A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT)

被引:2
|
作者
Chaudhari, Dipalee Ashok [1 ,2 ]
Umamaheswari, Ekambaram [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai Campus, Chennai, Tamil Nadu, India
[2] DY Patil Coll Engn, Pune, Maharashtra, India
来源
关键词
authentication; encryption; hash function; medical data transmission; XOR function; COMMUNICATION; CHALLENGES; DEVICES; SYSTEM; CARE;
D O I
10.1515/bmt-2019-0123
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Internet of Things (IoT) plays a prominent role in health-care of patients, which assist the physicians and patients through the assistance in effective decision-making and additionally, in the medical field, IoT plays a significant role in real-time monitoring of the patients. Even though the data provided by the IoT devices ensure the effective decision-making, the data is susceptible to the network attacks. Thus, the paper proposes an authentication protocol for enabling the secure data transmission in IoT based on three functions, such as encryption function, hashing function, and adaptive XOR function. The proposed authentication protocol is named as, Adaptive XOR, hashing and Encryption Key Exchange (AXHE) protocol, which is the combination of the functions, such as encryption function, hashing function, and adaptive XOR function. The protocol ensures the security in the communication through two successive phases, such as registration and authentication of the user, where the user name, password, public keys, private keys, and security factor are employed. The authentication is progressed as seven levels and whenever the security factor matches, the user is authenticated and the communication continues. The analysis of the proposed AXHE is performed using 50 and 100 nodes in the presence of DOS and black hole attacks, which acquires the detection rate, throughput, and detection delay of 0.3859, 0.32, and 6.535 s, respectively.
引用
收藏
页码:91 / 105
页数:15
相关论文
共 50 条
  • [1] An Encryption-based Secure Framework for Data Transmission in IoT
    Chaudhry, Shikha
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 743 - 747
  • [2] Secure Authentication and Data Transmission for Patients Healthcare Data in Internet of Medical Things
    Patnaik, Anup
    Prasad, Krishna K.
    INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2023, 8 (05) : 1006 - 1023
  • [3] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Agrahari, Abhay Kumar
    Varma, Shirshu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1277 - 1289
  • [4] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Abhay Kumar Agrahari
    Shirshu Varma
    Peer-to-Peer Networking and Applications, 2021, 14 : 1277 - 1289
  • [5] An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
    Chen, Xingxing
    Cheng, Qingfeng
    Yang, Weidong
    Luo, Xiangyang
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (03)
  • [6] An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
    Xingxing Chen
    Qingfeng Cheng
    Weidong Yang
    Xiangyang Luo
    Frontiers of Computer Science, 2024, 18
  • [7] Blockchain-PUF-Based Secure Authentication Protocol for Internet of Things
    Patil, Akash Suresh
    Hamza, Rafik
    Yan, Hongyang
    Hassan, Alzubair
    Li, Jin
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II, 2020, 11945 : 331 - 338
  • [8] A Secure Privacy Data Transmission Method for Medical Internet of Things
    Ye, Heping
    Yang, Jie
    Zhu, Junru
    Zhang, Ziyang
    Huang, Yakun
    Chen, Fulong
    INDUSTRIAL IOT TECHNOLOGIES AND APPLICATIONS, INDUSTRIAL IOT 2016, 2016, 173
  • [9] Secure Transmission Method of Power Quality Data in Power Internet of Things Based on the Encryption Algorithm
    Liu, Xin
    Chang, Yingxian
    Yao, Honglei
    Su, Bing
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2023, 19 (01)
  • [10] Secure and Efficient CoAP Based Authentication and Access Control for Internet of Things (IoT)
    Tamboli, Mohsin B.
    Ambawade, Dayanand D.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1245 - 1250