Abstract
Internet of Things (IoT) plays a prominent role in health-care of patients, which assist the physicians and patients through the assistance in effective decision-making and additionally, in the medical field, IoT plays a significant role in real-time monitoring of the patients. Even though the data provided by the IoT devices ensure the effective decision-making, the data is susceptible to the network attacks. Thus, the paper proposes an authentication protocol for enabling the secure data transmission in IoT based on three functions, such as encryption function, hashing function, and adaptive XOR function. The proposed authentication protocol is named as, Adaptive XOR, hashing and Encryption Key Exchange (AXHE) protocol, which is the combination of the functions, such as encryption function, hashing function, and adaptive XOR function. The protocol ensures the security in the communication through two successive phases, such as registration and authentication of the user, where the user name, password, public keys, private keys, and security factor are employed. The authentication is progressed as seven levels and whenever the security factor matches, the user is authenticated and the communication continues. The analysis of the proposed AXHE is performed using 50 and 100 nodes in the presence of DOS and black hole attacks, which acquires the detection rate, throughput, and detection delay of 0.3859, 0.32, and 6.535 s, respectively.
Research funding: Authors state no funding involved.
Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission.
Competing interests: Authors state no conflict of interest.
Informed consent: Informed consent was obtained from all individuals included in this study.
References
1. UN. World population aging. New York; 2013:pp. 8–10, vol. 2013.10.1016/S0262-1762(13)70314-6Search in Google Scholar
2. Gope, P, Hwang, T. BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sens J 2016;16:1368–76. https://doi.org/10.1109/jsen.2015.2502401.Search in Google Scholar
3. Weinstein, R. RFID: a technical overview and its application to the enterprise. IEEE IT Profess 2005;7:27–33. https://doi.org/10.1109/mitp.2005.69.Search in Google Scholar
4. Shende, DK, Jagtap, SS, Kanade, MB. IOT based energy meter billing and monitoring system. J Sci Res Devel 2019;7:984–6.Search in Google Scholar
5. Shende, DK, Nikhil, S. IoT based geographic multicast routing protocol with DPA through WSN. J Cre Res Thou 2018;6:578–84.Search in Google Scholar
6. Huang, H, Gong, T, Ye, N, Wang, R, Dou, Y. Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Trans Indus Info 2017;13:1227–37. https://doi.org/10.1109/tii.2017.2687618.Search in Google Scholar
7. Sawand, A, Djahel, S, Zhang, Z, Naït-Abdesselam, F. Toward energy-efficient and trustworthy eHealth monitoring system. China Comm 2015;12:46–65. https://doi.org/10.1109/cc.2015.7084383.Search in Google Scholar
8. Shin, MS, Jeon, HS, Ju, YW, Lee, BJ, Jeong, SP. Constructing RBAC based security model in u-healthcare service platform. Sci World J 2015;2015:937914. https://doi.org/10.1155/2015/937914.Search in Google Scholar PubMed PubMed Central
9. Bhunia, SS, Gurusamy, M. Dynamic attack detection and mitigation in IoT using SDN. In: Proc 27th In Tele Net and App Conf (ITNAC). Melbourne, VIC: Australia; 2017:pp. 1–6.10.1109/ATNAC.2017.8215418Search in Google Scholar
10. Moosavi, SR, Gia, TN, Nigussie, E, Rahmani, AM, Virtanen, S, Tenhunen, H, et al. End-to-End security scheme for mobility enabled healthcare Internet of Things. Future Gener Comput Syst 2016;64:108–24. https://doi.org/10.1016/j.future.2016.02.020.Search in Google Scholar
11. Chatterjee, B, Das, D, Maity, S, Sen, S. RF-PUF: enhancing IoT security through authentication of wireless nodes using In-situ machine learning. IEEE Internet Things J 2019;6:388–98. https://doi.org/10.1109/jiot.2018.2849324.Search in Google Scholar
