2) For data collection with security, we present KATAN Computer science and IoT community, and healthcare
secret cipher algorithm that is implemented and opti- providers have been struggling to provide protection to
mized on the FPGA hardware platform. each and every sensor/device in the IoT network with the
3) For data collection with privacy, we apply a new idea integrity. Though the safety and comfort of patients every-
of secret cipher share with share repairing and share day health relies on this data collection [20], the protec-
reconstruction at the cloud computing layer. tion of the data is greatly affected by cyber threats/attacks.
4) The performance of SecureData is validated through In addition, patients’ privacy sensitive data can also be
simulations of both KATAN secret cipher algorithm and affected. Ransomware, DDoS attacks, insider, e-mail com-
secret cipher share algorithm in terms of hardware fre- promise, and fraud scams are common types of attacks in
quency rate, energy cost, and computation time of all the healthcare [9], [21]. Besides, there are types of attacks that are
algorithms. The results show that SecureData can be very related to communication, including user untraceability
412 IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 1, FEBRUARY 2019
Fig. 2. SecureData scheme designed for patients’ data collection in a secure manner.
eavesdropping, impersonation, data integrity, data breaches, 3) Impersonation: An attacker plays the duty of somebody
collusion, and so on. Particularly, these threats/attacks bring that IoT sensor/device is possible to trust the attacker
new challenges, for example, data can be compromised dur- or the attacker makes you convince adequately in order
ing the data communication [1], by which patients’ personal to trick you into permitting access to the health data,
data can be revealed. database, and the IoT networked resources.
4) Patients’ Data Leakage and Destruction: Patient data
leakage is simply an unauthorized access or transmis-
B. Threat Models sion of health data from the healthcare system to an
We assume a few sophisticated threats in this paper. The external destination. Unintentional or inadvertent data
security and privacy threat models for IoT-based healthcare leakage is also unauthorized. The types of data leakage
applications with medical sensor devices are briefly discussed include confidential data, health record, and intellectual
as follows. property.
1) Collusion Attacks: There are a plenty of existing work on Based on the discussion above, secured data collection deals
security protocols [1], [14], [18], [19], [22]. In these pro- with both the outside attack and the inside attack. For these we
tocols, every IoT networked sensor/device or leader is consider two kinds of protections: 1) hardware-based KATAN
assumed to be honest. They use numerous security tech- secret cipher and 2) secret cipher sharing. The attackers may
niques such as authentication, hardware-based ciphers, not be able to compromise the KATAN cipher. However, they
and authorization for secure communications. But there may get the patients’ privacy data from other way such as com-
can be severe concerns with many of these protocols: promising the cloud server. In this case, secret cipher sharing
data leakage due to some complex cyber-attacks, includ- algorithm can be useful. Therefore, this may become difficult
ing collusion attack. It is a kind of attacks that may bring for attackers to compromise data after facing two types of
significant privacy risks when IoT medical sensor/device security in SecureData.
purposely maintains connections with an outsider. Such
an outsider may be negotiated by an attacker who can
earn required information from the healthcare system. III. D ESIGN OF S E C U R E D A T A
The most important issue is that it is tough to detect such In this section, we present the proposed SecureData for
the outsider as the negotiated IoT sensor/device looks data security and privacy in IoT-based healthcare.
working well, transmitting data, and making decision As shown in Fig. 2, SecureData scheme has four layers as
correctly [22]. follows.
2) Eavesdropping: It is a kind of threats that bring secu- 1) IoT Networked Sensors/Devices Layer: This layer is
rity risks to the patients’ health data privacy. It involves composed of numerous medical sensor devices and other
sniffing important health data transmitted by the IoT networked devices. To keep all the collected data from
sensor/device, which results in the privacy risks in com- these devices secure, especially when the data is being
munication. Suppose that an IoT sensor/device trans- exchanged with other sensors/devices and forwarded to
mit unencrypted health data toward the neighboring or the upper layer, we offer a lightweight KATAN secret
upstream nodes. An attacker might eavesdrop the health cipher algorithm in this layer for secure transmission of
data by sniffing it by means of a sniffing software tool. patients’ data.
