Home About Login Current Archives Announcements Editorial Board
Submit Now For Authors Call for Submissions Statistics Contact
Home > Archives > Volume 20, No 8 (2022) > Article

DOI: 10.14704/nq.2022.20.8.NQ44587

A Hybrid Encryption Algorithm for IoT Data Protection in Healthcare Monitoring System

Uqba bn Nafaa Mohammed, Ghassan Abdul-Majeed

Abstract

IoT-based healthcare systems are used for remote health monitoring and diagnosis to reduce the cost of health care services. A secure transmission of health data is vital for treatment or monitoring purposes. Also, since the patient's information may be easily tracked by other devices, it must be kept safe against misuse and data alteration while being stored. IoT networks are significantly resource-constrained, with low processor capability, memory, and power, making it challenging to perform the expensive operations required by ciphering algorithms. Therefore, they need a lightweight security approach that requires fewer resources.This paper proposes a hybrid cipher method for secure data transmission from IoT healthcare devices. The encryption method combines three cipher approaches,a modified lightweight Salsa20 that uses 16-words (each word is 32-bit). First, a five-dimension chaotic map is applied to generate32-keys with the 64-bit length for each sensing data (block of bits). Second, a random shifting is used on the generated keys to seem like a dynamic key. Third, the exclusive-or operation is applied between a generated key with sensing data and modified Salsa20 words.Fourth, the DNA computing operation used in the proposed method increases security by applying the addition DNA operation between the result of the previous step with random selection word in Salsa20 state after converting them to DNA form. Finally, a hash function called SHA3-256 isapplied on sensing data that is used for data integrity when transferring data to the server. The total sent data are the hash data result, the output of DNA result after converting back to a decimal number, and two random numbers for shifting key and selecting Salsa20 word, respectively. Experiments and results of the proposed Algorithm based on NIST testing show that the proposed algorithms provide security features for data content, including confidentiality, authentication, and non-repudiation, and are compatible with all types of sensors to send secure data to the final administrator.

Keywords

Salsa20 Algorithm; DNA cipher technique; SHA3-256 hashing;five-dimensional chaotic Map

Full Text

PDF

References

?>