scholarly journals Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA

2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
Maria-Dolores Cano ◽  
Antonio Cañavate-Sanchez

The disclosure of personal and private information is one of the main challenges of the Internet of Medical Things (IoMT). Most IoMT-based services, applications, and platforms follow a common architecture where wearables or other medical devices capture data that are forwarded to the cloud. In this scenario, edge computing brings new opportunities to enhance the operation of IoMT. However, despite the benefits, the inherent characteristics of edge computing require countermeasures to address the security and privacy issues that IoMT gives rise to. The restrictions of IoT devices in terms of battery, memory, hardware resources, or computing capabilities have led to a common agreement for the use of elliptic curve cryptography (ECC) with hardware or software implementations. As an example, the elliptic curve digital signature algorithm (ECDSA) is widely used by IoT devices to compute digital signatures. On the other hand, it is well known that dual signature has been an effective method to provide consumer privacy in classic e-commerce services. This article joins both approaches. It presents a novel solution to enhanced security and the preservation of data privacy in communications between IoMT devices and the cloud via edge computing devices. While data source anonymity is achieved from the cloud perspective, integrity and origin authentication of the collected data is also provided. In addition, computational requirements and complexity are kept to a minimum.

Author(s):  
Muhammad Elsayeh ◽  
Kadry Ali Ezzat ◽  
Hany El-Nashar ◽  
Lamia Nabil Omran

The internet of medical things (IoMT) has a great role in improving the health around the world. IoMT is having a great impact in our life in which the clinical data of the patient is observed and checked and then can be transferred to the third party for using in the future such as the cloud. IoMT is a huge data system with a continuous developing rate, which implies that we should keep a lot of data secure. We propose a combined security architecture that fuses the standard architecture and new blockchain technology. Blockchain is a temper digital ledger which gives peer-to-peer communication and provides communication between non-trust individuals. Using standard in-depth strategy and blockchain, we are able to develop a method to collect vital signs data from IoMT and connected devices and use blockchain to store and retrieve the collected data in a secure and decentralized fashion within a closed system, suitable for healthcare providers such as private clinics, hospitals, and healthcare organizations were sharing data with each other is required. Right now initially examine the innovation behind Blockchain then propose IoMT-based security architecture utilizing Blockchain to guarantee the security of information transmission between associated nodes. Experimental analysis shows that the proposed scheme presents a non-significant overhead; yet it brings major advantages to meet the standard security and privacy requirements in IoMT.


Author(s):  
George Hatzivasilis ◽  
Othonas Soultatos ◽  
Sotiris Ioannidis ◽  
Christos Verikoukis ◽  
Giorgos Demetriou ◽  
...  

Author(s):  
Aakanksha Tewari ◽  
Brij B. Gupta

Internet of Things (IoT) is playing more and more important roles in our daily lives in the last decade. It can be a part of traditional machine or equipment to daily household objects as well as wireless sensor networks and devices. IoT has a huge potential which is still to be unleashed. However, as the foundation of IoT is the Internet and all the data collected by these devices is over the Internet, these devices also face threats to security and privacy. At the physical or sensor layer of IoT devices the most commonly used technology is RFID. Thus, securing the RFID tag by cryptographic mechanisms can secure our data at the device as well as during communication. This article first discusses the flaws of our previous ultra-lightweight protocol due to its vulnerability to passive secret disclosure attack. Then, the authors propose a new protocol to overcome the shortcomings of our previous work. The proposed scheme uses timestamps in addition to bitwise operation to provide security against de-synchronization and disclosure. This research also presents a security and performance analysis of our approach and its comparison with other existing schemes.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


2019 ◽  
Vol 11 (4) ◽  
pp. 100 ◽  
Author(s):  
Maurizio Capra ◽  
Riccardo Peloso ◽  
Guido Masera ◽  
Massimo Ruo Roch ◽  
Maurizio Martina

In today’s world, ruled by a great amount of data and mobile devices, cloud-based systems are spreading all over. Such phenomenon increases the number of connected devices, broadcast bandwidth, and information exchange. These fine-grained interconnected systems, which enable the Internet connectivity for an extremely large number of facilities (far beyond the current number of devices) go by the name of Internet of Things (IoT). In this scenario, mobile devices have an operating time which is proportional to the battery capacity, the number of operations performed per cycle and the amount of exchanged data. Since the transmission of data to a central cloud represents a very energy-hungry operation, new computational paradigms have been implemented. The computation is not completely performed in the cloud, distributing the power load among the nodes of the system, and data are compressed to reduce the transmitted power requirements. In the edge-computing paradigm, part of the computational power is moved toward data collection sources, and, only after a first elaboration, collected data are sent to the central cloud server. Indeed, the “edge” term refers to the extremities of systems represented by IoT devices. This survey paper presents the hardware architectures of typical IoT devices and sums up many of the low power techniques which make them appealing for a large scale of applications. An overview of the newest research topics is discussed, besides a final example of a complete functioning system, embedding all the introduced features.


Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4375 ◽  
Author(s):  
Yuxuan Wang ◽  
Jun Yang ◽  
Xiye Guo ◽  
Zhi Qu

As one of the information industry’s future development directions, the Internet of Things (IoT) has been widely used. In order to reduce the pressure on the network caused by the long distance between the processing platform and the terminal, edge computing provides a new paradigm for IoT applications. In many scenarios, the IoT devices are distributed in remote areas or extreme terrain and cannot be accessed directly through the terrestrial network, and data transmission can only be achieved via satellite. However, traditional satellites are highly customized, and on-board resources are designed for specific applications rather than universal computing. Therefore, we propose to transform the traditional satellite into a space edge computing node. It can dynamically load software in orbit, flexibly share on-board resources, and provide services coordinated with the cloud. The corresponding hardware structure and software architecture of the satellite is presented. Through the modeling analysis and simulation experiments of the application scenarios, the results show that the space edge computing system takes less time and consumes less energy than the traditional satellite constellation. The quality of service is mainly related to the number of satellites, satellite performance, and task offloading strategy.


2020 ◽  
Vol 17 (1) ◽  
pp. 402-408
Author(s):  
Soram Ranbir Singh ◽  
Khan Kumar Ajoy

The Internet of Things (IoT) has ushered in numerous devices in many areas in our life and in industries. It could comprise devices with sensors to gather and broadcast data over the internet. As the devices are IP-based and the media are shared, any user in the network can have an access to the communication contents. The only way to impose access control in the sensor networks is through cryptography. A key is applied to encrypt the communication to prevent from unauthorized access to the network. Choosing a suitable key management scheme is very important in sensor networks as it should satisfy the constraints of the sensors. There are two indispensable public cryptosystems available in the literatures-RSA and Elliptic curve cryptography (ECC). ECC gives strong resistance to cryptanalytic attacks. So, it is used with smaller key sizes than RSA (Valenta, L., et al., 2018. In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild. 2018 IEEE European Symposium on Security and Privacy (EuroS&P), April; IEEE. pp.384–398). The most prettiness of using elliptic curve cryptography over other cryptosystems (i.e., RSA) is that it provides same security strength for a lesser key without breaching the system, thereby consuming less resources and ameliorating performances and fast data throughput of the devices. To choose a suitable public cryptosystem for use in IoT devices like sensor networks, elliptic curve cryptography and RSA are comparatively analyzed in this paper.


2020 ◽  
Vol 17 (5) ◽  
pp. 2388-2395
Author(s):  
M. Vivek Anand ◽  
S. Vijayalakshmi

IoT is changing the way for a world, where many of our daily objects will be connected with each other and will interact with their environment in order to collect information and automate certain tasks. IoT requires seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self-maintenance. Protecting data in the internet of things is essential for making the IoT environment secure. In order to secure the data on the internet of things, the blockchain will provide distributed peer to peer networks. Blockchain-based internet of things is making a secure environment in the IoT environment. Data are stored in the form of images in IoT devices that are captured in various locations in the IoT environment for processing. Images are stored as data in the blockchain and it acts as a transaction. This paper expresses the environment of blockchain-based internet of things with image validation. This paper will explain this domain with an example of a criminal’s image identification with image processing techniques to provide better service to the cyber intelligence agency to find criminals easily. The identification of criminals is done by comparing the images of the criminals’ identification.


Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.


Author(s):  
Narendhiran R, Pavithra K, Rakshana P, Sangeetha P

The Internet of things (IoT) is the network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. IoT involves extending Internet connectivity beyond standard devices, such as desktops, laptops, smart phones and tablets, to any range of traditionally dumb or non-internet-enabled physical devices and everyday objects. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled. Traditionally, current internet packet delivery only depends on packet destination IP address and forward devices neglect the validation of packet’s IP source address. It makes attacks can leverage this flow to launch attacks with forge IP source address so as to meet their violent purpose and avoid to be tracked. In order to reduce this threat and enhance internet accountability, many solution proposed in the inter domain and intra domain aspects. Furthermore, most of them faced with some issues hard to cope, i.e., data security, data privacy. And most importantly code cover PureVPN protocol for both inter and intra domain areas. The novel network architecture of SDN possess whole network PureVPN protocol rule instead of traditional SDN switches, which brings good opportunity to solve IP spoofing problems. However, use authentication based on key exchange between the machines on your network; something like IP Security protocol will significantly cut down on the risk of spoofing. This paper proposes a SDN based PureVPN protocol architecture, which can cover both inter and intra domain areas with encrypted format effectively than SDN devices. The PureVPN protocol scheme is significant in improving the security and privacy in SDN for IoT.


Sign in / Sign up

Export Citation Format

Share Document