Any eavesdropper might use a super receiver antenna 2) Fog Computing Layer: The medical sensors/devices then
like sniffers to capture the patients’ health data. transfer the acquired patients’ health data toward a cloud
TAO et al.: SECURED DATA COLLECTION WITH HARDWARE-BASED CIPHERS FOR IoT-BASED HEALTHCARE 413
data server, through this Fog computing layer. The cloud IV. H ARDWARE -BASED L IGHT-W EIGHT S ECRET C IPHERS
computing has limitation for applications requiring high In this section, we introduce the data ciphering, i.e., how to
privacy of data, particularly, in healthcare monitoring produce hardware-based light-weight ciphers.
settings. This limitation can be mitigated in the Fog
computing paradigm. Like the cloud computing, but Fog
A. Light-Weight KATAN Secret Ciphers
layer is in direct reach of edge network. Offering the
cloud service directly where the data is generated at the Lightweight ciphers are crucial for secure data communi-
IoT network edge, which is often viewed as a “descen- cation in resource-limited IoT sensors/devices. We attempt to
dent cloud.” Although a Fog computing node is at the implement lightweight ciphers in hardware in SecureData;
edge, this reduces latency and induces network effi- and optimize it with several design metrics. These design
ciency. It minimizes the cloud burden by minimizing metrics are estimated by FPGA hardware design flow. This
data exchange with the cloud thus utilizing the IoT net- involves ciphers implementation FPGA hardware and per-
work bandwidth. Being at the edge Fog network, we may form simulations. To obtain the lightweight ciphers, we study
also offer better data security and privacy. In this paper, KATAN algorithm as a representative cipher. We consider sev-
Fog is a crucial issue that requires to produce secret eral design metrics, e.g., block sizes, the number of rounds
cipher shares and distribute the secret cipher shares to implemented, and the key scheduling. We first measure the
different cloud servers. design metrics and then we model them.
3) A Cloud Computing Layer: This layer stores and sum- Before that, we detect what characteristics a representa-
marizes patients’ health data from the secret cipher tive lightweight cipher can have, which can make it the best
shares that are sent by the IoT sensors/devices through for implementation and optimization. Many technical defi-
the Fog computing layer. This layer also offers query nitions are given in existing papers for lightweight ciphers
services to various patients’ data users, including [23]–[25]. Fan et al. [24] explained a cryptographic algo-
healthcare service providers, and patients’ doctors. In rithm as a lightweight cipher as focused on low-cost resourced
SecureData, this layer particularly helps to perform sensors/devices, with enough security level and a minimum
the secret cipher share reconstruction. The Fog layer memory, and energy. In fact, it is tough to accurately define
breaks a cipher into multiple pieces cipher shares for the term “low-cost,” which is not easy [25].
privacy issue. Cloud computing layer helps to process
them and combine them. B. Quantitative Definition of Lightweight Ciphers
4) A Healthcare Provider: In the healthcare service
A numerical definition is technically the most practical for
provider layer, a provider gets patients’ information in
describing lightweight cipher and selecting the representative
a combined form and in a meaningful way, which was
cipher. Afterward, we characterize a lightweight cipher in a
sent in a form of cipher shares through the Fog comput-
quantitative manner as follows.
ing layer. A provider should have access to the patient
1) Tiny block size: 32, 48, or 64 bits.
privacy data to monitor health performance.
2) Tiny key size, e.g., 80 bits.
In this paper, we emphasize on the first three layers of
3) Simplified key scheduling.
SecureData, as shown in Fig. 2. We arrange a lightweight
4) Elementary operations by every algorithmic round.
KATAN secret cipher at IoT network layer to offer secure
5) A big number of algorithm rounds.
communication, and a secret cipher share at the Fog com-
In SecureData, we consider that a lightweight cipher
puting layer to offer privacy. In the cloud computing layer
needs to: 1) fulfill the quantitative definition and 2) offer
of SecureData, we put the patients’ transmitted data in a
choice for block sizes and key scheduling to discover their
distributed data storage environment that is composed of a
influence on the performance results and therefore appropri-
number of cloud servers. We supposed that a cloud server
ateness to utilize the results to as much low-cost ciphers
may be negotiated, especially when a cloud server is under
as possible. Investigating the lightweight ciphers [25], the
attack by the insider or the cloud provider, patients’ privacy
KATAN family of lightweight ciphers is good fit for the quan-
information can be revealed by attackers.
tified requirements of the lightweight cipher. The reason is as
While IoT networked medical devices/sensors function,
follows. It has: 1) a number of tiny block sizes; 2) two choices
other devices of IoT network or other networks may inter-
of scheduling (adjustable key and fixed key); 3) a minimum
rupt with the medical sensor devices [3], [4]. They can fetch
logic every round; and 4) a big number of algorithm rounds.