12. Conti, M, Dehghantanha, A, Franke, K, Watson, S. Internet of Things security and forensics: challenges and opportunities. Future Gener Comput Syst 2018;78:544–6. https://doi.org/10.1016/j.future.2017.07.060.Search in Google Scholar
13. Zhou, J, Cao, Z, Dong, X, Vasilakos, AV. Security and privacy for cloud-based IoT: challenges. IEEE Com Mag 2017;55:26–33. https://doi.org/10.1109/mcom.2017.1600363cm.Search in Google Scholar
14. Ammar, M, Russello, G, Crispo, B. Internet of Things: a survey on the security of IoT frameworks. J Info Sec Appl 2018;38:8–27. https://doi.org/10.1016/j.jisa.2017.11.002.Search in Google Scholar
15. Bae, W, Kwak, J. Smart card-based secure authentication protocol in multi-server IoT environment. Multi Tools Appl 2017:1–19. https://doi.org/10.1007/s11042-017-5548-2.Search in Google Scholar
16. Amin, R, Kumar, N, Biswas, GP, Iqbal, R, Chang, V. A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Future Gener Comput Syst 2018;78:1005–19. https://doi.org/10.1016/j.future.2016.12.028.Search in Google Scholar
17. Yuen, KK, Shim, WH, Ting, TT, Teoh, CK. An Insight into current IoT security methods. J Tele Electr Comput Eng 2018;10:121–5.Search in Google Scholar
18. Xiao, L, Wan, X, Lu, X, Zhang, Y, Wu, D. IoT security techniques based on machine learning. Cry Sec 2018.Search in Google Scholar
19. Yan, Q, Huang, W, Lu, X, Gong, Q, Yu, FR. A multi-level DDoS mitigation framework for the industrial Internet of things. IEEE Comput Mag 2018;56:30–6. https://doi.org/10.1109/mcom.2018.1700621.Search in Google Scholar
20. Hadar, N, Siboni, S, Elovici, Y. A Lightweight vulnerability mitigation framework for IoT devices. In: Proc of the 2017 Wor on In Thi Sec and Pri; 2017:pp. 71–5. Dallas, Texas, USA.10.1145/3139937.3139944Search in Google Scholar
21. Kalkan, K, Zeadally, S. Securing Internet of things (IoT) with Software defined networking (SDN). IEEE Comput Mag 2018;56:186–92. https://doi.org/10.1109/mcom.2017.1700714.Search in Google Scholar
22. Sen, S, Koo, J, Bagchi, S. TRIFECTA: security, energy efficiency, and communication capacity comparison for wireless IoT devices. IEEE Inter Comput 2018;22:74–81. https://doi.org/10.1109/mic.2018.011581520.Search in Google Scholar
23. Rothenberger, B, Perrig, A. Effect mitigation of IoT attacks in future Internet architectures. 2017.Search in Google Scholar
24. Vijayakumar, P, Pandiaraja, P, Karuppiah, M, Deborah, LJ. An efficient secure communication for healthcare system using wearable devices. Comput Electr Eng 2017;63:232–45. https://doi.org/10.1016/j.compeleceng.2017.04.014.Search in Google Scholar
25. Yeh, KH. A secure IoT-based healthcare system with body sensor networks. IEEE Acc 2016;4:10288–99. https://doi.org/10.1109/access.2016.2638038.Search in Google Scholar
26. Yang, Y, Zheng, X, Tang, C. Lightweight distributed secure data management system for health Internet of things. J Net Comput Appl 2016;89:26–37. https://doi.org/10.1016/j.jnca.2016.11.017.Search in Google Scholar
27. Han, KH, Bae, WS. Proposing and verifying a security-enhanced protocol for IoT.-based communication for medical devices. Clust Comput 2016;19:2335–41. https://doi.org/10.1007/s10586-016-0669-3.Search in Google Scholar
28. Ning, H, Liu, H, Yang, LT. Aggregated-proof based hierarchical authentication scheme for the Internet of Things. IEEE Trans Paral Dist Syst 2015;26:657–67. https://doi.org/10.1109/tpds.2014.2311791.Search in Google Scholar
29. Odelu, V, Das, AK, Goswami, A. A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Info Fore Sec 2015;10:1953–66. https://doi.org/10.1109/tifs.2015.2439964.Search in Google Scholar
30. He, D, Wang, D. Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 2014;9:816–23. https://doi.org/10.1109/JSYST.2014.2301517.Search in Google Scholar
© 2020 Walter de Gruyter GmbH, Berlin/Boston