End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC

被引:1
|
作者
Moosavi, Sanaz Rahimi [1 ]
Izadifar, Arman [1 ]
机构
[1] Calif State Univ Dominguez Hills CSUDH, Carson, CA 90747 USA
来源
SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2021 | 2022年 / 1536卷
关键词
Deoxyribonucleic Acid (DNA); Elliptic curve cryptography; E-health system; End-to-end security;
D O I
10.1007/978-3-030-96057-5_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, the amount of data produced and stored in computing Internet of Things (IoT) devices is growing. Massive volumes of sensitive information are exchanged between these devices making it critical to ensure the security of these data. Cryptography is a widely used method for ensuring data security. Many lightweight cryptographic algorithms have been developed to address the limitations of resources on the IoT devices. Such devices have limited processing capabilities in terms of memory, processing power, storage, etc. The primary goal of exploiting cryptographic technique is to send data from the sender to the receiver in the most secure way to prevent eavesdropping of the content of the original data. In this paper, we propose an end-to-end security scheme for IoT system. The proposed scheme consists of (i) a secure and efficient mutual authentication scheme based on the Elliptic Curve Cryptography (ECC) and the Quark lightweight hash design, and (ii) a secure end-to-end communication based on Deoxyribonucleic Acid (DNA) and ECC. DNA Cryptography is the cryptographic technique to encrypt and decrypt the original data using DNA sequences based on its biological processes. It is a novel technique to hide data from unauthorized access with the help of DNA. The security analysis of the proposed scheme reveals that it is secure against the relevant threat models and provides a higher security level than the existing related work in the literature.
引用
收藏
页码:77 / 89
页数:13
相关论文
共 27 条
  • [1] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Zhang, Wujun
    Zhang, Yueyu
    Chen, Jie
    Li, Hui
    Wang, Yumin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
  • [2] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Wujun Zhang
    Yueyu Zhang
    Jie Chen
    Hui Li
    Yumin Wang
    Cluster Computing, 2013, 16 : 861 - 871
  • [3] End-to-end security scheme for mobility enabled healthcare Internet of Things
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Nigussie, Ethiopia
    Rahmani, Amir M.
    Virtanen, Seppo
    Tenhunen, Hannu
    Isoaho, Jouni
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 108 - 124
  • [4] Efficient End-to-End Security Scheme for Privacy-Preserving in IoT
    Harbi, Yasmine
    Refoufi, Allaoua
    Aliouat, Zibouda
    Harous, Saad
    2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 94 - 99
  • [5] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 603 - 604
  • [6] A New Security Scheme for E-health System
    Li, Wei
    Hoang, Doan
    PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, : 361 - 366
  • [7] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
  • [8] Enhanced Security Framework for E-Health Systems using Blockchain
    Kubendiran, Mohan
    Singh, Satyapal
    Sangaiah, Arun Kumar
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (02): : 239 - 250
  • [9] An Approach for End-to-End (E2E) Security of 5G Applications
    Kumari, K. Anitha
    Sadasivam, G. Sudha
    Gowri, S. Shymala
    Akash, Sebastin Arockia
    Radhika, E. G.
    2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 133 - 138
  • [10] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,