various security risks to the medical devices/sensors. Thus,
the data transferred by the medical devices/sensors may not
be secured. We attempt to apply hardware-based cipher gen- C. Hardware-Based Ciphers Through KATAN Algorithm
eration for the security. Without recognizing whether or not KATAN ciphers performs well in the FPGA hardware
the data was compromised, biased, or fake during the trans- design metrics compared to the software design metrics.
mission toward the upstream cloud servers over the Fog Particularly, KATAN gives good results in area, and power
layer, the collected data cannot be safe for patients’ health and energy. We verify the relationship between the opti-
diagnosis. Such collected data extremely influence the qual- mized lightweight cipher performance using KATAN family of
ity of patients’ health diagnosis, therefore, the quality of lightweight ciphers. We justify the KATAN algorithmic/design
lives. choices.
414 IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 1, FEBRUARY 2019
TABLE I
KATAN S ECRET C IPHER A LGORITHM D ESIGN PARAMETERS
TABLE II
VALUES OF D ESIGN PARAMETER E NERGY /B IT M ODEL
B. Main Concept and Protection to the Privacy of 1) Reconstructions of the secret cipher shares are made
Secret Cipher through the XOR network for achieving fast computation
The main concept of the secret cipher share algorithm is, cost.
one original (or whole) secret cipher can be broken down in a 2) The exact cipher share repair is managed, which is the
number of cipher shares and distributing them into a number of same as the original one.
cloud servers at the cloud computing layer, where each server This improved version utilizes another network coding scheme
is the recipient of one cipher share of the original secret cipher. called the SWC. SWC is usually applied in data compression
Such a system is called a (n, m)-threshold system of secret application. Moreover, the reduction on the size of the secret
cipher shares. In this system, any value of m or extra cipher cipher share may lead to a decreased cost of communication in
shares are utilized so as to combine all of broken shares of the Fog layer also in the cloud servers. Therefore, this secret
cipher. It was invented independently by Shamir and Blakley cipher share repair feature helps to recover whole/original
in 1979 [11], [26], [27]. However, according to the original secret cipher shares. It just makes the scheme consistent with
secret sharing system, the secret cipher share size should be the KATAN secret cipher state.
as identical as the secret cipher size. In solving this limitation,
cipher share sizes of Shamir and Blakley’s secret cipher share
VI. S ECURITY P ERFORMANCE A NALYSIS
scheme need to be improved. Later, the Ramp secret share
algorithm has been suggested in [11], [26], and [27] that offer In the previous sections, we provided how to pro-
a share size can be of 1/m of the original secret cipher size. duce hardware-based light-weight secret ciphers and secret
Here, m is the amount of secret block ciphers, which are parts cipher share generation. In this section, we provide per-
of the original secret cipher S. formance and security analysis with SecureData, though
Though the schemes gain average computation cost, they do the aim in this paper is to justify computation (fre-
not provide a share repair feature. This is highly possible that a quency), resources usage, and energy usage of the hardware-
share can be lost or compromised by the attacker or other rea- based light-weight secret ciphers and secret cipher share
sons, as modeled in Section II. If the lost share is not possible generation.
to recover, important patients’ data may be lost. To facili- We present SecureData for secure data collection in
tate share repair feature, XOR network coding is used to the IoT-based healthcare system, as healthcare devices are highly
secret cipher sharing schemes [28], [29]. However, when using vulnerable to security attacks. Particularly, in the IoT net-
XOR network coding, two problems appear in network coding- work sensors/devices layer of SecureData, attacks are
based secret cipher sharing scheme. The first problem is that made through communication, i.e., when data is transmitted
the secret cipher share size is greater than before, instead of from IoT network sensors/devices to the upstream location.
