Chaos Based Enhanced RC5 Algorithm for Security and Integrity of Clinical Images in Remote Health Monitoring

The demand for remote health monitoring will significantly increase in the near future due to a decrease in the doctor/patient ratio as the world population grows. In remote health monitoring, one of the major goals is to send patient’s data to clinical experts at geographically distant locations. In this scenario, the importance of implementing security on patients’ clinical information increases, so that this could not be either changed or read by an unauthorized person. Rivest Cipher (RC5) algorithm is a secure and simple encryption algorithm. Due to its simplicity, fast encryption, and low memory requirements, it is considered as a suitable block cipher for resource constraint environments, such as body area networks (BAN), although it can be broken by various attacks due to poor diffusion. In this paper, we propose a chaotic-based key scheduling algorithm for the RC5 in which round keys are generated based on 2-D chaotic maps and used as a symmetric key during the encryption and decryption process. Cipher feedback mode is adapted to further increase the diffusion property of the cipher. This chaos-based key is very difficult to trace, and the cipher is extremely hard to break. A strict security analysis of the proposed cipher is performed against several attacks. The experimental results have shown that the impact of this approach is significantly better than the conventional security mechanisms in case of BAN when applied to critical clinical images.

[1]  Vallipuram Muthukkumarasamy,et al.  Performance Evaluation of Block Ciphers for Wireless Sensor Networks , 2016 .

[2]  Kyung Sup Kwak,et al.  Hybrid security mechanisms for wireless body area networks , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).

[3]  Ahmed H. Tewfik,et al.  Geometric Invariance in image watermarking , 2004, IEEE Transactions on Image Processing.

[4]  Christina Synowiec,et al.  E-health in low- and middle-income countries: findings from the Center for Health Market Innovations. , 2012, Bulletin of the World Health Organization.

[5]  Kyung Sup Kwak,et al.  An efficient certificateless remote anonymous authentication scheme for wireless body area networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[6]  Kyung Sup Kwak,et al.  A Study of Implanted and Wearable Body Sensor Networks , 2008, KES-AMSTA.

[7]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[8]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..

[9]  Athanasios V. Vasilakos,et al.  ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[10]  Ljupco Kocarev,et al.  Chaotic block ciphers: from theory to practical algorithms , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[11]  Lu Zhang,et al.  An Efficient and Lightweight Certificateless Authentication Protocol for Wireless Body Area Networks , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[12]  Ahmed G. Radwan,et al.  Generalized double-humped logistic map-based medical image encryption , 2018, Journal of advanced research.

[13]  Mudassar Ali,et al.  Performance analysis of chaotic FSO communication system under different weather conditions , 2018, Trans. Emerg. Telecommun. Technol..

[14]  Ming Li,et al.  Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[15]  Fan Zhang,et al.  OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.

[16]  Mohammed Feham,et al.  Trust Key Management Scheme for Wireless Body Area Networks , 2011, Int. J. Netw. Secur..

[17]  Bobby D. Gerardo,et al.  An enhanced RC5 (ERC5) algorithm based on simple random number key expansion technique , 2018, 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE).

[18]  Nikesh Bajaj,et al.  Enhancement of RC5 for image encryption , 2011, 2011 International Conference on Image Information Processing.

[19]  Henry O. Nyongesa,et al.  Using Wearable Sensors for Remote Healthcare Monitoring System , 2011, J. Sens. Technol..

[20]  Yue Wu,et al.  Image encryption using the two-dimensional logistic chaotic map , 2012, J. Electronic Imaging.

[21]  Mats Björkman,et al.  Communication and Security in Health Monitoring Systems -- A Review , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[22]  K.K. Venkatasubramanian,et al.  Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[23]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[24]  Pugalendhi Ganesh Kumar,et al.  Secured remote health monitoring system , 2017, Healthcare technology letters.

[25]  Heejo Lee,et al.  BARI: A Distributed Key Management Approach for Wireless Body Area Networks , 2009, 2009 International Conference on Computational Intelligence and Security.

[26]  Osama S. Farag Allah,et al.  Implementation of RC5 Block Cipher Algorithm for Image Cryptosystems , 2007 .

[27]  Miguel Angel Murillo-Escobar,et al.  A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine , 2017, Journal of Medical Systems.

[28]  Rengarajan Amirtharajan,et al.  Encryption and watermark-treated medical image against hacking disease - An immune convention in spatial and frequency domains , 2018, Comput. Methods Programs Biomed..

[29]  Naveed Khan,et al.  An LBP Based Key Management for Secure Wireless Body Area Network (WBAN) , 2013, 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.

[30]  D. Aju,et al.  An Efficient and Optimized RC5 Image Encryption Algorithm for Secured Image Transmission , 2015 .

[31]  Lauri Sydanheimo,et al.  RC5-based security in wireless sensor networks: utilization and performance , 2010 .

[32]  M. F. Abdollah,et al.  A biometric-based security for data authentication in Wireless Body Area Network (WBAN) , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[33]  Jin-Meng Ho,et al.  A versatile suite of strong authenticated key agreement protocols for body area networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[34]  Yang Li,et al.  Measurement of around-body creeping waves using wearable sensor modules , 2018, 2018 Texas Symposium on Wireless and Microwave Circuits and Systems (WMCS).

[35]  Jia Wang,et al.  An ECG-Based Signal Key Establishment Protocol in Body Area Networks , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.

[36]  Osama S. Faragallah,et al.  An enhanced chaotic key‐based RC5 block cipher adapted to image encryption , 2012 .

[37]  Musheer Ahmad,et al.  Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos , 2018, Symmetry.

[38]  Jiankun Hu,et al.  A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications , 2011, Secur. Commun. Networks.

[39]  Mudassar Ali,et al.  Secure Duobinary Signal Transmission in Optical Communication Networks for High Performance & Reliability , 2017, IEEE Access.