Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter August 24, 2020

A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT)

  • Dipalee Ashok Chaudhari EMAIL logo and Ekambaram Umamaheswari

Abstract

Internet of Things (IoT) plays a prominent role in health-care of patients, which assist the physicians and patients through the assistance in effective decision-making and additionally, in the medical field, IoT plays a significant role in real-time monitoring of the patients. Even though the data provided by the IoT devices ensure the effective decision-making, the data is susceptible to the network attacks. Thus, the paper proposes an authentication protocol for enabling the secure data transmission in IoT based on three functions, such as encryption function, hashing function, and adaptive XOR function. The proposed authentication protocol is named as, Adaptive XOR, hashing and Encryption Key Exchange (AXHE) protocol, which is the combination of the functions, such as encryption function, hashing function, and adaptive XOR function. The protocol ensures the security in the communication through two successive phases, such as registration and authentication of the user, where the user name, password, public keys, private keys, and security factor are employed. The authentication is progressed as seven levels and whenever the security factor matches, the user is authenticated and the communication continues. The analysis of the proposed AXHE is performed using 50 and 100 nodes in the presence of DOS and black hole attacks, which acquires the detection rate, throughput, and detection delay of 0.3859, 0.32, and 6.535 s, respectively.


Corresponding author: Dipalee Ashok Chaudhari, Research Scholar, School of Computer Science and Engineering, Vellore Institute of Technology, Chennai Campus, Chennai, India; and Assistant Professor, D.Y. Patil College of Engineering, Akurdi, Pune, India, E-mail:

  1. Research funding: Authors state no funding involved.

  2. Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission.

  3. Competing interests: Authors state no conflict of interest.

  4. Informed consent: Informed consent was obtained from all individuals included in this study.

References

1. UN. World population aging. New York; 2013:pp. 8–10, vol. 2013.10.1016/S0262-1762(13)70314-6Search in Google Scholar

2. Gope, P, Hwang, T. BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sens J 2016;16:1368–76. https://doi.org/10.1109/jsen.2015.2502401.Search in Google Scholar

3. Weinstein, R. RFID: a technical overview and its application to the enterprise. IEEE IT Profess 2005;7:27–33. https://doi.org/10.1109/mitp.2005.69.Search in Google Scholar

4. Shende, DK, Jagtap, SS, Kanade, MB. IOT based energy meter billing and monitoring system. J Sci Res Devel 2019;7:984–6.Search in Google Scholar

5. Shende, DK, Nikhil, S. IoT based geographic multicast routing protocol with DPA through WSN. J Cre Res Thou 2018;6:578–84.Search in Google Scholar

6. Huang, H, Gong, T, Ye, N, Wang, R, Dou, Y. Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Trans Indus Info 2017;13:1227–37. https://doi.org/10.1109/tii.2017.2687618.Search in Google Scholar

7. Sawand, A, Djahel, S, Zhang, Z, Naït-Abdesselam, F. Toward energy-efficient and trustworthy eHealth monitoring system. China Comm 2015;12:46–65. https://doi.org/10.1109/cc.2015.7084383.Search in Google Scholar

8. Shin, MS, Jeon, HS, Ju, YW, Lee, BJ, Jeong, SP. Constructing RBAC based security model in u-healthcare service platform. Sci World J 2015;2015:937914. https://doi.org/10.1155/2015/937914.Search in Google Scholar PubMed PubMed Central

9. Bhunia, SS, Gurusamy, M. Dynamic attack detection and mitigation in IoT using SDN. In: Proc 27th In Tele Net and App Conf (ITNAC). Melbourne, VIC: Australia; 2017:pp. 1–6.10.1109/ATNAC.2017.8215418Search in Google Scholar

10. Moosavi, SR, Gia, TN, Nigussie, E, Rahmani, AM, Virtanen, S, Tenhunen, H, et al. End-to-End security scheme for mobility enabled healthcare Internet of Things. Future Gener Comput Syst 2016;64:108–24. https://doi.org/10.1016/j.future.2016.02.020.Search in Google Scholar

11. Chatterjee, B, Das, D, Maity, S, Sen, S. RF-PUF: enhancing IoT security through authentication of wireless nodes using In-situ machine learning. IEEE Internet Things J 2019;6:388–98. https://doi.org/10.1109/jiot.2018.2849324.Search in Google Scholar

12. Conti, M, Dehghantanha, A, Franke, K, Watson, S. Internet of Things security and forensics: challenges and opportunities. Future Gener Comput Syst 2018;78:544–6. https://doi.org/10.1016/j.future.2017.07.060.Search in Google Scholar