lesser than before. The second problem is that the new restored Attackers can compromise the devices or overhear the commu-
secret cipher shares are not as the identical as the initial com- nication and try to construct the original cipher using cipher
promised cipher shares. As a result, this scheme is still not generation algorithm. We think to integrate hardware-based
useful. secret ciphers, instead of directly using the cipher generation
algorithm. We used a modified KATAN secret cipher algo-
rithm which instruments registers and functions in the IoT
C. New Secret Cipher Share devices’ (sensors) hardware, as shown in Figs. 4 and 5. We
In the SecureData, we present a new secret cipher shar- have set control logic to coordinate the activities registers and
ing algorithm using the Slepian–Wolf coding (SWC) [30]. The functions. This also manages communication with the outside
algorithm can offer the secret share size that is optimal. It system. Encryption operation of a given message plaintext is
applies the idea of binning method for the coding. There exist initiated when the declaration of start signal made. Then, the
many schemes of the SWC [27], [31]. message plaintext can be loaded into registers and can trig-
Proposed algorithm offers the exact-share repair feature. ger. However, attackers want to compromise the data KATAN
Importantly, the share sizes stay constant no matter whether secret cipher. To compromise, they first need to learn infor-
or not they are compromised. Suppose that a secret share mation and configuration of the functions, registers, and the
gets lost otherwise compromised, then a fresh cipher share logic control configuration between them as well as the secret
can be produced, which can be precisely as identical as the key generation, including different parameters including, block
whole/original one. The efficiency of the proposed algorithm size and variable key. Thus, SecureData is designed to
may increase when decreasing the size of secret share, the stor- provide secure communication in between the first two layers.
age, and also the cost of communication for the secret cipher The main goal is to securely transfer the collected data from
share. Note that inspecting all compromised secrete cipher the IoT networked devices/sensors layer to the cloud com-
share is not the focus of this paper. Nevertheless, there are puting layer. As modeled in Section II, we still suppose that
other solutions including homomorphic signature that may be attackers may be able to learn and compromise data when
utilized to cover the focus [19], [27]. the data is on-the-fly using some sophisticated algorithms that
In SecureData, the cipher secret share size is decreased uses techniques like chosen-cipher-only information. The Fog
mostly in contrast to that of coding-based secret cipher share layer is used in between these two layers, which can do the
algorithm for the XOR network. Meanwhile, we are yet to secret cipher sharing task and distribute the secret shares into
preserve all the advantages. the distributed cloud server of the cloud computing layer.
TAO et al.: SECURED DATA COLLECTION WITH HARDWARE-BASED CIPHERS FOR IoT-BASED HEALTHCARE 417
TABLE III
I MPORTANT S YMBOL D ESCRIPTION
In SecureData, software-based cipher generation can optimize, we implement many editions of the design. Here, n
control to minimize IoT device memory footprint and amount times instantiation is made by the round logic. The values of
of execution cycles, while the hardware-based cipher genera- n can be of 1, 2, 4, 8, 16, 32, 64, 128, and 256. In the imple-
tion can optimize energy and computation speed. Energy and mentation of KATAN cipher, we apply all of supported block
computation speed of cipher regeneration is big issue to pre- sizes (32-, 48-, and 64-bit). We take one block size of the
pare the secure secret cipher. This is still a complex to reduce supported block sizes (32-, 48-, and 64-bit) for KATAN. We
the computation speed of cipher production and transmission. realize n hardware rounds in the design without altering the
We attempted to achieve this in this paper to some extent. We algorithm rounds, where n ∈ 1, 2, 4, 8, 16, 32, 64, 128, 254.
note that we do not verify the security performance in terms of Regarding the security at the Fog Layer, each secret cipher
the software part in this paper. For the software, we consider block, bi , is given as 2224 bits. This is a usual setting in
traditional symmetric algorithms, as the improved hardware- many distributed computing. The results are gathered from
based KATAN ciphers work as symmetric ciphers to provide the average of 50 simulation runs. A library called gmpy2
security features. (https://pypi.python.org/pypi/gmpy2), which is supported in
In order to verify the improved KATAN secret cipher algo- Python programming language, is used to compute the combi-
rithm, we have compared it to a state-of-the-art cipher algo- nation operations. which is sustained in Python language and
rithm, i.e., the HIGHT lightweight cipher [32]. The analysis to calculate the combination executions. We vary the amount
is given here. The objective is to observe the cipher opti- of Fog servers, which can be n = m + 1. Here m be the
mization. In the two algorithms, two sets primary parameters amount of secret cipher blocks. In the evaluation, we simu-
and constants as specific to each cipher. These are calculated late all the three algorithms: 1) KATAN secret cipher at the
by experimental execution. This is a 64-bit lightweight block IoT sensor/device; 2) share creation at the Fog node layer;
cipher having 32 rounds. Key and subkeys are variable (128-bit and 3) share reconstruction at the cloud computing layer. In a
master key). The modeling errors seen in HIGHT cipher [32] case of the share reconstruction at the cloud computing layer,
are frequency (9.32%) and energy (5.71%), while the errors are we exploit two dissimilar schemes: 1) Gaussian elimination
in frequency (11.53%) and energy (10.6%). Some are slightly and 2) matrix inversion. We set the size of other secret block
higher than HIGHT cipher. cipher bits to 1 MB, then change the amount of blocks (m)
according to various secret sizes.
