{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:58:35Z","timestamp":1760241515691,"version":"build-2065373602"},"reference-count":45,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T00:00:00Z","timestamp":1525996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"<jats:p>Healthcare remote devices are recognized as a promising technology for treating health related issues. Among them are the wireless Implantable Medical Devices (IMDs): These electronic devices are manufactured to treat, monitor, support or replace defected vital organs while being implanted in the human body. Thus, they play a critical role in healing and even saving lives. Current IMDs research trends concentrate on their medical reliability. However, deploying wireless technology in such applications without considering security measures may offer adversaries an easy way to compromise them. With the aim to secure these devices, we explore a new scheme that creates symmetric encryption keys to encrypt the wireless communication portion. We will rely on chaotic systems to obtain a synchronized Pseudo-Random key. The latter will be generated separately in the system in such a way that avoids a wireless key exchange, thus protecting patients from the key theft. Once the key is defined, a simple encryption system that we propose in this paper will be used. We analyze the performance of this system from a cryptographic point of view to ensure that it offers a better safety and protection for patients.<\/jats:p>","DOI":"10.3390\/jsan7020021","type":"journal-article","created":{"date-parts":[[2018,5,14]],"date-time":"2018-05-14T02:57:20Z","timestamp":1526266640000},"page":"21","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems"],"prefix":"10.3390","volume":"7","author":[{"given":"Taha","family":"Belkhouja","sequence":"first","affiliation":[{"name":"Department of Electrical &amp; Computer Engineering, University of Idaho, 875 Perimeter Drive MS 1023, Moscow, ID 83844, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4235-9671","authenticated-orcid":false,"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Department of Computer &amp; Information Sciences, Temple University, 1925 N. 12th St., Philadelphia, PA 19122, USA"}]},{"given":"Amr","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, College of Engineering, Qatar University, P.O. Box 2713, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3527-2554","authenticated-orcid":false,"given":"Abdulla K.","family":"Al-Ali","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, College of Engineering, Qatar University, P.O. Box 2713, Doha, Qatar"}]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"Department of Electrical &amp; Computer Engineering, University of Idaho, 875 Perimeter Drive MS 1023, Moscow, ID 83844, USA"}]}],"member":"1968","published-online":{"date-parts":[[2018,5,11]]},"reference":[{"key":"ref_1","unstructured":"Denning, D.E. (1998). Information Warfare and Security, Addison-Wesley."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1272","DOI":"10.1109\/JIOT.2017.2708042","article-title":"Access Control Schemes for Implantable Medical Devices: A Survey","volume":"4","author":"Wu","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3390\/s120100055","article-title":"Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey","volume":"12","author":"Kumar","year":"2012","journal-title":"Sensors"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","article-title":"A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks","volume":"8","author":"Du","year":"2009","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1109\/TBCAS.2013.2245664","article-title":"MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection","volume":"7","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Biomed. Circuits Syst."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Rathore, H., Mohamed, A., Al-Ali, A., Du, X., and Guizani, M. (2017, January 26\u201330). A Review of Security Challenges, Attacks and Resolutions for Wireless Medical Devices. Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain.","DOI":"10.1109\/IWCMC.2017.7986505"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Law, Y.W., Palaniswami, M., van Hoesel, L., Doumen, J., Hartel, P., and Havinga, P. (2009). Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Trans. Sens. Netw., 5.","DOI":"10.1145\/1464420.1464426"},{"key":"ref_8","unstructured":"Vaudenay, S. (2005). A Classical Introduction to Cryptography, Springer."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., and Maisel, W.H. (2008, January 18\u201322). Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. Proceedings of the IEEE Symposium on Security and Privacy, 2008 (SP 2008), Oakland, CA, USA.","DOI":"10.1109\/SP.2008.31"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Pecora, L.M., and Carroll, T.L. (1991). Driving systems with chaotic signals. Phys. Rev. A, 44.","DOI":"10.1103\/PhysRevA.44.2374"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1016\/j.chaos.2005.11.057","article-title":"Digital color image encoding and decoding using a novel chaotic random generator","volume":"32","author":"Nien","year":"2007","journal-title":"Chaos Solitons Fractals"},{"key":"ref_12","unstructured":"Bing, Q., Liang-rui, T., Jing, L., and Yi, S. (2008, January 12\u201315). A new chaotic secure communication system. Proceedings of the 2nd International Conference on Wireless, Mobile and Multimedia Networks, Beijing, China."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1109\/81.873879","article-title":"Lorenz-based chaotic cryptosystem: A monolithic implementation","volume":"47","author":"Gonzales","year":"2000","journal-title":"IEEE Trans. Circuits Syst. I Fundam. Theory Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","article-title":"A chaotic image encryption algorithm based on perceptron model","volume":"62","author":"Wang","year":"2010","journal-title":"Nonlinear Dyn."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","article-title":"Chaos-based image encryption algorithm","volume":"346","author":"Guan","year":"2005","journal-title":"Phys. Lett. A"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","article-title":"Color image encryption using spatial bit-level permutation and high-dimension chaotic system","volume":"248","author":"Liu","year":"2011","journal-title":"Opt. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","article-title":"A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system","volume":"85","author":"Wei","year":"2012","journal-title":"J. Syst. Softw."