Saif Sohail, Das Priya, Biswas Suparna, Khan Shakir, Haq Mohd Anul, Kovtun Viacheslav
Department of Computer Applications, Maulana Abul Kalam Azad University of Technology, Haringhata, 741249, India.
Department of Computer Science, Chakdaha College, Chakdaha, 741222, India.
Heliyon. 2024 Aug 14;10(16):e36269. doi: 10.1016/j.heliyon.2024.e36269. eCollection 2024 Aug 30.
The Internet of Medical Things (IoMT) has transformed healthcare by connecting medical devices, sensors, and patients, significantly improving patient care. However, the sensitive data exchanged through IoMT is vulnerable to security attacks, raising serious privacy concerns. Traditional key sharing mechanisms are susceptible to compromise, posing risks to data integrity. This paper proposes a Timestamp-based Secret Key Generation (T-SKG) scheme for resource-constrained devices, generating a secret key at the patient's device and regenerating it at the doctor's device, thus eliminating direct key sharing and minimizing key compromise risks. Simulation results using MATLAB and Java demonstrate the T-SKG scheme's resilience against guessing, birthday, and brute force attacks. Specifically, there is only a 9 % chance of key compromise in a guessing attack if the attacker knows the key sequence pattern, while the scheme remains secure against brute force and birthday attacks within a specified timeframe. The T-SKG scheme is integrated into a healthcare framework to securely transmit health vitals collected using the MySignals sensor kit. For confidentiality, the Data Encryption Standard (DES) with various Cipher Block modes (ECB, CBC, CTR) is employed.
医疗物联网(IoMT)通过连接医疗设备、传感器和患者改变了医疗保健方式,显著改善了患者护理。然而,通过IoMT交换的敏感数据容易受到安全攻击,引发了严重的隐私担忧。传统的密钥共享机制容易受到破坏,对数据完整性构成风险。本文提出了一种基于时间戳的密钥生成(T-SKG)方案,用于资源受限设备,在患者设备上生成密钥,并在医生设备上重新生成,从而消除直接的密钥共享并将密钥泄露风险降至最低。使用MATLAB和Java的仿真结果证明了T-SKG方案对猜测、生日和暴力攻击的抵御能力。具体而言,如果攻击者知道密钥序列模式,在猜测攻击中密钥泄露的可能性仅为9%,而该方案在指定时间范围内对暴力攻击和生日攻击仍保持安全。T-SKG方案被集成到一个医疗保健框架中,以安全地传输使用MySignals传感器套件收集的健康数据。为了保证机密性,采用了具有各种密码块模式(ECB、CBC、CTR)的数据加密标准(DES)。