We present KATAN secret cipher with FPGA implemen-
VII. I MPLEMENTATION AND E VALUATION tation results that include frequency, resources, power, and
In this section, we demonstrate the performance evaluation energy. For frequency and energy metrics, we thus perform the
of SecureData through simulations. We could partly eval- following: illustrating trend plots, examining impact of the key
uate the algorithms. We use a computer Intel Core i7 version, scheduling, the size of the block, and the amount of rounds on
8 GB of RAM, Win OS 10 with 64-bit and Python to write design metrics, and development of models. Notations related
programs. to these metrics are illustrated in Table III.
When a packet is ready to be transferred from an IoT We first observe the frequency trend of the design of
device/sensor, it first goes to the encryption algorithm, that KATAN secret cipher in FPGA. We can see that the results of
is the KATAN cipher. For the KATAN cipher, we imple- the frequency trend implementations with a number of rounds
ment KATAN secret cipher with FPGA. The control logic (n) as shown in Fig. 7(a). The results imply that the maximum
maintains all the inside system actions. It also maintains the frequency is not affected when n ≤ 16. One of the reasons for
communication to the outside system. Encryption operations why it is happening is because the tiny round logic that results
are activated by the affirmation of a start signal. In the first a little delay in contrast to the delay in dominating interconnect
cycle of encryption operations, plaintext is loaded in hard- and flip-flop [25]. Table III summarizes the implementation
ware registers. A round counter (rnd-ctr) is activated and set details of the KATAN secret cipher design in terms of energy
to 0. After the first cycle, the control logic provides the cur- cost. The least energy achieved when the number of rounds
rent values in round logic of the IR bit, encryption key, and equal to n = 32 and n = 64.
registers. Moreover, this logic examines if the values of the The influence of increasing the number of rounds begins to
rnd-ctr at max bound of 255 to close encryption. When the visibly take an influence on the frequency when n ≥ 16. In
procedure gets done, the control logic gets a completed signal. the frequency model, the frequency results were averaged as
The size of the IR ROM table is set to 251 × 1 bits and it is shown in Fig. 7(b). The average error in the fitted frequency
indexing of the rnd_ctr. We implement the round logic in one model in (3) is 12%.
round, including functions fa and fb . The round logic calcu- For the cost of energy, as discussed in Section III, we com-
lates the up-to-date values for key and registers. In order to pute energy per bit, as it gives the energy cost to encrypt
418 IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 1, FEBRUARY 2019
(a) (b)
Fig. 7. (a) Frequency trend. (b) Average frequency trend. Fig. 9. Computation time for KATAN ciphers, secret cipher share generation,
and reconstruction.
[14] J. Shen et al., “Cloud-aided lightweight certificateless authen- Md Zakirul Alam Bhuiyan (M’09–SM’17)
tication protocol with anonymity for wireless body area net- received the Ph.D. degree.
