Journal of Machine and Computing


A Secure Authentication Algorithm for Medical IoT using Steganography and Cryptography



Journal of Machine and Computing

Received On : 31 August 2024

Revised On : 30 October 2024

Accepted On : 27 November 2024

Published On : 05 January 2025

Volume 05, Issue 01

Pages : 409-420


Abstract


The advent of cloud computing and the Internet of Things (IoT) has facilitated the ability of medical practitioners to remotely monitor patients in real-time, thus enabling the provision of healthcare services in the comfort of patients' homes. To streamline this process, it is imperative to keep patient medical data in the cloud. However, storing medical information in the cloud poses a security risk due to the possibility of cyberattacks. As a result, the effective worldwide adoption of intelligent healthcare systems relies on a strong security mechanism. In addition, the use of restricted resources in health devices in IoT-enabled healthcare systems requires the installation of a combination of steganography and cryptography to protect these applications. The amalgamation of steganography and encryption diminishes susceptibilities and poses a formidable obstacle for trespassers attempting to get access to confidential data. This work proposes a security system that utilises the Diffie and Hellman algorithm for secret key sharing, as well as the Least Significant Bit (LSB) steganography principle and Deoxyribo Nucleic Acid (DNA) cryptography for encryption and decryption. The system is implemented using MATLAB 2018a tools. An evaluation is conducted on the encryption time, throughput, Peak Noise to Signal Ratio (PSNR), and Mean Square Error (MSE) of the proposed system. The suggested system has superior security and efficiency compared to the Advanced Encryption Standard and LSB algorithms, as confirmed by the performance evaluation.


Keywords


Authentication, Cryptography, Least Significance Bit, DNA Cryptography, Medical Internet of Things, Steganography, One Time Pad.


