A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data

Mobile users are increasing exponentially to adopt ubiquitous services offered by various sectors. This has attracted attention for a secure communication framework to access e-health data on mobile devices. The wearable sensor device is attached to the patient’s body which monitors the blood pressure, body temperature, serum cholesterol, glucose level, etc. In the proposed secure framework, first, the task starts with the patient authentication, after that the sensors device linked to the patient is activated and the sensor values of the patient are transmitted to the cloud server. The patient’s biometrics information has been added as a parameter in addition to the user name and password. The authentication scheme is coined with the SHA-512 algorithm that ensures integrity. To securely send the sensor information, the method follows two kinds of encryption: Substitution-Ceaser cipher and improved Elliptical Curve Cryptography (IECC). Whereas in improved ECC, an additional key (secret key) is generated to enhance the system’s security. In this way, the intricacy of the two phases is augmented. The computational cost of the scheme in the proposed framework is <inline-formula> <tex-math notation="LaTeX">$4H+Ec+Dc$ </tex-math></inline-formula> which is less than the existing schemes. The average correlation coefficient value is about 0.045 which is close to zero shows the strength of the algorithm. The obtained encryption and decryption time are <inline-formula> <tex-math notation="LaTeX">$1.032~\mu s$ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">$1.004~\mu s$ </tex-math></inline-formula> respectively. The overall performance is analyzed by comparing the proposed improved ECC with existing Rivest–Shamir–Adleman (RSA)and ECC algorithms.

[1]  Xiong Li,et al.  A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks , 2016, Secur. Commun. Networks.

[2]  Wei Xiang,et al.  Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.

[3]  Azizi Harun,et al.  Internet of Things (IOT) Monitoring System for Elderly , 2018, 2018 International Conference on Intelligent and Advanced System (ICIAS).

[4]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[5]  S. El-Rabaie,et al.  Homomorphic image encryption , 2009, J. Electronic Imaging.

[6]  Mohamed Abdel-Basset,et al.  A novel group decision making model based on neutrosophic sets for heart disease diagnosis , 2019, Multimedia Tools and Applications.

[7]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[8]  Ahmed E. Youssef,et al.  A Framework for A Framework for A Framework for A Framework for SSSSeeeeccccure Cloud ure Cloud ure Cloud ure Cloud ComputingComputingComputingComputing , 2012 .

[9]  Lisandro Zambenedetti Granville,et al.  Internet of Things in healthcare: Interoperatibility and security issues , 2012, 2012 IEEE International Conference on Communications (ICC).

[10]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[11]  Snehal Chaudhari,et al.  The System for Early Detection of Heart-Attack , 2018 .

[12]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[13]  Kefei Chen,et al.  Efficient User Access Control Mechanism for Wireless Multimedia Sensor Networks , 2011 .

[14]  Matei Ciobanu Morogan,et al.  Identity-based Authentication and Access Control in Wireless Sensor Networks , 2012 .

[15]  Jian Shen,et al.  A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks , 2017, Future Gener. Comput. Syst..

[16]  Karan Mitra,et al.  IReHMo: An efficient IoT-based remote health monitoring system for smart regions , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).

[17]  Giancarlo Succi,et al.  Authentication in cloud-driven IoT-based big data environment: Survey and outlook , 2019, J. Syst. Archit..

[18]  Qiaoyan Wen,et al.  An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network , 2012, Comput. Commun..

[19]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[20]  Osval A. Montesinos-López,et al.  An IoT System for Remote Health Monitoring in Elderly Adults through a Wearable Device and Mobile Application , 2019, Geriatrics.

[21]  El-Sayed M. El-Rabaie,et al.  HEVC Selective Encryption Using RC6 Block Cipher Technique , 2018, IEEE Transactions on Multimedia.

[22]  Moayad Aloqaily,et al.  An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.

[23]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[24]  Kuo-Hui Yeh,et al.  A Secure IoT-Based Healthcare System With Body Sensor Networks , 2016, IEEE Access.

[25]  Hari Om,et al.  Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.

[26]  Djamel Tandjaoui,et al.  A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[27]  Alessandra Pieroni,et al.  E-health-IoT Universe: A Review , 2017 .

[28]  J. Vijayashree,et al.  A Machine Learning Framework for Feature Selection in Heart Disease Classification Using Improved Particle Swarm Optimization with Support Vector Machine Classifier , 2019, Programming and Computer Software.

[29]  Hesham A. El Zouka,et al.  Secure IoT communications for smart healthcare monitoring system , 2019, Internet Things.

[30]  Prosanta Gope,et al.  A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.

[31]  Kaja Abbas,et al.  Big Data Analytics in Healthcare Internet of Things , 2017 .

[32]  N. Arunkumar,et al.  Enabling technologies for fog computing in healthcare IoT systems , 2019, Future Gener. Comput. Syst..

[33]  Elaine B. Barker,et al.  Recommendation for Key Management Part 3: Application-Specific Key Management Guidance , 2009 .

[34]  Hemraj Saini,et al.  A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology , 2019, Multimedia Tools and Applications.

[35]  Reza Malekian,et al.  A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres , 2017, Multimedia Tools and Applications.

[36]  O. KuyoroS.,et al.  Cloud computing security issues and challenges , 2011 .

[37]  P. J. A. Alphonse,et al.  An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System , 2019, Journal of Medical Systems.

[38]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[39]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[40]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[41]  Sapna Tyagi,et al.  A conceptual framework for IoT-based healthcare system using cloud computing , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).

[42]  Heejo Lee,et al.  An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography , 2009, Journal of Communications and Networks.

[43]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[44]  Ling Liu,et al.  Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[45]  Hyeonjoon Moon,et al.  A Survey on Internet of Things and Cloud Computing for Healthcare , 2019, Electronics.

[46]  Mayank Mishra,et al.  A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2006 .

[47]  Fizar Ahmed,et al.  An Internet of Things (IoT) Application for Predicting the Quantity of Future Heart Attack Patients , 2017 .

[48]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.