works,” J. Netw. Comput. Appl., vol. 106, pp. 117–123, Mar. 2018, He is currently an Assistant Professor with
doi: 10.1016/j.jnca.2018.01.003. the Department of Computer and Information
[15] S. Roy et al., “Chaotic map-based anonymous user authentication Sciences, Fordham University, New York, NY,
scheme with user biometrics and fuzzy extractor for crowdsourc- USA. He is the Founding Director of the
ing Internet of Things,” IEEE Internet Things J., to be published, Fordham Dependable and Secure System Laboratory
doi: 10.1109/JIOT.2017.2714179. (DependSys). He is also a Visiting Professor with
[16] E. Luo, Q. Liu, and G. Wang, “Hierarchical multi-authority and attribute- Guangzhou University, Guangzhou, China. He was
based encryption friend discovery scheme in mobile social networks,” an Assistant Professor with Temple University,
IEEE Commun. Lett., vol. 20, no. 9, pp. 1772–1775, Sep. 2016. Philadelphia, PA, USA. His current research inter-
[17] C. Cannière, O. Dunkelman, and M. Knežević, “KATAN and ests include dependability, cybersecurity, big data, and cyber physical sys-
KTANTAN—A family of small and efficient hardware-oriented block tems. His research have been published in the IEEE T RANSACTIONS ON
ciphers,” in Cryptographic Hardware and Embedded Systems-CHES C OMPUTERS, the IEEE T RANSACTIONS ON PARALLEL AND D ISTRIBUTED
2009. Berlin, Germany: Springer, 2009, pp. 272–288. S YSTEMS, the IEEE T RANSACTIONS ON D EPENDABLE AND S ECURE
[18] J. Li et al., “L-EncDB: A lightweight framework for privacy-preserving C OMPUTING, the IEEE T RANSACTIONS ON I NDUSTRIAL I NFORMATICS,
data queries in cloud computing,” Knowl. Based Syst., vol. 79, the IEEE Communications Magazine, the IEEE I NTERNET OF T HINGS
pp. 18–26, May 2015. J OURNAL, ACM Transactions on Sensor Networks, ACM Transactions on
[19] Q. Lin, J. Li, Z. Huang, W. Chen, and J. Shen, “A short lin- Autonomous and Adaptive Systems, CS, INS, and the Journal of Network and
early homomorphic proxy signature scheme,” IEEE Access, vol. 6, Computer Applications in the above areas.
pp. 12966–12972, 2018. Prof. Bhuiyan has served as a Guest/Associate Editor for the IEEE
[20] T. Wang et al., “Sustainable and efficient data collection from T RANSACTIONS ON B IG DATA, ACM Transactions on Cyber-Physical
WSNs to cloud,” IEEE Trans. Sustain. Comput., to be published, Systems, the IEEE I NTERNET OF T HINGS J OURNAL, Information Sciences,
doi: 10.1109/TSUSC.2017.2690301. Future Generation Computing Systems, and the Journal of Network and
[21] Z. Huang, S. Liu, X. Mao, K. Chen, and J. Li, “Insight of the pro- Computer Applications. He has also served as an Organizer, the General
tection for data security under selective opening attacks,” Inf. Sci., Chair, the Program Chair, the Workshop Chair, and a TPC member of var-
vols. 412–413, pp. 223–241, Oct. 2017. ious international conferences, including IEEE INFOCOM. He is a member
[22] M. Z. A. Bhuiyan and J. Wu, “Collusion attack detection in networked of the ACM.
systems,” in Proc. IEEE DASC, 2016, pp. 286–293.
[23] B. J. Mohd, T. Hayajneh, and A. V. Vasilakos, “A survey on lightweight
block ciphers for low-resource devices: Comparative study and open
issues,” J. Netw. Comput. Appl., vol. 58, no. 2, pp. 73–93, 2015.
[24] X. Fan, K. Mandal, and G. Gong, “WG-8: A lightweight stream cipher
for resource-constrained smart devices,” in Quality, Reliability, Security
and Robustness in Heterogeneous Networks (QShine 2013). Berlin,
Germany: Springer, 2013, pp. 617–632.
Ahmed N. Abdalla received the bachelor of science
[25] B. Mohd, T. Hayajneh, K. Yousef, Z. Khalaf, and M. Bhuiyan,
degree in general electrical engineering and master
“Hardware design and modeling of lightweight block ciphers for secure
of science degree in electrical engineering from the
communications,” Future Gen. Comput. Syst., vol. 83, pp. 510–521,
University of Technology, Baghdad, Iraq, in 1997
Jun. 2018, doi: 10.1016/j.future.2017.03.025.
and 2002, respectively, and the Ph.D. degree in elec-
[26] A. Aragues et al., “Trends and challenges of the emerging technologies
trical engineering from the Huazhong University of
toward interoperability and standardization in e-health communications,”
Science and Technology, Wuhan, China, in 2007.
IEEE Commun. Mag., vol. 49, no. 11, pp. 182–188, Nov. 2011.
He is a Professor with the Huaiyin Institute of
[27] M.-H. Hsieh and S. Watanabe, “Channel simulation and coded source
Technology, Huai’an, China, and the former Dean
compression,” IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6609–6619,
of the Workshop and Training Center, University of
Nov. 2016.
