End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC

نویسندگان

چکیده

Abstract Today, the amount of data produced and stored in computing Internet Things (IoT) devices is growing. Massive volumes sensitive information are exchanged between these making it critical to ensure security data. Cryptography a widely used method for ensuring security. Many lightweight cryptographic algorithms have been developed address limitations resources on IoT devices. Such limited processing capabilities terms memory, power, storage, etc. The primary goal exploiting technique send from sender receiver most secure way prevent eavesdropping content original In this paper, we propose an end-to-end scheme system. proposed consists (i) efficient mutual authentication based Elliptic Curve (ECC) Quark hash design, (ii) communication Deoxyribonucleic Acid (DNA) ECC. DNA encrypt decrypt using sequences its biological processes. It novel hide unauthorized access with help DNA. analysis reveals that against relevant threat models provides higher level than existing related work literature.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Willingness of end users to pay for e-waste recycling

BACKGROUND AND OBJECTIVES: The sheer volume of electrical and electronic waste (e-waste) has presently been generated in Vietnam, posing a growing concern regarding its impact can have on the environment and human health. Therefore, the need for developing policies and regulations towards the environmentally sound management of e-waste is becoming crucial. Although the municipa...

متن کامل

End-to-End Security for Personal Telehealth

Personal telehealth is in rapid development with innovative emerging applications like disease management. With personal telehealth people participate in their own care supported by an open distributed system with health services. This poses new end-to-end security and privacy challenges. In this paper we introduce new end-to-end security requirements and present a design for consent management...

متن کامل

End-to-End Security for Enterprise Mashups

Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterprise environments, mashups are recently used for implementing Web-based business processes, however, security is a major concern. Current approaches do not allow the mashup to securely consume services with diverse security require...

متن کامل

End-to-End Network Security

Traditionally, the kernel has provided extremely limited protection of network communications. This is especially nettlesome since network connections are the conduits through which the computer systems are most vulnerable. IPSec is now widely available to protect network connections, encrypting network communications in the kernel. But cryptography alone is insufficient to implement end-to-end...

متن کامل

The Problem of End-to-end Security for Proxy-based Systems

Proxies can provide valuable services for today’s increasingly heterogeneous computing environment by providing various kinds of adaptations and enhancements. By breaking the end-to-end nature of the communication, proxies render the task of providing end-to-end security much harder or even impossible in some cases. We will discuss the problem of end-to-end security for different types of proxy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications in computer and information science

سال: 2022

ISSN: ['1865-0937', '1865-0929']

DOI: https://doi.org/10.1007/978-3-030-96057-5_6