As cloud computing becomes increasingly prevalent in Industrial Internet of Things (IIOT) environments, concerns about data security are growing. Wireless sensor networks (WSNs), a crucial component of IIOT, require secure data accessing to ensure the integrity and confidentiality of information. To address this issue, researchers have proposed a novel approach that leverages DNA computing for fast and secure data accessing. This innovative scheme combines robust hash-based conditional privacy preserving authentication and probabilistic key exchange protocol, reducing computation overhead on entities involved.
Can DNA Computing Ensure Secure Data Accessing in Cloud Environment?
The increasing reliance on cloud computing has raised concerns about data security, particularly in Industrial Internet of Things (IIOT) environments. Wireless sensor networks (WSNs), a crucial component of IIOT, require secure data accessing to ensure the integrity and confidentiality of information. Anusuya’s proposed scheme aims to address this issue by leveraging DNA computing for fast and secure data accessing.
In WSNs, sensor nodes are deployed in open communication channels, making them vulnerable to attacks. Existing schemes have limitations that restrict their application in IIOT environments. The proposed work presents a novel approach that combines robust hash-based conditional privacy preserving authentication and probabilistic key exchange protocol. This lightweight protocol reduces computation overhead on entities involved.
The security of the proposed scheme is ensured through both formal and informal analysis. Formal analysis involves AVISPA (Automated Validation of Internet Security Protocols And) simulations, as well as Real or Random oracle model simulations. Informal analysis provides proofs demonstrating the effectiveness of the proposed scheme in ensuring secure data accessing.
DNA Computing: A New Approach to Secure Data Accessing
DNA computing has emerged as a promising technology for solving complex computational problems. In the context of IIOT, DNA computing can be used to develop novel cryptographic protocols that ensure secure data accessing. The proposed work demonstrates the potential of DNA computing in this area by presenting a scheme that leverages its unique properties.
The use of DNA computing in cryptography offers several advantages. Firstly, it provides an unprecedented level of security due to the inherent randomness and uniqueness of DNA sequences. Secondly, DNA computing can be used to develop lightweight cryptographic protocols that reduce computation overhead on entities involved. This is particularly important in IIOT environments where sensor nodes have limited processing power.
The proposed scheme uses a combination of DNA-based encryption and decryption techniques to ensure secure data accessing. The encryption process involves the use of DNA sequences to encode sensitive information, while the decryption process utilizes DNA-based algorithms to recover the original data. The security of this approach is ensured through the inherent randomness and uniqueness of DNA sequences.
Formal Analysis: Ensuring the Security of the Proposed Scheme
Formal analysis plays a crucial role in ensuring the security of the proposed scheme. AVISPA simulations provide a comprehensive evaluation of the protocol’s security, while Real or Random oracle model simulations offer additional insights into its effectiveness.
AVISPA simulations involve the use of automated tools to validate the protocol’s security against various attacks. This includes attacks on the encryption and decryption processes, as well as attacks on the key exchange mechanism. The results of these simulations demonstrate that the proposed scheme is secure against a range of attacks, including those that target the encryption and decryption processes.
Real or Random oracle model simulations provide additional insights into the protocol’s security. These simulations involve the use of random oracles to evaluate the protocol’s resistance to various types of attacks. The results of these simulations demonstrate that the proposed scheme is resistant to attacks on the key exchange mechanism, as well as attacks on the encryption and decryption processes.
Informal Analysis: Proofs of Security
Informal analysis provides additional insights into the security of the proposed scheme. This includes proofs demonstrating the effectiveness of the protocol in ensuring secure data accessing.
One such proof involves demonstrating that the proposed scheme is resistant to attacks on the key exchange mechanism. This is achieved through a combination of mathematical and cryptographic techniques, including the use of DNA-based algorithms to recover the original data.
Another proof involves demonstrating that the proposed scheme is resistant to attacks on the encryption and decryption processes. This is achieved through a combination of mathematical and cryptographic techniques, including the use of DNA-based algorithms to encode and decode sensitive information.
Conclusion
The proposed scheme presents a novel approach to secure data accessing in IIOT environments using DNA computing. The scheme combines robust hash-based conditional privacy preserving authentication and probabilistic key exchange protocol, which is lightweight and reduces computation overhead on entities involved. Formal analysis demonstrates the security of the proposed scheme against various attacks, while informal analysis provides additional insights into its effectiveness.
Publication details: “FAST AND SECURE DATA ACCESSING BY USING DNA COMPUTING FOR THE CLOUD ENVIRONMENT”
Publication Date: 2024-08-11
Authors:
Source: International Research Journal of Modernization in Engineering Technology and Science
DOI: https://doi.org/10.56726/irjmets60906