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Belkhouja, T., Mohamed, A., Al-Ali, A.K., Du, X., and Guizani, M. (2017, January 1\u20134). Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system (invited paper). Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM), Rabat, Morocco.","DOI":"10.1109\/WINCOM.2017.8238203"},{"key":"ref_19","unstructured":"Short, K.M. (1995). Unmasking a modulated chaotic communications scheme. Int. J. Bifurcat Chaos, 6."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/0375-9601(95)00603-Z","article-title":"Coding the chaos in a semiconductor diode for information transmission","volume":"206","author":"Li","year":"1995","journal-title":"Phys. Lett. A"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/S0375-9601(05)80009-X","article-title":"Secure communication using small time continuous feedback","volume":"197","author":"Yu","year":"1995","journal-title":"Phys. Lett. A"},{"key":"ref_22","unstructured":"Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A. (2001). Handbook of Applied Cryptography, CRC Press."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF01608556","article-title":"A Two-Dimensional Mapping with a Strange Attractor","volume":"50","author":"Henon","year":"1976","journal-title":"Commun. Math. Phys."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Richter, H. (2002). The generalized Henon maps: Examples for higher-dimensional chaos. Int. J. Bifurcation Chaos, 12.","DOI":"10.1142\/S0218127402005121"},{"key":"ref_25","first-page":"2419","article-title":"Dynamical Properties of the H\u00e9non Mapping","volume":"6","year":"2012","journal-title":"Int. J. Math. Anal."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Xiao, L., Greenstein, L., Mandayam, N., and Trappe, W. (2007, January 24\u201328). Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. Proceedings of the IEEE International Conference on Communications, Glasgow, UK.","DOI":"10.1109\/ICC.2007.767"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1109\/TWC.2009.071278","article-title":"Stream-based Cipher Feedback Mode in Wireless Error Channel","volume":"8","author":"Xiao","year":"2009","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","article-title":"An Effective Key Management Scheme for Heterogeneous Sensor Networks","volume":"5","author":"Du","year":"2007","journal-title":"Ad Hoc Netw."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.ins.2016.07.019","article-title":"A lightweight live memory forensic approach based on hardware virtualization","volume":"379","author":"Cheng","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Beierle, C., Jovanovic, P., Lauridsen, M.M., Leander, G., and Rechberger, C. (2015, January 20\u201324). Analyzing Permutations for AES-like Ciphers: Understanding Shift Rows. Proceedings of the Conference: Topics in Cryptology (CT-RSA), San Francisco, CA, USA.","DOI":"10.1007\/978-3-319-16715-2_3"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Van Tilborg, H.C.A., and Jajodia, S. (2005). Encyclopedia of Cryptography and Security, Springer.","DOI":"10.1007\/0-387-23483-7"},{"key":"ref_32","unstructured":"Li, C., Raghunathan, A., and Jha, N.K. (2011, January 13\u201315). Hijacking an Insulin Pump: Security Attacks and Defenses for a Diabetes Therapy System. Proceedings of the IEEE 13th International Conference on e-Health Networking, Applications and Services, Columbia, MO, USA."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication Theory of Secrecy Systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"key":"ref_34","unstructured":"National Institute of Standards and Technology (2001). The Keved-Hash Message Authentication Code, Federal Information Processing Standards Publication."},{"key":"ref_35","unstructured":"Ray, J., and Koopman, P. (2006, January 25\u201328). Efficient High Hamming Distance CRCs for Embedded Networks. Proceedings of the International Conference on Dependable Systems and Networks, Philadelphia, PA, USA."},{"key":"ref_36","unstructured":"National Institute of Standards and Technology (2010). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications."},{"key":"ref_37","first-page":"137","article-title":"Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen nxn S-Boxes","volume":"9","author":"Vergili","year":"2001","journal-title":"Turk. J. Electr. Eng."},{"key":"ref_38","first-page":"307","article-title":"System Architecture of a Wireless Body Area Sensor Network for Ubiquitous Health Monitoring","volume":"1","author":"Otto","year":"2006","journal-title":"J. Mob. Multimed."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MVT.2016.2520492","article-title":"In Vivo Communications: Steps Toward the Next Generation of Implantable Devices","volume":"11","author":"Demir","year":"2016","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_40","unstructured":"Yazdandoost, K.Y., and Sayrafian-Pour, K. (2009). IEEE P802.15-08-0780-09-0006 Channel Model for Body Area Network (BAN), IEEE."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Cotton, S.L., and Scanlon, W.G. (2006, January 11\u201314). A Statistical Analysis of Indoor Multipath Fading for a Narrowband Wireless Body Area Network. Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, Finland.","DOI":"10.1109\/PIMRC.2006.254266"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Wang, J., and Wang, Q. (2013). Body Area Communications: Channel Modeling, Communication Systems, and EMC, IEEE Press.","DOI":"10.1002\/9781118188491"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Marin, E., Singele, D., Yang, B., Verbauwhede, I., and Preneel, B. (2016, January 9\u201311). On the Feasibility of Cryptography for a Wireless Insulin Pump System. Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA.","DOI":"10.1145\/2857705.2857746"},{"key":"ref_44","unstructured":"Xilinx (2011). Spartan-6 Family Overview, Xilinx."},{"key":"ref_45","unstructured":"Xilinx (2012). ISim User Guide, Xilinx."}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/7\/2\/21\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:03:53Z","timestamp":1760195033000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/7\/2\/21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,11]]},"references-count":45,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,6]]}},"alternative-id":["jsan7020021"],"URL":"https:\/\/doi.org\/10.3390\/jsan7020021","relation":{},"ISSN":["2224-2708"],"issn-type":[{"type":"electronic","value":"2224-2708"}],"subject":[],"published":{"date-parts":[[2018,5,11]]}}}