SlideShare a Scribd company logo
1 of 9
A Secure Framework for
Authentication and
Encryption Using Improved ECC for
IoT-Based Medical Sensor Data
BY: GAUTHAM SK
SUBJECT: INFORMATION AND NETWORK SECURITY
GUIDED BY: ANJAN K KOUNDINYA (ASSOCIATE PROFESSOR)
Proposed Framework
PROPOSED METHODOLOGY
 It consist of two phases:
1. AUTHENTICATION
a) REGISTRATION
b) LOGIN
c) VERIFICATION
2. DATA SECURITY
a) SUBSTITUTION CAESAR CIPHER
b) IMPROVED ECC ENCRYPTION
AUTHENTICATION
REGISTRATION
Consider a patient P with
identification Idi along with a
password Pwi.
Hc = hf (Idi || Pwi|| Bi)
Hc is the hash code generated by
SHA-512
hf is a hash function
During registration, a Tp creates
the private key Prk
LOGIN
The patient logins:
Hs1 = hf (Id1 || Pw1 || B*1)
The hash code Hs1 is encrypted by
private key Prk
Ec = Hc  Prk
VERIFICATION
The encrypted hash code is
decrypt
Dc = E  Prk
SHA-512 is again computed on
the patients detail:
Hs2 = h(ID2 || PW2 || B2)
if(Hs1==Hs2)
valid patient
else
invalid patient
AUTHENTICATION FLOW
DATA SECURITY
 SUBSTITUTION CAESAR CIPHER
 Substitution Cipher
In this, every letter in the plain text is shifted to a certain place in the
alphabet. For e.g., with a shift of one, A would be swapped with B, B would
become C, and so on
 Caesar Cipher
The output of the substitution cipher is given to the Caesar cipher, in this a
key is used to shift the message.
e (x) = (x + k) (mod26)
d (x) = (x – k) (mod26)
DATA SECURITY
 IMPROVED ECC ENCRYPTION
In normal ECC, only two sorts of keys are created (public and private key),
whereas in improved ECC, an additional key (secret key) is generated to
enhance the system's security.
3 types of keys are generated:
1. Private Key (for decrypting the data)
Generated by choosing a random number between 0 and n-1.
2. Public Key (for encrypting the data)
Produced by the equation (1) & (2):
Puk = Prk * Bs (1)
Puk =  (Prk,Bs) (2)
DATA SECURITY
 IMPROVED ECC ENCRYPTION
3. Secret Key
Generated by summing Puk , Prk and Bs
Sk = ∑ (Puk, Prk, Bs)
 After generating key, two ciphertext is created:
 C1 = (S1 * Bs ) + Sk
 C2 = M + (S1 * Puk) + Sk
S1 is random number between 1 and n-1
 Decryption (Secret Key is subtracted)
M = ((C2 – Prk ) * C1 ) – Sk
Conclusion
Based on the simulation, the average encryption and decryption time 1.032 and
1.004 µs respectively, which is lower than the ECC and RSA and the scheme
achieves security requirements such as low encryption, decryption time and
communication overhead.

More Related Content

Similar to A secure framework for authentication and encryption using improved ECC for IoT based medical sensor data

Certified Pseudonym Colligated with Master Secret Key
Certified Pseudonym Colligated with Master Secret KeyCertified Pseudonym Colligated with Master Secret Key
Certified Pseudonym Colligated with Master Secret KeyVijay Pasupathinathan, PhD
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET Journal
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
A secure system for pervasive social network based healthcare
A secure system for pervasive social network based healthcareA secure system for pervasive social network based healthcare
A secure system for pervasive social network based healthcareNam Yong Kim
 
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Svetlin Nakov
 
A Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve CryptographyA Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve Cryptographyeditor1knowledgecuddle
 
IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1Abdallah Abuouf
 
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...IJECEIAES
 
Low Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesLow Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesCSCJournals
 
Unit 2a combinational circuits
Unit 2a combinational circuitsUnit 2a combinational circuits
Unit 2a combinational circuitsanshul sharma
 
CapSense Data Viewing Tool - Design Aids
CapSense Data Viewing Tool - Design AidsCapSense Data Viewing Tool - Design Aids
CapSense Data Viewing Tool - Design Aidsccox826
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Similar to A secure framework for authentication and encryption using improved ECC for IoT based medical sensor data (20)

