Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme

被引:3
作者
Abikoye, Oluwakemi Christiana [1 ]
Oladipupo, Esau Taiwo [2 ]
Imoize, Agbotiname Lucky [3 ,4 ]
Awotunde, Joseph Bamidele [1 ]
Lee, Cheng-Chi [5 ,6 ]
Li, Chun-Ta [7 ]
机构
[1] Univ Ilorin, Fac Informat & Commun Sci, Dept Comp Sci, Ilorin 240003, Nigeria
[2] Fed Polytech Bida, Dept Comp Sci, Bida 912211, Nigeria
[3] Univ Lagos, Fac Engn, Dept Elect & Elect Engn, Lagos 100213, Nigeria
[4] Ruhr Univ, Inst Digital Commun, Dept Elect Engn & Informat Technol, D-44801 Bochum, Germany
[5] Fu Jen Catholic Univ, Res & Dev Ctr Phys Educ Hlth & Informat Technol, Dept Lib & Informat Sci, New Taipei 24206, Taiwan
[6] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[7] Fu Jen Catholic Univ, Bachelors Program Artificial Intelligence & Inform, 510 Zhongzheng Rd, New Taipei 24206, Taiwan
关键词
Internet of Medical Things; healthcare data; elliptic curve cryptography; privacy preservation; Caesar cipher; security; ENCRYPTION;
D O I
10.3390/fi15030099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of the Internet of Medical Things (IoMT) in medical systems has brought much ease in discharging healthcare services by medical practitioners. However, the security and privacy preservation of critical user data remain the reason the technology has not yet been fully maximized. Undoubtedly, a secure IoMT model that preserves individual users' privacy will enhance the wide acceptability of IoMT technology. However, existing works that have attempted to solve these privacy and insecurity problems are not space-conservative, computationally intensive, and also vulnerable to security attacks. In this paper, an IoMT-based model that conserves the privacy of the data, is less computationally intensive, and is resistant to various cryptanalysis attacks is proposed. Specifically, an efficient privacy-preserving technique where an efficient searching algorithm through encrypted data was used and a hybrid cryptography algorithm that combines the modification of the Caesar cipher with the Elliptic Curve Diffie Hellman (ECDH) and Digital Signature Algorithm (DSA) were projected to achieve user data security and privacy preservation of the patient. Furthermore, the modified algorithm can secure messages during transmission, perform key exchanges between clients and healthcare centres, and guarantee user authentication by authorized healthcare centres. The proposed IoMT model, leveraging the hybrid cryptography algorithm, was analysed and compared against different security attacks. The analysis results revealed that the model is secure, preserves the privacy of critical user information, and shows robust resistance against different cryptanalysis attacks.
引用
收藏
页数:33
相关论文
共 74 条
[1]  
Adjedj M, 2009, LECT NOTES COMPUT SC, V5905, P86, DOI 10.1007/978-3-642-10772-6_8
[2]   Application of Internet of Things and Sensors in Healthcare [J].
Al-Kahtani, Mohammad S. ;
Khan, Faheem ;
Taekeun, Whangbo .
SENSORS, 2022, 22 (15)
[3]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[4]   Suggested Integral Analysis for Chaos-Based Image Cryptosystems [J].
Angel Murillo-Escobar, Miguel ;
Omar Meranza-Castillon, Manuel ;
Martha Lopez-Gutierrez, Rosa ;
Cruz-Hernandez, Cesar .
ENTROPY, 2019, 21 (08)
[5]  
[Anonymous], 2017, INTERNET THINGS INTE
[6]  
Arbat H., 2016, IMP J INTERDISCIP RE, V2, P300
[7]  
Baldassarre G., 2018, P 22 INT DAT ENG APP, P157
[8]   The MIoT paradigm: Main features and an "ad-hoc" crawler [J].
Baldassarre, Giorgio ;
Lo Giudice, Paolo ;
Musarella, Lorenzo ;
Ursino, Domenico .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 :29-42
[9]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
[10]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506