Multi-key Modified Tiny Encryption Algorithm for HealthCare

  • Authors

    • Sharath Aradhyamath Christ University
    • Joy Paulose
    2018-04-15
    https://doi.org/10.14419/ijet.v7i2.9894
  • IoT, Data confidentiality, HealthCare, lightweight, Equivalent key.
  • Healthcare data is crucial in patient’s surveillance. To give the finest treatment to patients the data should be of the best quality. Many security threats affect the integrity and ingenuity of the medical data. In the recent times, medical data can be accessed anytime and anywhere with the help of an overwhelming technology called the Internet of Things (IoT). IoT has numerous applications based on healthcare, however, it facilitates data misuse such as data breach and health care fraud. Sensitive and protected data is stolen and modified by an unauthorized person. Due to these data abuses, it degrades the quality of medical data and service. In this paper, secure data transfer is done in IoT based healthcare to enhance the security of the medical data. Data confidentiality can be achieved using encryption algorithms such as Tiny Encryption Algorithm (TEA) which is lightweight and suitable for resource constraint devices. The results of the proposed system show that the modified TEA overcomes the drawback of the equivalent key and also provides a better security to healthcare data.

  • References

    1. [1] Islam, S. R., Kwak, D., Kabir, M. H., Hossain, M., & Kwak, K. S. (2015). The internet of things for health care: a comprehensive survey. IEEE Access, 3, 678-708.

      [2] Aledhari, M., Marhoon, A., Hamad, A., & Saeed, F. (2017, July). A New Cryptography Algorithm to Protect Cloud-Based Healthcare Services. In Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017 IEEE/ACM International Conference on (pp. 37-43). IEEE.

      [3] Larburu, N., Bults, R., Van Sinderen, M., Widya, I. and Hermens, H. (2015). An Ontology for Telemedicine Systems Resiliency to Technological Context Variations in Pervasive Healthcare. IEEE Journal of Translational Engineering in Health and Medicine, [online] 3, pp.1-10. Available at: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4848059/

      [4] Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of medical systems, 36(1), 93-101.

      [5] Luhach, A. K. (2016). Analysis of lightweight cryptographic solutions for Internet of Things. Indian Journal of Science and Technology, 9(28).

      [6] Devi, K. N., & Muthuselvi, R. (2016). Secret Sharing of IoT Healthcare Data Using cryptographic algorithm. International Journal of Engineering Research Volume, (5).Y. Wang, G. Attebury, and B. Ramamurthy. (2006, Jun). A survey of security issues in wireless sensor networks. IEEE Commun. Surveys Tuts., vol. 8, no. 2, pp. 2-23.

      [7] Healthcare Data Breaches (2015, Jun). Hippa Journal, Available: http://www.hipaajournal.com/2015-healthcare-data-breaches-pass-100-incident-milestone-7052/.

      [8] Katagi, M., & Moriai, S. (2008). Lightweight cryptography for the internet of things. Sony Corporation, 7-10.

      [9] Alizadeh, M., Hassan, W. H., Zamani, M., Karamizadeh, S., & Ghazizadeh, E. (2013). Implementation and evaluation of lightweight encryption algorithms suitable for RFID. Journal of Next Generation Information Technology, 4(1), 65

      [10] Israsena, P. (2005, December). Design and implementation of low power hardware encryption for low cost secure RFID using TEA. In Information, Communications and Signal Processing, 2005 Fifth International Conference on (pp. 1402-1406). IEEE.

      [11] Abdelhalim, M. B., El-Mahallawy, M., Ayyad, M., & ElHennawy, A. (2011, December). Implementation of a modified lightweight cryptographic TEA algorithm in RFID system. In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for (pp. 509-513). IEEE

      [12] Gong, T., Huang, H., Li, P., Zhang, K., & Jiang, H. (2015, December). A medical healthcare system for privacy protection based on IoT. In Parallel Architectures, Algorithms and Programming (PAAP), 2015 Seventh International Symposium on (pp. 217-222). IEEE.

      [13] Kelsey, J., Schneier, B., & Wagner, D. (1996). Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des. In Advances in Cryptology—CRYPTO’96 (pp. 237-251). Springer Berlin/Heidelberg.

      [14] Andem, V. R. (2003). A cryptanalysis of the tiny encryption algorithm (Doctoral dissertation, University of Alabama).M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989

      [15] Mala, H., Dakhilalian, M., & Shakiba, M. (2012). Cryptanalysis of mCrypton—A lightweight block cipher for security of RFID tags and sensors. International Journal of Communication Systems, 25(4), 415-426.

      [16] Wheeler, D. J., & Needham, R. M. (1994, December). TEA, a tiny encryption algorithm. In International Workshop on Fast Software Encryption (pp. 363-366). Springer Berlin Heidelberg.

  • Downloads

  • How to Cite

    Aradhyamath, S., & Paulose, J. (2018). Multi-key Modified Tiny Encryption Algorithm for HealthCare. International Journal of Engineering & Technology, 7(2), 559-563. https://doi.org/10.14419/ijet.v7i2.9894