End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC

被引:1
|
作者
Moosavi, Sanaz Rahimi [1 ]
Izadifar, Arman [1 ]
机构
[1] Calif State Univ Dominguez Hills CSUDH, Carson, CA 90747 USA
关键词
Deoxyribonucleic Acid (DNA); Elliptic curve cryptography; E-health system; End-to-end security;
D O I
10.1007/978-3-030-96057-5_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, the amount of data produced and stored in computing Internet of Things (IoT) devices is growing. Massive volumes of sensitive information are exchanged between these devices making it critical to ensure the security of these data. Cryptography is a widely used method for ensuring data security. Many lightweight cryptographic algorithms have been developed to address the limitations of resources on the IoT devices. Such devices have limited processing capabilities in terms of memory, processing power, storage, etc. The primary goal of exploiting cryptographic technique is to send data from the sender to the receiver in the most secure way to prevent eavesdropping of the content of the original data. In this paper, we propose an end-to-end security scheme for IoT system. The proposed scheme consists of (i) a secure and efficient mutual authentication scheme based on the Elliptic Curve Cryptography (ECC) and the Quark lightweight hash design, and (ii) a secure end-to-end communication based on Deoxyribonucleic Acid (DNA) and ECC. DNA Cryptography is the cryptographic technique to encrypt and decrypt the original data using DNA sequences based on its biological processes. It is a novel technique to hide data from unauthorized access with the help of DNA. The security analysis of the proposed scheme reveals that it is secure against the relevant threat models and provides a higher security level than the existing related work in the literature.
引用
收藏
页码:77 / 89
页数:13
相关论文
共 50 条
  • [21] Enhanced Security Framework for E-Health Systems using Blockchain
    Kubendiran, Mohan
    Singh, Satyapal
    Sangaiah, Arun Kumar
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (02): : 239 - 250
  • [22] A Unified End-to-End Security Scheme for Machine-Type Communication in LTE Networks
    Lai, Chengzhe
    Li, Hui
    Lu, Rongxing
    Shen, Xuemin
    Cao, Jin
    2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2013, : 698 - 703
  • [23] P-SIGMA: security aware paging in end-to-end mobility management scheme
    Reaz, Abu
    Roy, Rajesh
    Atiquzzaman, Mohammed
    WIRELESS NETWORKS, 2013, 19 (08) : 2049 - 2065
  • [24] KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY.
    Kasami, Tadao
    Yamamura, Saburo
    Mori, Kenichi
    Systems, computers, controls, 1982, 13 (03): : 59 - 69
  • [25] P-SIGMA: security aware paging in end-to-end mobility management scheme
    Abu Reaz
    Rajesh Roy
    Mohammed Atiquzzaman
    Wireless Networks, 2013, 19 : 2049 - 2065
  • [26] An Approach for End-to-End (E2E) Security of 5G Applications
    Kumari, K. Anitha
    Sadasivam, G. Sudha
    Gowri, S. Shymala
    Akash, Sebastin Arockia
    Radhika, E. G.
    2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 133 - 138
  • [27] End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
    Dildar, Muhammad Shahid
    Khan, Adnan Shahid
    Abbasi, Irshad Ahmed
    Akhtar, Reema Shaheen Naseem
    Al Ruqaishi, Khalil
    Sarwar, Shakeel Ahmed Ghulam
    IEEE ACCESS, 2025, 13 : 20584 - 20598
  • [28] End-to-end security implementation for mobile devices using TLS protocol
    Baris Kayayurt
    Tugkan Tuglular
    Journal in Computer Virology, 2006, 2 (1): : 87 - 97
  • [29] Providing End-to-End Security Using Quantum Walks in IoT Networks
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    Elwahsh, Haitham
    Piran, Md Jalil
    Bashir, Ali Kashif
    Song, Oh-Young
    Mazurczyk, Wojciech
    IEEE ACCESS, 2020, 8 : 92687 - 92696
  • [30] End-to-end security implementation for mobile devices using TLS protocol
    Kayayurt, Baris
    Tuglular, Tugkan
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 87 - 97