Faculty of Computer Science Engineering, School of Electrical Engineering and Computing (SoEEC), Adama Science and Technology University (ASTU), Adama, Ethiopia.
The advent of cloud computing and the Internet of Things (IoT) has facilitated the ability of medical practitioners to remotely monitor patients in real-time, thus enabling the provision of healthcare services in the comfort of patients' homes. To streamline this process, it is imperative to keep patient medical data in the cloud. However, storing medical information in the cloud poses a security risk due to the possibility of cyberattacks. As a result, the effective worldwide adoption of intelligent healthcare systems relies on a strong security mechanism. In addition, the use of restricted resources in health devices in IoT-enabled healthcare systems requires the installation of a combination of steganography and cryptography to protect these applications. The amalgamation of steganography and encryption diminishes susceptibilities and poses a formidable obstacle for trespassers attempting to get access to confidential data. This work proposes a security system that utilises the Diffie and Hellman algorithm for secret key sharing, as well as the Least Significant Bit (LSB) steganography principle and Deoxyribo Nucleic Acid (DNA) cryptography for encryption and decryption. The system is implemented using MATLAB 2018a tools. An evaluation is conducted on the encryption time, throughput, Peak Noise to Signal Ratio (PSNR), and Mean Square Error (MSE) of the proposed system. The suggested system has superior security and efficiency compared to the Advanced Encryption Standard and LSB algorithms, as confirmed by the performance evaluation.
Keywords
Authentication, Cryptography, Least Significance Bit, DNA Cryptography, Medical Internet of Things, Steganography, One Time Pad.
N. M. M. AbdElnapi, N. F. Omran, A. A. Ali, and F. A. Omara, “A survey of internet of things technologies and projects for healthcare services,” 2018 International Conference on Innovative Trends in Computer Engineering (ITCE), pp. 48–55, Feb. 2018, doi: 10.1109/itce.2018.8316599.
M. Kumar et al., “Healthcare Internet of Things (H-IoT): Current Trends, Future Prospects, Applications, Challenges, and Security Issues,” Electronics, vol. 12, no. 9, p. 2050, Apr. 2023, doi: 10.3390/electronics12092050.
T. Oduguwa and A. Arabo, “Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics,” Jan. 2024, doi: 10.20944/preprints202401.1466.v1.
S. R. Moosavi et al., “SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways,” Procedia Computer Science, vol. 52, pp. 452–459, 2015, doi: 10.1016/j.procs.2015.05.013.
Y. Liu et al., “A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things,” IEEE Transactions on Computers, vol. 72, no. 2, pp. 501–512, Feb. 2023, doi: 10.1109/tc.2022.3157996.
W. Mao, P. Jiang, and L. Zhu, “BTAA: Blockchain and TEE-Assisted Authentication for IoT Systems,” IEEE Internet of Things Journal, vol. 10, no. 14, pp. 12603–12615, Jul. 2023, doi: 10.1109/jiot.2023.3252565.
R. Bułat and M. R. Ogiela, “Personalized Context-Aware Authentication Protocols in IoT,” Applied Sciences, vol. 13, no. 7, p. 4216, Mar. 2023, doi: 10.3390/app13074216.
M. Tanveer, A. Badshah, A. U. Khan, H. Alasmary, and S. A. Chaudhry, “CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things,” Internet of Things, vol. 23, p. 100902, Oct. 2023, doi: 10.1016/j.iot.2023.100902.
F. Mohd Ali, N. A. Md Yunus, N. N. Mohamed, M. Mat Daud, and E. A. Sundararajan, “A Systematic Mapping: Exploring Internet of Everything Technologies and Innovations,” Symmetry, vol. 15, no. 11, p. 1964, Oct. 2023, doi: 10.3390/sym15111964.
Y. Zhang, D. He, P. Vijayakumar, M. Luo, and X. Huang, “SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things,” IEEE Internet of Things Journal, vol. 10, no. 11, pp. 9716–9726, Jun. 2023, doi: 10.1109/jiot.2023.3234178.
