skip to main content
10.1145/3555776.3578836acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

An Efficient Dual Encryption of IoMT data Using Lightweight Security Scheme for Cloud Based IoT Environment

Published: 07 June 2023 Publication History

Abstract

As Internet of Things (IoT) technology develops, medical equipment, wearables, sensors, and users can be linked together to create an ecosystem known as the Internet of Medical Things (IoMT). IoMT enhances the effectiveness, precision, and affordability of the current healthcare system. It is difficult to guarantee data security and privacy of data in the IoMT ecosystem due to the fact that it incorporates several businesses, heterogeneous networks, and a lot of private information. IoT devices' processing and power requirements make it difficult to ensure their security. In order to secure their data and connections, many IoT systems use asymmetric cryptography and Elliptic Curve Cryptography (ECC). Implementing and deploying these security and privacy solutions for the IoT environment, however, continues to be a substantial problem due to the hardware restrictions of IoT objects. In this paper, we have presented a more effective lightweight cryptographic system based on Elliptic Curve and Dual Cryptography (ECDC) to strengthen ECC and secure communication between IoMT devices. It protects against all kinds of security problems, like authentication, privacy, and integrity, and stops common cyberattacks.

References

[1]
[n. d.]. Attack Landscape H1 2019: IoT, SMB traffic abound - F-Secure Blog --- blog.f-secure.com. https://blog.f-secure.com/attack-landscape-h1-2019-iot-smb-traffic-abound/. [Accessed 17-Oct-2022].
[2]
Ahmed AH Abdellatif, Aman Singh, Abdulaziz Aldribi, Arturo Ortega-Mansilla, Muhammad Ibrahim, et al. 2022. A Novel Framework for Fog-Assisted Smart Healthcare System with Workload Optimization. Computational Intelligence and Neuroscience 2022 (2022).
[3]
Emmanuel A Adeniyi, Peace Busola Falola, Mashael S Maashi, Mohammed Aljebreen, and Salil Bharany. 2022. Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions. Information 13, 10 (2022), 442.
[4]
Hisham AlMajed and Ahmad AlMogren. 2020. A secure and efficient ECC-based scheme for edge computing and internet of things. Sensors 20, 21 (2020), 6158.
[5]
Hisham N Almajed, Ahmad S Almogren, and Ayman Altameem. 2019. A resilient smart body sensor network through pyramid interconnection. IEEE Access 7 (2019), 51039--51046.
[6]
Naif Almusallam, Abdulatif Alabdulatif, and Fawaz Alarfaj. 2021. Analysis of Privacy-Preserving Edge Computing and Internet of Things Models in Healthcare Domain. Computational and Mathematical Methods in Medicine 2021 (2021).
[7]
Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, and Ingrid Verbauwhede. 2007. Public-key cryptography for RFID-tags. In Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07). IEEE, 217--222.
[8]
Sayantan Chatterjee and Shefalika Ghosh Samaddar. 2020. A robust lightweight ECC-based three-way authentication scheme for IoT in cloud. In Smart Computing Paradigms: New Progresses and Challenges. Springer, 101--111.
[9]
Rui Cheng, Kehe Wu, Yuling Su, Wei Li, Wenchao Cui, and Jie Tong. 2021. An efficient ECC-based CP-ABE scheme for power IoT. Processes 9, 7 (2021), 1176.
[10]
Sangjukta Das and Suyel Namasudra. 2022. Multi-Authority CP-ABE-Based Access Control Model for IoT-Enabled Healthcare Infrastructure. IEEE Transactions on Industrial Informatics (2022).
[11]
Mostafa Farhdi Moghadam, Amirhossein Mohajerzdeh, Hadis Karimipour, Hamid Chitsaz, Roya Karimi, and Behzad Molavi. 2020. A privacy protection key agreement protocol based on ECC for smart grid. In Handbook of Big Data Privacy. Springer, 63--76.
[12]
Ms Gayke Geeta Ganesh. 2018. Secure method for text encryption using elliptic curve cryptography. Int. J 3, 11 (2018), 11--15.
[13]
Rajkumar Gaur and Shiva Prakash. 2021. Performance and Parametric Analysis of IoT's Motes with Different Network Topologies. In Innovations in Electrical and Electronic Engineering. Springer, 787--805.
[14]
Rajkumar Gaur, Shiva Prakash, and Rabindra Kumar Barik. 2021. Analysis of detection and prevention mechanism for 6LowPAN Protocol Header in IoT assisted Cloud Environments. In 2021 19th OITS International Conference on Information Technology (OCIT). 138--143.
[15]
Rajkumar Gaur, Shiva Prakash, Sanjay Kumar, Kumar Abhishek, Mounira Msahli, and Abdul Wahid. 2022. A Machine-Learning-Blockchain-Based Authentication Using Smart Contracts for an IoHT System. Sensors 22, 23 (2022), 9074.
[16]
Badis Hammi, Achraf Fayad, Rida Khatoun, Sherali Zeadally, and Youcef Begriche. 2020. A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Systems Journal 14, 3 (2020), 3440--3450.
[17]
Badis Hammi, Achraf Fayad, Rida Khatoun, Sherali Zeadally, and Youcef Begriche. 2020. A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Systems Journal 14, 3 (2020), 3440--3450.
[18]
Tharaka Hewa, An Braeken, Madhusanka Liyanage, and Mika Ylianttila. 2022. Fog computing and blockchain-based security service architecture for 5G industrial IoT-enabled cloud manufacturing. IEEE Transactions on Industrial Informatics 18, 10 (2022), 7174--7185.
[19]
Rutvij H Jhaveri, Thippa Reddy G, Andrew Clark, et al. 2022. Preface to the Special Issue on Privacy and Security for Internet of Things. International Journal of Wireless Information Networks (2022), 1--2.
