End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC

被引:1
|
作者
Moosavi, Sanaz Rahimi [1 ]
Izadifar, Arman [1 ]
机构
[1] Calif State Univ Dominguez Hills CSUDH, Carson, CA 90747 USA
来源
SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2021 | 2022年 / 1536卷
关键词
Deoxyribonucleic Acid (DNA); Elliptic curve cryptography; E-health system; End-to-end security;
D O I
10.1007/978-3-030-96057-5_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, the amount of data produced and stored in computing Internet of Things (IoT) devices is growing. Massive volumes of sensitive information are exchanged between these devices making it critical to ensure the security of these data. Cryptography is a widely used method for ensuring data security. Many lightweight cryptographic algorithms have been developed to address the limitations of resources on the IoT devices. Such devices have limited processing capabilities in terms of memory, processing power, storage, etc. The primary goal of exploiting cryptographic technique is to send data from the sender to the receiver in the most secure way to prevent eavesdropping of the content of the original data. In this paper, we propose an end-to-end security scheme for IoT system. The proposed scheme consists of (i) a secure and efficient mutual authentication scheme based on the Elliptic Curve Cryptography (ECC) and the Quark lightweight hash design, and (ii) a secure end-to-end communication based on Deoxyribonucleic Acid (DNA) and ECC. DNA Cryptography is the cryptographic technique to encrypt and decrypt the original data using DNA sequences based on its biological processes. It is a novel technique to hide data from unauthorized access with the help of DNA. The security analysis of the proposed scheme reveals that it is secure against the relevant threat models and provides a higher security level than the existing related work in the literature.
引用
收藏
页码:77 / 89
页数:13
相关论文
共 50 条
  • [31] New mechanisms for end-to-end security using IPSec in NAT-based private networks
    Kim, SY
    Shin, JW
    Sim, SY
    Park, DS
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 548 - 557
  • [32] TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE
    Hossain, M. Shamim
    Muhammad, Ghulam
    Rahman, Sk Md Mizanur
    Abdul, Wadood
    Alelaiwi, Abdulhameed
    Alamri, Atif
    IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 44 - 51
  • [33] Sizzle: A standards based end-to-end security architecture for the embedded Internet
    Gupta, V
    Millard, M
    Fung, S
    Zhu, Y
    Gura, N
    Eberle, H
    Shantz, SC
    Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 247 - 256
  • [34] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [35] An efficient identity-based cryptosystem for end-to-end mobile security
    Hwu, Jing-Shyang
    Chen, Rong-Jaye
    Lin, Yi-Bing
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (09) : 2586 - 2593
  • [36] Standards-based End-to-End IP Security for the Internet of Things
    Hummen, Rene
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [37] Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems
    Esfahani, Maryam Nasr
    Ghahfarokhi, Behrouz Shahgholi
    Borujeni, Shahram Etemadi
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (02): : 2067 - 2127
  • [38] On the Security of End-to-End Measurements Based on Packet-Pair Dispersions
    Karame, Ghassan O.
    Danev, Boris
    Bannwart, Cyrill
    Capkun, Srdjan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 149 - 162
  • [39] Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems
    Maryam Nasr Esfahani
    Behrouz Shahgholi Ghahfarokhi
    Shahram Etemadi Borujeni
    The Journal of Supercomputing, 2024, 80 : 2067 - 2127
  • [40] Trust assessment of security for e-health systems
    Bahtiyar, Erif
    Caglayan, Mehmet Ufuk
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2014, 13 (03) : 164 - 177