Technology. He has authored or co-authored numer-
[28] N. Cai and R. W. Raymond, “Secure network coding,” in Proc. IEEE
ous papers published in a number of SCI indexed journals with an impact
Int. Symp. Inf. Theory, 2002, pp. 1–8.
factor. His research outcomes have been exhibited and has been bestowed
[29] A. Kalantari, G. Zheng, Z. Gao, Z. Han, and B. Ottersten, “Secrecy
high recognitions internationally. His expertise areas include, but are not lim-
analysis on network coding in bidirectional multibeam satellite com-
ited to, system modeling and parameter identification, sensors design and its
munications,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 9,
application, wireless communication, and application of intelligent techniques.
pp. 1862–1874, Sep. 2015.
[30] D. Slepian and J. Wolf, “Noiseless coding of correlated information
sources,” IEEE Trans. Inf. Theory, vol. IT-19, no. 4, pp. 471–480,
Jul. 1973.
[31] M. Hayashi and R. Matsumoto, “Secure multiplex coding with depen-
dent and non-uniform multiple messages,” IEEE Trans. Inf. Theory,
vol. 62, no. 5, pp. 2355–2409, May 2016.
[32] D. Hong et al., “HIGHT: A new block cipher suitable for low-resource
device,” in Proc. Int. Workshop Cryptograph. Hardw. Embedded Syst. Mohammad Mehedi Hassan (M’12) received the
(CHES), 2006, pp. 46–59. Ph.D. degree in computer engineering from Kyung
Hee University, Seoul, South Korea, in 2011.
He is currently an Associate Professor with
the Information Systems Department, College of
Hai Tao received the B.Sc. degree from the Computer and Information Sciences (CCIS), King
Department of Computer and Information Science, Saud University (KSU), Riyadh, Saudi Arabia. He
Northwest University of Nationalities, Lanzhou, has authored or co-authored over 100 research
China, in 2004, the M.S. degree from the School papers in ISI-indexed journals. His current research
of Mathematics and Statistics, Lanzhou University, interests include cloud federation, multimedia cloud,
Lanzhou, in 2009, and the Ph.D. degree from sensor-cloud, Internet of Things, big data, mobile
the Faculty of Computer System and Software cloud, sensor network, publish/subscribe systems, and recommender systems.
Engineering, University Malaysia Pahang, Pahang, Dr. Hassan was a recipient of the Best Paper Award of the CloudComp
Malaysia. Conference in 2014, and the Excellence in Research Award from CCIS,
He is currently an Associate Professor with the KSU, in 2015 and 2016, respectively. He has also been the Guest Editor
Baoji University of Arts and Sciences, Shaanxi, of several international ISI-indexed journals such as the IEEE I NTERNET OF
China. His current research interests include machine learning, Internet of T HINGS J OURNAL and Future Generation Computer Systems. He is currently
Things, and optimization computation. an Associate Editor for IEEE ACCESS.
420 IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 1, FEBRUARY 2019
Jasni Mohamad Zain received the bachelor’s Thaier Hayajneh (M’17) received the M.S. and
degree in computer science from the University of Ph.D. degrees from the University of Pittsburgh,
Liverpool, Liverpool, U.K., in 1989 and the Ph.D. Pittsburgh, PA, USA, in 2005 and 2009, respec-
degree from Brunel University, West London, U.K., tively.
in 2005. He is the Founding Director of the Fordham
She started her career as a Tutor in 1997 with Center of Cybersecurity, an Associate Professor
the University of Technology Malaysia, Johor Bahru, of computer science, and the Graduate Program
Malaysia. She is currently a Professor with the Director of Cybersecurity and Data Analytics with
Faculty of Computer and Mathematical Sciences, Fordham University, New York, NY, USA. He
Universiti Teknologi MARA, Shah Alam, Malaysia, was the Director of the Center of Excellence in
and was the Dean of the Faculty of Computer Cybersecurity, New York Institute of Technology,
Systems and Software Engineering, University Malaysia Pahang, Pahang, Old Westbury, NY, USA. His current research interests include cybersecu-
Malaysia, for eight years. She has graduated 15 Ph.D. students and 6 master’s rity and networking, applied cryptography, CPS, and WBAN security.
students by research under her supervision. She has authored or co-authored Dr. Hayajneh is the Editor-in-Chief for the EAI Transactions on Pervasive
over 100 refereed papers. She has a patent pending for digital watermarking. Health and Technology, an Editor for ACM/Springer Wireless Networks, and a
Her current research interests include digital watermarking and image pro- Guest Editor for Sensors and the International Journal of Distributed Sensor
cessing, as well as data and network security. Networks.
Dr. Zain has been actively presenting papers and keynote addresses at
national and international conferences.