Efficient DDOS Prevention in Internet of Medical Things Using 2aes and Digital Signature Approaches

Main Article Content

Jeethu Mathew, Jemima Priyadarsini R.

Abstract

All significant software and hardware systems require network security to operate properly. Organizational management and administration are essential to provide software and hardware protection. The secrecy of the data is another crucial factor. Network security relies heavily on cryptography to guard against unauthorized access. Confidentiality No third party will be able to evaluate or examine the supplied data. The use of encryption has overcome the problem over the long term. Only when applying cryptography, a set of techniques executed with the use of secured secret keys that transform the original communication into an encrypted message and vice versa, can the true sender and recipient of the information access the information. The algorithm in computer networks consists of a collection of compound mathematical formulas which represent the rules in the conversion of cipher text to plain text and vice versa along with the assured key. Particularly for controlling access to digital and physical resources including rooms, buildings, and computing equipment, biometric authentication methods are employed. The method of biometric identification uses biometrics, such as fingerprints or retinal scans, to identify a person. Biometric authentication makes use of biometric data to confirm a person's identity. Improving data security while executing encryption and decryption operation is the main issue that’s to be addressed in this research. The main goal of the research is to provide a novel algorithm that, by minimising a significant range of time delays necessary to maintain the integrity of the information, boosts security while improving performance. In this research medical data in medical IoT has been encrypted and decrypted to secure the data from DDOS attack. Algorithms such as 2AES, 2RSA, 2DES, 2Blowfish along with Digital Signature is done in this research. Various metrics like Time Complexity, Space Complexity and Retrieval Time have been analyzed. From the results it’s proved that 2AES with Digital Signature provides better results than other algorithms. The tool used for execution is Python.

Article Details

Section
Articles