Certified Pseudonym Colligated with Master Secret Key
Certified Pseudonym Colligated with Master Secret KeyCertified Pseudonym Colligated with Master Secret Key
Certified Pseudonym Colligated with Master Secret Key
 
I26043047
I26043047I26043047
I26043047
 
38
3838
38
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
A secure system for pervasive social network based healthcare
A secure system for pervasive social network based healthcareA secure system for pervasive social network based healthcare
A secure system for pervasive social network based healthcare
 
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
A Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve CryptographyA Survey on Elliptic Curve Cryptography
A Survey on Elliptic Curve Cryptography
 
IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1
 
G05215356
G05215356G05215356
G05215356
 
Chapter 15 - Security
Chapter 15 - SecurityChapter 15 - Security
Chapter 15 - Security
 
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
 
Low Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesLow Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained Devices
 
Unit 2a combinational circuits
Unit 2a combinational circuitsUnit 2a combinational circuits
Unit 2a combinational circuits
 
CapSense Data Viewing Tool - Design Aids
CapSense Data Viewing Tool - Design AidsCapSense Data Viewing Tool - Design Aids
CapSense Data Viewing Tool - Design Aids
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Recently uploaded

Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Toolssoginsider
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentationsj9399037128
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...Amil baba
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxMANASINANDKISHORDEOR
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.benjamincojr
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 

Recently uploaded (20)

Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 

A secure framework for authentication and encryption using improved ECC for IoT based medical sensor data

  • 1. A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data BY: GAUTHAM SK SUBJECT: INFORMATION AND NETWORK SECURITY GUIDED BY: ANJAN K KOUNDINYA (ASSOCIATE PROFESSOR)
  • 3. PROPOSED METHODOLOGY  It consist of two phases: 1. AUTHENTICATION a) REGISTRATION b) LOGIN c) VERIFICATION 2. DATA SECURITY a) SUBSTITUTION CAESAR CIPHER b) IMPROVED ECC ENCRYPTION
  • 4. AUTHENTICATION REGISTRATION Consider a patient P with identification Idi along with a password Pwi. Hc = hf (Idi || Pwi|| Bi) Hc is the hash code generated by SHA-512 hf is a hash function During registration, a Tp creates the private key Prk LOGIN The patient logins: Hs1 = hf (Id1 || Pw1 || B*1) The hash code Hs1 is encrypted by private key Prk Ec = Hc  Prk VERIFICATION The encrypted hash code is decrypt Dc = E  Prk SHA-512 is again computed on the patients detail: Hs2 = h(ID2 || PW2 || B2) if(Hs1==Hs2) valid patient else invalid patient
  • 6. DATA SECURITY  SUBSTITUTION CAESAR CIPHER  Substitution Cipher In this, every letter in the plain text is shifted to a certain place in the alphabet. For e.g., with a shift of one, A would be swapped with B, B would become C, and so on  Caesar Cipher The output of the substitution cipher is given to the Caesar cipher, in this a key is used to shift the message. e (x) = (x + k) (mod26) d (x) = (x – k) (mod26)
  • 7. DATA SECURITY  IMPROVED ECC ENCRYPTION In normal ECC, only two sorts of keys are created (public and private key), whereas in improved ECC, an additional key (secret key) is generated to enhance the system's security. 3 types of keys are generated: 1. Private Key (for decrypting the data) Generated by choosing a random number between 0 and n-1. 2. Public Key (for encrypting the data) Produced by the equation (1) & (2): Puk = Prk * Bs (1) Puk =  (Prk,Bs) (2)
  • 8. DATA SECURITY  IMPROVED ECC ENCRYPTION 3. Secret Key Generated by summing Puk , Prk and Bs Sk = ∑ (Puk, Prk, Bs)  After generating key, two ciphertext is created:  C1 = (S1 * Bs ) + Sk  C2 = M + (S1 * Puk) + Sk S1 is random number between 1 and n-1  Decryption (Secret Key is subtracted) M = ((C2 – Prk ) * C1 ) – Sk
  • 9. Conclusion Based on the simulation, the average encryption and decryption time 1.032 and 1.004 µs respectively, which is lower than the ECC and RSA and the scheme achieves security requirements such as low encryption, decryption time and communication overhead.