Enhanced Security Measures for Medical IoT Communication through Biological Feature-Based Elliptic Curve Cryptography Authentication

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 4
Year of Publication : 2024
Authors : Vijaya Kumar Vadladi, D Marshiana
pdf
How to Cite?

Vijaya Kumar Vadladi, D Marshiana, "Enhanced Security Measures for Medical IoT Communication through Biological Feature-Based Elliptic Curve Cryptography Authentication," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 4, pp. 60-67, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I4P107

Abstract:

Medical IoT devices often collect, transmit, and communicate sensitive patient health data. Ensuring robust security measures is essential to protect patient privacy and confidentiality during data transmission. Unauthorized access to this data can lead to privacy breaches, identity theft, or misuse of personal health information. Many researchers are trying to develop secure communication for medical IoT devices. Conventional methods, such as RSA-based authentication, require more data space and processing time, posing challenges for resource-constrained medical IoT devices. Additionally, the traditional system provides a single level of security and focuses only on internal control techniques. To overcome these limitations, a double level of security and external error control techniques-based authentication algorithm is proposed. The proposed authentication employs Elliptic Curve Cryptography (ECC) and DNA computing techniques combined to solve the memory space problem and processing time, respectively. Here ECC helps to encrypt the medical document using the private key and public key data to provide a double level of security while performing the authentication process. Also, the DNA computing technique is used to encode the original medical content since it has the capacity to store a large amount of data. From the simulation results, the proposed ECC-based double-level encryption process uses only a limited amount of time to execute both the encryption and decryption time. It also shows that the proposed authentication algorithm requires a lesser number of communication bits and a lesser storage amount of data compared with other traditional methods.

Keywords:

Medical Internet of Things, IoT communication, Elliptic Curve Cryptography, DNA computing, Double level of encryption.

References:

[1] Minhaj Ahmad Khan, and Khaled Salah, “IoT Security: Review, Blockchain Solutions, and Open Challenges,” Future Generation Computer Systems, vol. 82, pp. 395-411, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Mahmud Hossain, Ragib Hasan, and Anthony Skjellum, “Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems,” 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), Atlanta, USA, pp. 220-225, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[3] A. Aziz et al., “Securing Internet of Things (IoT) Medical Devices: A Review,” Journal of Network and Computer Applications, vol. 136, pp. 22-39, 2019.
[4] Ala Al-Fuqaha et al., “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[5] A.H. Alvi, M.R. Khan, and S.G. Khandaker, “Security in the Internet of Things (IoT): An Overview,” International Journal of Computer Applications, vol. 182, no. 20, pp. 22-28, 2018.
[6] X. Wang, Y. Liu, and Z. Zhang, “Biological Feature-Based Authentication for Secure Medical IoT Communication,” IEEE Transactions on Mobile Computing, vol. 20, no. 5, pp. 1647-1658, 2021.
[7] R. Gupta, S. Sharma, and M. Gupta, “Enhancing Security in Medical IoT with DNA-Based Cryptography,” Sensors, vol. 21, no. 7, 2021.
[8] L. Zhang, K. Wu, and H. Wang, “Biometric Authentication for Medical IoT Devices Using Heart Rate Variability,” IEEE Access, vol. 8, pp. 206575-206583, 2020.
[9] S. Chen, W. Li, and J. Zhang, “DNA-Based Authentication Protocol for Secure Communication in Medical IoT,” Journal of Medical Systems, vol. 44, no. 11, pp. 1-11, 2020.
[10] H. Kim, J. Lee, and S. Park, “Biometric-Based Security Solutions for Medical IoT Devices: A Review,” Computers, Materials & Continua, vol. 63, no. 1, pp. 451-471, 2020.
[11] G. Chen, X. Wang, and Y. Liu, “Enhancing Security in Medical IoT Using DNA-Based Authentication,” IEEE Internet of Things Journal, vol. 7, no. 11, pp. 11356-11364, 2020.
[12] S. Zhang, L. Wang, and C. Xu, “Biometric Authentication for Medical IoT Devices Using DNA Sequence Analysis,” Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 10, pp. 4343-4352, 2020.
[13] Z. Liu, Y. Li, and X. Chen, “Secure Communication in Medical IoT Using Voice Biometrics,” IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1391-1400, 2019.
[14] W. Zhou, J. Yang, and Z. Li, “Biometric-Based Authentication Protocol for Wearable Medical IoT Devices,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2491-2500, 2019.