P. V. S., B. R. S., and P. A. R., “A Novel Security Scheme for Secret Data using Cryptography and Steganography,” International Journal of Computer Network and Information Security, vol. 4, no. 2, pp. 36–42, Mar. 2012, doi: 10.5815/ijcnis.2012.02.06.
Jamal N Bani Salameh, “A New Approach for Securing Medical Images and Patient’s Information by Using A hybrid System,” International Journal of Network Security, 19, 28-39, 2019.
S. Ahmed Laskar, “High Capacity data hiding using LSB Steganography and Encryption,” International Journal of Database Management Systems, vol. 4, no. 6, pp. 57–68, Dec. 2012, doi: 10.5121/ijdms.2012.4605.
A. Sajid Ansari, M. Sajid Mohammadi, and M. Tanvir Parvez, “A Comparative Study of Recent Steganography Techniques for Multiple Image Formats,” International Journal of Computer Network and Information Security, vol. 11, no. 1, pp. 11–25, Jan. 2019, doi: 10.5815/ijcnis.2019.01.02.
D. A. Trujillo-Toledo et al., “Real-time medical image encryption for H-IoT applications using improved sequences from chaotic maps,” Integration, vol. 90, pp. 131–145, May 2023, doi: 10.1016/j.vlsi.2023.01.008.
N. H. Kamarudin, N. H. S. Suhaimi, F. A. Nor Rashid, M. N. A. Khalid, and F. Mohd Ali, “Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review,” Symmetry, vol. 16, no. 2, p. 171, Feb. 2024, doi: 10.3390/sym16020171.
S. Dhar, A. Khare, A. D. Dwivedi, and R. Singh, “Securing IoT devices: A novel approach using blockchain and quantum cryptography,” Internet of Things, vol. 25, p. 101019, Apr. 2024, doi: 10.1016/j.iot.2023.101019.
M. M. Hashim, S. H. Rhaif, A. A. Abdulrazzaq, A. H. Ali, and M. S. Taha, “Based on IoT Healthcare Application for Medical Data Authentication: Towards A New Secure Framework Using Steganography,” IOP Conference Series: Materials Science and Engineering, vol. 881, no. 1, p. 012120, Jul. 2020, doi: 10.1088/1757-899x/881/1/012120.
Y. Jiang et al., “Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 12, pp. 7799–7809, Dec. 2022, doi: 10.1109/tsmc.2022.3164024.
D. M. S. Zekrifa et al., “Securing energy horizons: Cloud-driven based machine learning methods for battery management systems,” Journal of Intelligent & Fuzzy Systems, vol. 46, no. 1, pp. 3029–3043, Jan. 2024, doi: 10.3233/jifs-236391.
N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, “Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations,” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2702–2733, 2019, doi: 10.1109/comst.2019.2910750.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Wubie Engdew Hailu, Ravindra Babu Bellam;
Methodology: Wubie Engdew Hailu, Ravindra Babu Bellam, KrishnaPrasad B, Sarwani Theeparthi J L, Raghavendra Gowda and Subramanian Selvakumar;
Data Curation: Sarwani Theeparthi J L,Raghavendra Gowda and Subramanian Selvakumar;
Writing- Original Draft Preparation: Wubie Engdew Hailu, Ravindra Babu Bellam, KrishnaPrasad B, Sarwani Theeparthi J L, Raghavendra Gowda and Subramanian Selvakumar;
Validation: Sarwani Theeparthi J L, Raghavendra Gowda and Subramanian Selvakumar;
All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
The author(s) received no financial support for the research, authorship, and/or publication of this article.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Subramanian Selvakumar
Faculty of Electrical and Computer Engineering, Bahir Dar Institute of Technology, Bahir Dar University, Bahir Dar, Ethiopia.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Wubie Engdew Hailu, Ravindra Babu Bellam, KrishnaPrasad B, Sarwani Theeparthi J L, Raghavendra Gowda and Subramanian Selvakumar, “A Secure Authentication Algorithm for Medical IoT using Steganography and Cryptography”, Journal of Machine and Computing, vol.5, no.1, pp. 409-420, January 2025, doi: 10.53759/7669/jmc202505032.