Paillier Cryptography Based Message Authentication Code for IoMT Security

被引:0
|
作者
Siamala Devi S. [1 ]
Kuruba C. [2 ]
Nam Y. [3 ]
Abouhawwash M. [4 ,5 ]
机构
[1] Department of Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore
[2] Department of Computer Science and Engineering, Vignan Nirula Institute of Technology and Science, Guntur
[3] Department of Computer Science and Engineering, Soonchunhyang University, Asan
[4] Department of Mathematics, Faculty of Science, Mansoura University, Mansoura
[5] Department of Computational Mathematics, Science, and Engineering (CMSE), Michigan State University, East Lansing, 48824, MI
来源
关键词
aggregation; cloud; decryption; encryption; energy; Fog; IoMT; wireless sensor network;
D O I
10.32604/csse.2023.025514
中图分类号
学科分类号
摘要
Health care visualization through Internet of Things (IoT) over wireless sensor network (WSN) becomes a current research attention due to medical sensor evolution of devices. The digital technology-based communication system is widely used in all application. Internet of medical thing (IoMT) assisted healthcare application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation. These smart medical devices may consume with limited resources and also the data generated by these devices are large in size. These IoMT based applications suffer from the issues such as security, anonymity, privacy, and interoperability. To overcome these issues, data aggregation methods are the solution that can concatenate the data generated by the sensors and forward it into the base station through fog node with efficient encryption and decryption. This article proposed a well-organized data aggregation and secured transmission approach. The data generated by the sensor are collected and compressed. Aggregator nodes (AN) received the compressed data and concatenate it. The concatenated and encrypted data is forward to fog node using the enhanced Paillier cryptography- based encryption with Message Authentication code (MAC). Fog node extracts the forwarded data from AN using Fog message extractor method (FME) with decryption. The proposed system ensures data integrity, security and also protects from security threats. This proposed model is simulated in Network Simulator 2.35 and the evaluated simulation results proves that the aggregation with MAC code will ensures the security, privacy and also reduces the communication cost. Fog node usages in between Aggregator and base station, will reduce the cloud server/base station computational overhead and storage cost. The proposed ideology is compared with existing data aggregation schemes in terms of computational cost, storage cost, communication cost and energy cost. Cost of communication takes 18.7 ms which is much lesser than existing schemes. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:2209 / 2223
页数:14
相关论文
共 50 条
  • [21] A Privacy Preserving Message Authentication Code
    Dang Hai Van
    Nguyen Dinh Thuc
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [22] Security aspects of the authentication used in quantum cryptography
    Cederlof, Jorgen
    Larsson, Jan-Ake
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (04) : 1735 - 1741
  • [23] A Design of Elliptic Curve Cryptography-based Authentication using QR Code
    Thiranant, Non
    Kang, Young-Jin
    Kim, Taeyong
    Jang, WonTae
    Park, Suhyun
    Lee, HoonJae
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 614 - 619
  • [24] Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications
    Salankar, Pritam S.
    Avasthi, Vinay
    Pasricha, Ashutosh
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 20 (1-2) : 176 - 198
  • [25] On the security of iterated message authentication codes
    Preneel, B
    van Oorschot, PC
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (01) : 188 - 199
  • [26] Post-Quantum Message Authentication Cryptography Based on Error-Correcting Codes
    Gorbenko, Yuriy
    Svatovskiy, Igor
    Shevtsov, Oleksiy
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 51 - 54
  • [27] A security enhanced password authentication and update scheme based on elliptic curve cryptography
    Qiao, Pengshuai
    Tu, Hang
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (02) : 130 - 139
  • [28] WSN message authentication code based on chaos and XOR-encryption
    En-Jian, Bai
    Jun-Jie, Zhu
    Liang-Cheng, Wu
    Sensors and Transducers, 2013, 156 (09): : 161 - 167
  • [29] Chaos-based message authentication code for remote monitoring applications
    Kwok, H. S.
    Tang, Wallace K. S.
    Zhong, G. Q.
    2005 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY - (ICIT), VOLS 1 AND 2, 2005, : 295 - 300
  • [30] A new message authentication code based on hash function and block cipher
    Xu, Jin
    Wen, Qiao-Yan
    Wang, Da-Yin
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (04): : 793 - 803