13. Zhou, J, Cao, Z, Dong, X, Vasilakos, AV. Security and privacy for cloud-based IoT: challenges. IEEE Com Mag 2017;55:26–33. https://doi.org/10.1109/mcom.2017.1600363cm.Search in Google Scholar

14. Ammar, M, Russello, G, Crispo, B. Internet of Things: a survey on the security of IoT frameworks. J Info Sec Appl 2018;38:8–27. https://doi.org/10.1016/j.jisa.2017.11.002.Search in Google Scholar

15. Bae, W, Kwak, J. Smart card-based secure authentication protocol in multi-server IoT environment. Multi Tools Appl 2017:1–19. https://doi.org/10.1007/s11042-017-5548-2.Search in Google Scholar

16. Amin, R, Kumar, N, Biswas, GP, Iqbal, R, Chang, V. A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Future Gener Comput Syst 2018;78:1005–19. https://doi.org/10.1016/j.future.2016.12.028.Search in Google Scholar

17. Yuen, KK, Shim, WH, Ting, TT, Teoh, CK. An Insight into current IoT security methods. J Tele Electr Comput Eng 2018;10:121–5.Search in Google Scholar

18. Xiao, L, Wan, X, Lu, X, Zhang, Y, Wu, D. IoT security techniques based on machine learning. Cry Sec 2018.Search in Google Scholar

19. Yan, Q, Huang, W, Lu, X, Gong, Q, Yu, FR. A multi-level DDoS mitigation framework for the industrial Internet of things. IEEE Comput Mag 2018;56:30–6. https://doi.org/10.1109/mcom.2018.1700621.Search in Google Scholar

20. Hadar, N, Siboni, S, Elovici, Y. A Lightweight vulnerability mitigation framework for IoT devices. In: Proc of the 2017 Wor on In Thi Sec and Pri; 2017:pp. 71–5. Dallas, Texas, USA.10.1145/3139937.3139944Search in Google Scholar

21. Kalkan, K, Zeadally, S. Securing Internet of things (IoT) with Software defined networking (SDN). IEEE Comput Mag 2018;56:186–92. https://doi.org/10.1109/mcom.2017.1700714.Search in Google Scholar

22. Sen, S, Koo, J, Bagchi, S. TRIFECTA: security, energy efficiency, and communication capacity comparison for wireless IoT devices. IEEE Inter Comput 2018;22:74–81. https://doi.org/10.1109/mic.2018.011581520.Search in Google Scholar

23. Rothenberger, B, Perrig, A. Effect mitigation of IoT attacks in future Internet architectures. 2017.Search in Google Scholar

24. Vijayakumar, P, Pandiaraja, P, Karuppiah, M, Deborah, LJ. An efficient secure communication for healthcare system using wearable devices. Comput Electr Eng 2017;63:232–45. https://doi.org/10.1016/j.compeleceng.2017.04.014.Search in Google Scholar

25. Yeh, KH. A secure IoT-based healthcare system with body sensor networks. IEEE Acc 2016;4:10288–99. https://doi.org/10.1109/access.2016.2638038.Search in Google Scholar

26. Yang, Y, Zheng, X, Tang, C. Lightweight distributed secure data management system for health Internet of things. J Net Comput Appl 2016;89:26–37. https://doi.org/10.1016/j.jnca.2016.11.017.Search in Google Scholar

27. Han, KH, Bae, WS. Proposing and verifying a security-enhanced protocol for IoT.-based communication for medical devices. Clust Comput 2016;19:2335–41. https://doi.org/10.1007/s10586-016-0669-3.Search in Google Scholar

28. Ning, H, Liu, H, Yang, LT. Aggregated-proof based hierarchical authentication scheme for the Internet of Things. IEEE Trans Paral Dist Syst 2015;26:657–67. https://doi.org/10.1109/tpds.2014.2311791.Search in Google Scholar

29. Odelu, V, Das, AK, Goswami, A. A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Info Fore Sec 2015;10:1953–66. https://doi.org/10.1109/tifs.2015.2439964.Search in Google Scholar

30. He, D, Wang, D. Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 2014;9:816–23. https://doi.org/10.1109/JSYST.2014.2301517.Search in Google Scholar

Received: 2019-05-22
Accepted: 2020-06-16
Published Online: 2020-08-24
Published in Print: 2021-02-23

© 2020 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 29.4.2024 from https://www.degruyter.com/document/doi/10.1515/bmt-2019-0123/html
Scroll to top button