  1. N. M. M. AbdElnapi, N. F. Omran, A. A. Ali, and F. A. Omara, “A survey of internet of things technologies and projects for healthcare services,” 2018 International Conference on Innovative Trends in Computer Engineering (ITCE), pp. 48–55, Feb. 2018, doi: 10.1109/itce.2018.8316599.
  2. M. Kumar et al., “Healthcare Internet of Things (H-IoT): Current Trends, Future Prospects, Applications, Challenges, and Security Issues,” Electronics, vol. 12, no. 9, p. 2050, Apr. 2023, doi: 10.3390/electronics12092050.
  3. T. Oduguwa and A. Arabo, “Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics,” Jan. 2024, doi: 10.20944/preprints202401.1466.v1.
  4. S. R. Moosavi et al., “SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways,” Procedia Computer Science, vol. 52, pp. 452–459, 2015, doi: 10.1016/j.procs.2015.05.013.
  5. Y. Liu et al., “A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things,” IEEE Transactions on Computers, vol. 72, no. 2, pp. 501–512, Feb. 2023, doi: 10.1109/tc.2022.3157996.
  6. W. Mao, P. Jiang, and L. Zhu, “BTAA: Blockchain and TEE-Assisted Authentication for IoT Systems,” IEEE Internet of Things Journal, vol. 10, no. 14, pp. 12603–12615, Jul. 2023, doi: 10.1109/jiot.2023.3252565.
  7. R. Bułat and M. R. Ogiela, “Personalized Context-Aware Authentication Protocols in IoT,” Applied Sciences, vol. 13, no. 7, p. 4216, Mar. 2023, doi: 10.3390/app13074216.
  8. M. Tanveer, A. Badshah, A. U. Khan, H. Alasmary, and S. A. Chaudhry, “CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things,” Internet of Things, vol. 23, p. 100902, Oct. 2023, doi: 10.1016/j.iot.2023.100902.
  9. F. Mohd Ali, N. A. Md Yunus, N. N. Mohamed, M. Mat Daud, and E. A. Sundararajan, “A Systematic Mapping: Exploring Internet of Everything Technologies and Innovations,” Symmetry, vol. 15, no. 11, p. 1964, Oct. 2023, doi: 10.3390/sym15111964.
  10. Y. Zhang, D. He, P. Vijayakumar, M. Luo, and X. Huang, “SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things,” IEEE Internet of Things Journal, vol. 10, no. 11, pp. 9716–9726, Jun. 2023, doi: 10.1109/jiot.2023.3234178.
  11. P. V. S., B. R. S., and P. A. R., “A Novel Security Scheme for Secret Data using Cryptography and Steganography,” International Journal of Computer Network and Information Security, vol. 4, no. 2, pp. 36–42, Mar. 2012, doi: 10.5815/ijcnis.2012.02.06.
  12. Jamal N Bani Salameh, “A New Approach for Securing Medical Images and Patient’s Information by Using A hybrid System,” International Journal of Network Security, 19, 28-39, 2019.
  13. S. Ahmed Laskar, “High Capacity data hiding using LSB Steganography and Encryption,” International Journal of Database Management Systems, vol. 4, no. 6, pp. 57–68, Dec. 2012, doi: 10.5121/ijdms.2012.4605.
  14. A. Sajid Ansari, M. Sajid Mohammadi, and M. Tanvir Parvez, “A Comparative Study of Recent Steganography Techniques for Multiple Image Formats,” International Journal of Computer Network and Information Security, vol. 11, no. 1, pp. 11–25, Jan. 2019, doi: 10.5815/ijcnis.2019.01.02.
  15. D. A. Trujillo-Toledo et al., “Real-time medical image encryption for H-IoT applications using improved sequences from chaotic maps,” Integration, vol. 90, pp. 131–145, May 2023, doi: 10.1016/j.vlsi.2023.01.008.
  16. N. H. Kamarudin, N. H. S. Suhaimi, F. A. Nor Rashid, M. N. A. Khalid, and F. Mohd Ali, “Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review,” Symmetry, vol. 16, no. 2, p. 171, Feb. 2024, doi: 10.3390/sym16020171.
  17. S. Dhar, A. Khare, A. D. Dwivedi, and R. Singh, “Securing IoT devices: A novel approach using blockchain and quantum cryptography,” Internet of Things, vol. 25, p. 101019, Apr. 2024, doi: 10.1016/j.iot.2023.101019.
  18. M. M. Hashim, S. H. Rhaif, A. A. Abdulrazzaq, A. H. Ali, and M. S. Taha, “Based on IoT Healthcare Application for Medical Data Authentication: Towards A New Secure Framework Using Steganography,” IOP Conference Series: Materials Science and Engineering, vol. 881, no. 1, p. 012120, Jul. 2020, doi: 10.1088/1757-899x/881/1/012120.
  19. Y. Jiang et al., “Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 12, pp. 7799–7809, Dec. 2022, doi: 10.1109/tsmc.2022.3164024.
  20. D. M. S. Zekrifa et al., “Securing energy horizons: Cloud-driven based machine learning methods for battery management systems,” Journal of Intelligent & Fuzzy Systems, vol. 46, no. 1, pp. 3029–3043, Jan. 2024, doi: 10.3233/jifs-236391.
  21. N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, “Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations,” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2702–2733, 2019, doi: 10.1109/comst.2019.2910750.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Wubie Engdew Hailu, Ravindra Babu Bellam; Methodology: Wubie Engdew Hailu, Ravindra Babu Bellam, KrishnaPrasad B, Sarwani Theeparthi J L, Raghavendra Gowda and Subramanian Selvakumar; Data Curation: Sarwani Theeparthi J L,Raghavendra Gowda and Subramanian Selvakumar; Writing- Original Draft Preparation: Wubie Engdew Hailu, Ravindra Babu Bellam, KrishnaPrasad B, Sarwani Theeparthi J L, Raghavendra Gowda and Subramanian Selvakumar; Validation: Sarwani Theeparthi J L, Raghavendra Gowda and Subramanian Selvakumar; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


The author(s) received no financial support for the research, authorship, and/or publication of this article.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Wubie Engdew Hailu, Ravindra Babu Bellam, KrishnaPrasad B, Sarwani Theeparthi J L, Raghavendra Gowda and Subramanian Selvakumar, “A Secure Authentication Algorithm for Medical IoT using Steganography and Cryptography”, Journal of Machine and Computing, vol.5, no.1, pp. 409-420, January 2025, doi: 10.53759/7669/jmc202505032.


Copyright


© 2025 Wubie Engdew Hailu, Ravindra Babu Bellam, KrishnaPrasad B, Sarwani Theeparthi J L, Raghavendra Gowda and Subramanian Selvakumar. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.