Enhancing Healthcare Image Security with DNA Cryptography in the IOT Environment
Keywords:
IoT Security; DNA Computing; DNA cryptography; Image encryption and DecryptionAbstract
The integration of DNA cryptography into IoT-based healthcare image systems represents a groundbreaking approach to tackle the pressing issue of data security and patient privacy in the digital healthcare landscape. With the increasing reliance on the Internet of Things in healthcare, the need for robust security measures is paramount to protect sensitive medical information. This research explores the feasibility and efficacy of employing DNA cryptography to encode medical data, adding an additional layer of security to data transmitted over IoT networks while ensuring compatibility with existing healthcare infrastructure. By enhancing data integrity, particularly in the realm of E-healthcare, this innovative cryptosystem has the potential to facilitate secure patient data transfer between healthcare institutions, ultimately advancing patient care and preserving privacy. The promising integration of DNA cryptography underscores its potential as a secure and rapid technique, offering a hopeful solution to the security challenges faced by healthcare image systems within IoT environments.
Downloads
References
Manjit Kaur, Ahmad Ali AlZubi, Dilbag Singh, Vijay Kumar, Heung-No Lee, "Lightweight Biomedical Image Encryption Approach", IEEE Access, vol.11, pp.74048-74057, 2023.
G. Manogaran, C. Thota, D. Lopez, and R. Sundarasekar, "Big data security intelligence for healthcare industry 4.0" in Cybersecurity for Industry 4.0, Cham, Switzerland: Springer, pp. 103-126, 2017.
Dhanda, Sumit Singh, Brahmjit Singh, and Poonam Jindal. "Lightweight cryptography: a solution to secure IoT." Wireless Personal Communications 112 (2020): 1947-1980.
Aghili, S. F., Mala, H., Kaliyar, P., & Conti, M. (2019). SecLAP: Secure and lightweight RFID authentication protocol for Medical IOT. Future Generation Computer Systems, 101, 621–634. Doi: https://doi.org/10.1016/j.future.2019.07.004.
Wang, K.-H., Chen, C.-M., Fang, W., & Tsu-Yang, W. (2018). On the security of a new ultra-lightweight authentication protocol in an IOT environment for RFID tags. Journal of Supercomputing, 74, 65–70. https://doi.org/10.1007/s11227-017-2105-8.
Domb, M. (2017). An adaptive lightweight security framework suited for IOT. In J. Sen (Ed.), Internet of Things: Technology, Applications and Standardization, IntechOpen. http://dx.doi.org/ 10.5772/intec hopen.73712.
Gope, P. (2019). LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Computers & Security, 86, 223–237. https://doi.org/10.1016/j.cose.2019.06.003.
Mahalle, Parikshit N., Neeli Rashmi Prasad, and Ramjee Prasad. "Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things (IoT)." In 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), pp. 1-5. IEEE, 2014.
Lein Harn, “Group Authentication,” In IEEE Transactions on Computers, IEEE Computer Society Digital Library, IEEE Computer Society, 16 October 2012.
Lei Zhang, Qianhong Wu, Solanas A., and Domingo-Ferrer J., “A Scalable Robust Authentication Protocol for Secure Vehicular Communications,” In IEEE Transactions on Vehicular Technology, Volume: 59, no. 4, pp:1606-1617, May 2010.
Anmin Fu, Shaohua Lan, Bo Huang, Zhenchao Zhu, and Yuqing Zhang, “A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks,” In IEEE Communications Letters, Volume:16, no:11, pp:1744-1747, November 2012.
Morshed M.M., Atkins A., and Yu H., “Efficient Mutual Authentication Protocol for Radiofrequency Identification Systems,” Communications, IET, Volume: 6, no: 16, pp: 2715- 2724, November 6, 2012.
[13] Pfleeger Shari Lawrence, Rogers Marc, Bashir Masooda, Caine K., Caputo Deanna, Losavio Michael, and Stolfo Sal, “Does Profiling Make Us More Secure?” In IEEE Journal of security and privacy, Volume:10, Issue:4, 2012.
Squicciarini A.C., Paci F., Bertino E., Trombetta A., and Braghin S., “Group-Based Negotiations in P2P Systems,” In IEEE Transactions on Parallel, and Distributed Systems, Volume: 21, no:10, pp:1473-1486, October 2010.
L. A. Martucci, T. C. M. B. Carvalho and W. V. Ruggiero, “A Lightweight Distributed Group Authentication Mechanism,” In Proc. of 4th International Network Conference, Plymouth, UK.
Kairi A, Gagan S, Bera T and Chakraborty M. 2019 DNA Cryptography-Based Secured Weather Prediction Model in High-Performance Computing. Proceedings of International Ethical Hacking Conference 2018. Pages 103-114.
Elamir, M.M., Al-Albany, W.I. & Mabrouk, M.S. Hybrid image encryption scheme for secure E-health systems. Netw Model Anal Health Inform Bioinforma 10, 35 (2021). https://doi.org/10.1007/s13721-021-00306-6.
G. Mohamed, N. O. Korany, and S. E. El-Khamy, “New DNA coded fuzzy based (DNAFZ) S-boxes: application to robust image encryption using hyperchaotic maps,” IEEE Access, vol. 9, pp. 14284–14305, 2021.
E. Zarei Zefreh, “An image encryption scheme based on a hybrid model of DNA computing, chaotic systems, and hash functions,” Multimedia Tools and Applications, vol. 79, 2020.
X. Chai, Z. Gan, K. Yuan, Y. Chen, and X. Liu, “A novel image encryption scheme based on DNA sequence operations and chaotic systems,” Neural Computing & Applications, vol. 31,no. 1, pp. 219–237, 2019.
H. A. Al-Ahdal, G. A. Al-Rummana, and N. K. Deshmukh, “A robust lightweight algorithm for securing data in the Internet of things networks,” in Sustainable Communication Networks and Application, P. Karuppusamy, I. Perikos, F. Shi, and T. N. Nguyen, Eds., Springer, Singapore, 2021.
Kairi, T. Bhadra, “Decoding The Future Using A Novel DNA-Based Cryptosystem”, in Journal of European Chemical Bulletin, Volume -12, Special Issue-10: Page: 3597 –3609 2023.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.