[20]
Xiaoying Jia, Min Luo, Huaqun Wang, Jian Shen, and Debiao He. 2022. A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things. IEEE Internet of Things Journal (2022).
[21]
Yuchen Jiang, Shimeng Wu, Hongyan Yang, Hao Luo, Zhiwen Chen, Shen Yin, and Okyay Kaynak. 2022. Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2022).
[22]
Sheetal Kalra and Sandeep K Sood. 2015. Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing 24 (2015), 210--223.
[23]
Aditya Khamparia, Deepak Gupta, Victor Hugo C de Albuquerque, Arun Kumar Sangaiah, and Rutvij H Jhaveri. 2020. Internet of health things-driven deep learning system for detection and classification of cervical cells using transfer learning. The Journal of Supercomputing 76, 11 (2020), 8590--8608.
[24]
Neal Koblitz. 1987. Elliptic curve cryptosystems. Mathematics of computation 48, 177 (1987), 203--209.
[25]
Marko Kompara, SK Hafizul Islam, and Marko Hölbl. 2019. A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs. Computer networks 148 (2019), 196--213.
[26]
Ajay Kumar, Kumar Abhishek, Chinmay Chakraborty, and Joel JPC Rodrigues. 2022. Real geo-time-based secured access computation model for e-Health systems. Computational Intelligence (2022).
[27]
Ajay Kumar, Kumar Abhishek, Pranav Nerurkar, Mohammad R Khosravi, Muhammad Rukunuddin Ghalib, and Achyut Shankar. 2021. Big data analytics to identify illegal activities on bitcoin blockchain for IoMT. Personal and Ubiquitous Computing (2021), 1--12.
[28]
Ajay Kumar, Kumar Abhishek, Kunjal Shah, Suyel Namasudra, and Seifedine Kadry. 2021. A novel elliptic curve cryptography-based system for smart grid communication. International Journal of Web and Grid Services 17, 4 (2021), 321--342.
[29]
Raj Kumar and Divya Gupta. 2011. Security in real time multimedia data based on generalized keys. In Proceedings of the International Conference on Advances in Computing and Artificial Intelligence. 93--96.
[30]
Carson Labrado, Himanshu Thapliyal, Stacy Prowell, and Teja Kuruganti. 2019. Use of thermistor temperature sensors for cyber-physical system security. Sensors 19, 18 (2019), 3905.
[31]
Jing Liu, Yang Xiao, and CL Philip Chen. 2012. Authentication and access control in the internet of things. In 2012 32nd international conference on distributed computing systems workshops. IEEE, 588--592.
[32]
Mehedi Masud, Gurjot Singh Gaba, Salman Alqahtani, Ghulam Muhammad, Brij B Gupta, Pardeep Kumar, and Ahmed Ghoneim. 2020. A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care. IEEE Internet of Things Journal 8, 21 (2020), 15694--15703.
[33]
Sarumathi Murali and Abbas Jamalipour. 2019. A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet of Things Journal 7, 1 (2019), 379--388.
[34]
Christof Paar and Jan Pelzl. 2009. Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media.
[35]
Chintan Patel, Ali Kashif Bashir, Ahmad Ali AlZubi, and Rutvij H Jhaveri. 2022. EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element. Digital Communications and Networks (2022).
[36]
Pawani Porambage, Corinna Schmitt, Pardeep Kumar, Andrei Gurtov, and Mika Ylianttila. 2014. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In 2014 IEEE Wireless Communications and Networking Conference (WCNC). Ieee, 2728--2733.
[37]
R Saravana Ram, M Vinoth Kumar, S Ramamoorthy, B Saravana Balaji, and T Rajesh Kumar. 2021. An efficient hybrid computing environment to develop a confidential and authenticated IoT service model. Wireless Personal Communications 117, 4 (2021), 2903--2927.
[38]
Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won. 2005. Challenge-response based RFID authentication protocol for distributed database environment. In International Conference on Security in Pervasive Computing. Springer, 70--84.
[39]
F Sammy and S Vigila. 2022. An Efficient Blockchain Based Data Access with Modified Hierarchical Attribute Access Structure with CP-ABE Using ECC Scheme for Patient Health Record. Security and Communication Networks 2022 (2022).
[40]
Ramao Tiago Tiburski, Carlos Roberto Moratelli, Sergio F Johann, Marcelo Veiga Neves, Everton de Matos, Leonardo Albernaz Amaral, and Fabiano Hessel. 2019. Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Communications Magazine 57, 2 (2019), 67--73.
[41]
Gaurav Verma, Meihua Liao, Dajiang Lu, Wenqi He, Xiang Peng, and Aloka Sinha. 2019. An optical asymmetric encryption scheme with biometric keys. Optics and Lasers in Engineering 116 (2019), 32--40.
[42]
Lingwei Xu, Xinpeng Zhou, Xingwang Li, Rutvij H Jhaveri, Thippa Reddy Gadekallu, and Yuan Ding. 2021. Mobile collaborative secrecy performance prediction for artificial IoT networks. IEEE Transactions on Industrial Informatics 18, 8 (2021), 5403--5411.
[43]
Jin-cui YANG, PANG Hao, and Xin ZHANG. 2013. Enhanced mutual authentication model of IoT. The Journal of China Universities of Posts and Telecommunications 20 (2013), 69--74.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing
March 2023
1932 pages
ISBN:9781450395175
DOI:10.1145/3555776
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 June 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IoMT
  2. security
  3. healthcare
  4. ECC

Qualifiers

  • Research-article

Conference

SAC '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 125
    Total Downloads
  • Downloads (Last 12 months)61
  • Downloads (Last 6 weeks)9
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media