A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT)

被引:2
作者
Chaudhari, Dipalee Ashok [1 ,2 ]
Umamaheswari, Ekambaram [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai Campus, Chennai, Tamil Nadu, India
[2] DY Patil Coll Engn, Pune, Maharashtra, India
来源
BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK | 2021年 / 66卷 / 01期
关键词
authentication; encryption; hash function; medical data transmission; XOR function; COMMUNICATION; CHALLENGES; DEVICES; SYSTEM; CARE;
D O I
10.1515/bmt-2019-0123
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Internet of Things (IoT) plays a prominent role in health-care of patients, which assist the physicians and patients through the assistance in effective decision-making and additionally, in the medical field, IoT plays a significant role in real-time monitoring of the patients. Even though the data provided by the IoT devices ensure the effective decision-making, the data is susceptible to the network attacks. Thus, the paper proposes an authentication protocol for enabling the secure data transmission in IoT based on three functions, such as encryption function, hashing function, and adaptive XOR function. The proposed authentication protocol is named as, Adaptive XOR, hashing and Encryption Key Exchange (AXHE) protocol, which is the combination of the functions, such as encryption function, hashing function, and adaptive XOR function. The protocol ensures the security in the communication through two successive phases, such as registration and authentication of the user, where the user name, password, public keys, private keys, and security factor are employed. The authentication is progressed as seven levels and whenever the security factor matches, the user is authenticated and the communication continues. The analysis of the proposed AXHE is performed using 50 and 100 nodes in the presence of DOS and black hole attacks, which acquires the detection rate, throughput, and detection delay of 0.3859, 0.32, and 6.535 s, respectively.
引用
收藏
页码:91 / 105
页数:15
相关论文
共 30 条
[1]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[2]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[3]   Smart card-based secure authentication protocol in multi-server IoT environment [J].
Bae, Won-il ;
Kwak, Jin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) :15793-15811
[4]  
Bhunia SS, 2017, 2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P84
[5]   RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning [J].
Chatterjee, Baibhab ;
Das, Debayan ;
Maity, Shovan ;
Sen, Shreyas .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :388-398
[6]   Internet of Things security and forensics: Challenges and opportunities [J].
Conti, Mauro ;
Dehghantanha, Ali ;
Franke, Katrin ;
Watson, Steve .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :544-546
[7]   BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network [J].
Gope, Prosanta ;
Hwang, Tzonelih .
IEEE SENSORS JOURNAL, 2016, 16 (05) :1368-1376
[8]   A Lightweight Vulnerability Mitigation Framework for IoT Devices [J].
Hadar, Noy ;
Siboni, Shachar ;
Elovici, Yuval .
PROCEEDINGS OF THE 2017 WORKSHOP ON INTERNET OF THINGS SECURITY AND PRIVACY (IOT S&P'17), 2017, :71-75
[9]   Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices [J].
Han, Kun-Hee ;
Bae, Woo-Sik .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (04) :2335-2341
[10]   Robust Biometrics-Based Authentication Scheme for Multiserver Environment [J].
He, Debiao ;
Wang, Ding .
IEEE SYSTEMS JOURNAL, 2015, 9 (03) :816-823