End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC

被引:1
|
作者
Moosavi, Sanaz Rahimi [1 ]
Izadifar, Arman [1 ]
机构
[1] Calif State Univ Dominguez Hills CSUDH, Carson, CA 90747 USA
关键词
Deoxyribonucleic Acid (DNA); Elliptic curve cryptography; E-health system; End-to-end security;
D O I
10.1007/978-3-030-96057-5_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, the amount of data produced and stored in computing Internet of Things (IoT) devices is growing. Massive volumes of sensitive information are exchanged between these devices making it critical to ensure the security of these data. Cryptography is a widely used method for ensuring data security. Many lightweight cryptographic algorithms have been developed to address the limitations of resources on the IoT devices. Such devices have limited processing capabilities in terms of memory, processing power, storage, etc. The primary goal of exploiting cryptographic technique is to send data from the sender to the receiver in the most secure way to prevent eavesdropping of the content of the original data. In this paper, we propose an end-to-end security scheme for IoT system. The proposed scheme consists of (i) a secure and efficient mutual authentication scheme based on the Elliptic Curve Cryptography (ECC) and the Quark lightweight hash design, and (ii) a secure end-to-end communication based on Deoxyribonucleic Acid (DNA) and ECC. DNA Cryptography is the cryptographic technique to encrypt and decrypt the original data using DNA sequences based on its biological processes. It is a novel technique to hide data from unauthorized access with the help of DNA. The security analysis of the proposed scheme reveals that it is secure against the relevant threat models and provides a higher security level than the existing related work in the literature.
引用
收藏
页码:77 / 89
页数:13
相关论文
共 50 条
  • [1] An end-to-end secure key management protocol for e-health applications
    Abdmeziem, Mohammed Riyadh
    Tandjaoui, Djamel
    COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 : 184 - 197
  • [2] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
    Nashwan, Shadi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 607 - 642
  • [3] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [4] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Wujun Zhang
    Yueyu Zhang
    Jie Chen
    Hui Li
    Yumin Wang
    Cluster Computing, 2013, 16 : 861 - 871
  • [5] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Zhang, Wujun
    Zhang, Yueyu
    Chen, Jie
    Li, Hui
    Wang, Yumin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
  • [6] End-to-end security validation of IoT systems based on digital twins of end-devices
    Maillet-Contoz, Laurent
    Michel, Emmanuel
    Nava, Mario Diaz
    Brun, Paul-Emmanuel
    Lepretre, Kevin
    Massot, Guillemette
    2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,
  • [7] End-to-end privacy preserving scheme for IoT-based healthcare systems
    Maryam Nasr Esfahani
    Behrouz Shahgholi Ghahfarokhi
    Shahram Etemadi Borujeni
    Wireless Networks, 2021, 27 : 4009 - 4037
  • [8] End-to-end privacy preserving scheme for IoT-based healthcare systems
    Nasr Esfahani, Maryam
    Shahgholi Ghahfarokhi, Behrouz
    Etemadi Borujeni, Shahram
    WIRELESS NETWORKS, 2021, 27 (06) : 4009 - 4037
  • [9] Efficient End-to-End Security Scheme for Privacy-Preserving in IoT
    Harbi, Yasmine
    Refoufi, Allaoua
    Aliouat, Zibouda
    Harous, Saad
    2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 94 - 99
  • [10] End-to-end security scheme for mobility enabled healthcare Internet of Things
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Nigussie, Ethiopia
    Rahmani, Amir M.
    Virtanen, Seppo
    Tenhunen, Hannu
    Isoaho, Jouni
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 108 - 124