DNA sequences for robust encryption: a strategy for IoT security enhancement


  • Kadda Benyahia
  • Abdelkader Khobzaoui
  • Soumia Benbakreti




ctyptography, DNA, encryption, decryption, security


As the Internet of Things (IoT) permeates our lives, connecting everything from household appliances to complex industrial systems, the imperative to secure these devices intensifies. Cryptography, as a cornerstone of digital security, plays a crucial role in safeguarding transmission channels from intrusions and misuse. Cryptography secures communications and data within IoT networks by ensuring three key functions: confidentiality, integrity, and authentication. DNA-based cryptography emerges as a promising innovation in the field of cybersecurity, particularly for the Internet of Things (IoT), where data and communication security is an escalating concern. Utilizing the unique properties of DNA, such as its massive storage capacity and biomolecular complexity, this approach introduces a novel dimension of security. This study introduces a balanced approach within DNA cryptography to enhance message security in Internet of Things (IoT) settings. It outlines a method for creating secure symmetric keys using DNA sequences, typically derived from human chromosomes, and then applies biological techniques like transcription and a biological Xor operation. This step is succeeded by a translation phase that utilizes an index table created from an initial key, making the process more complex.


ABDELKADER, K.; BOUALEM, M.; KADDA, B. DNA based LSB steganography. International Journal of Security and Privacy in Pervasive Computing, v. 14, n. 1, p. 0, Jan. 2022. Available from: https://doi.org/10.4018/


ADLEMAN, L. Molecular computation of solutions to combinatorial problems. Science, v. 266, n. 5187, p. 1021-1024, 11 Nov. 1994. Available from: https://doi.org/10.1126/science.7973651.

ADMIN. What Is DNA?- Meaning, DNA Types, Structure and Functions. 7 Aug. 2018a. Available from: https://byjus.com/biology/dna-structure. Accessed: 11 Mar. 2023.

AMIN, Sherif; M. SAEB, Magdy; EL-GINDI, S. A DNA-based implementation of YAEA encryption algorithm. In: The Second Iasted International Conference on Computational Intelligence, 2006, San Francisco, California.

BENYAHIA, Kadda; MUSTAPHA, Meftah; ABDELKRIM, Latreche. A Bio-Inspired Algorithm for Symmetric Encryption. International Journal of Organizational and Collective Intelligence, v. 10, n. 1, p. 1-13, Jan. 2020. Available from: https://doi.org/10.4018/ijoci.2020010101.

BONEH, Dan; DUNWORTH, Christopher; LIPTON, R. DIMACS Series in Discrete Mathematics and Theoretical Computer Science. Providence, Rhode Island: American Mathematical Society, 1996. p. 37-65. ISBN 9780821809730. Available from: https://doi.org/10.1090/dimacs/027/04.

CHENG, Chi et al. Securing the Internet of Things in a Quantum World. IEEE Communications Magazine, v. 55, n. 2, p. 116-120, Feb. 2017. Available from: https://doi.org/10.1109/mcom.2017.1600522cm. .

CUI, Guangzhao et al. An encryption scheme using DNA technology. In: 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2008), 2008, Adelaide, Australia. IEEE, 2008. ISBN 9781424427246. Available from: https://doi.org/10.1109/bicta.2008.4656701.

DENIS, Tom St. Cryptography for developers. Rockland, MA: Syngress Publishing, Inc., 2007. 423 p. ISBN 9781597491044.

DIFFERENCE between Symmetric and Asymmetric Encryption- 2023. Available from: https://www.nwkings.com/differentiate-symmetric-and-asymmetric-encryption. Accessed: 21 Feb. 2023.

GENBANK Overview. Available from: https://www.ncbi.nlm.nih.gov/genbank. Accessed: 21 Apr. 2023.

GRAPHENE-INFO. Available from: https://www.graphene-info.com/graphene

-dna-sequencing. Accessed: 21 Apr. 2023.

HOME Page for 20 Newsgroups Data Set. Available from: http://qwone.com/~

jason/20Newsgroups. Accessed: 21 Apr. 2023.

HOSSAIN, M. Shamim et al. Toward end-to-end biomet rics-based security for IoT infrastructure. IEEE Wireless Communications, v. 23, n. 5, p. 44-51, Oct. 2016. Available from: https://doi.org/10.1109/mwc.2016.7721741.

JIE CHEN. A DNA-based, biomolecular cryptography design. In: ISCAS 2003. INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, Bangkok, Thailand. ISCAS 2003. International Symposium on Circuits and Systems. [S. l.]: IEEE. ISBN 0780377613. Available from: https://doi.org/10.1109/iscas.2003.

KALSI, Shruti; KAUR, Harleen; CHANG, Victor. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation. Journal of Medical Systems, v. 42, n. 1, 5 Dec. 2017. Available from: https://doi.org/10.


KHOBZAOUI, Abdelkader et al. DNA-Based Cryptographic Method for the Internet of Things. International Journal of Organizational and Collective Intelligence, v. 12, n. 1, p. 1-12, Jan. 2022. Available from: https://doi.org/10.4018/ijoci.2022

KUMAR, Deepak; SINGH, Shailendra. Secret data writing using DNA sequences. In: 2011 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN NETWORKS AND COMPUTER COMMUNICATIONS (ETNCC 2011), 2011, Udaipur. 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC 2011). [S. l.]: IEEE, 2011. ISBN 9781457702402. Available from: https://doi.org/10.1109/etncc.2011.6255930.

LAI, XueJia et al. Asymmetric encryption and signature method with DNA technology. Science China Information Sciences, v. 53, n. 3, p. 506-514, Mar. 2010. Available from: https://doi.org/10.1007/s11432-010-0063-3.

LIPTON, R. DNA solution of hard computational problems. Science, v. 268, n. 5210, p. 542-545, 28 Apr. 1995. Available from: https://doi.org/10.1126/

science.7725098. .

OUYANG, Q. DNA Solution of the Maximal Clique Problem. Science, v. 278, n. 5337, p. 446-449, 17 Oct. 1997. Available from: https://doi.org/10.1126/science.


PAVITHRAN, Pramod et al. A Novel Cryptosystem based on DNA Cryptography and Randomly Generated Mealy Machine. Computers & Security, p. 102160, Dec. 2020. Available from: https://doi.org/10.1016/j.cose.2020.102160.

PRAMANIK, Sabari; SETUA, Sanjit Kumar. DNA cryptography. In: 2012 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (ICECE), 2012, Dhaka, Bangladesh. 2012 7th International Conference on Electrical & Computer Engineering (ICECE). [S. l.]: IEEE, 2012. ISBN 9781467314367. Available from: https://doi.org/10.1109/icece.2012.6471609

STAPLETON, Jeffrey James. Security without obscurity: A guide to confidentiality, authentication, and integrity. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2014. 340 p. ISBN 9781466592148.

TIWARI, Harsh Durga; KIM, Jae Hyung. Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices. ETRI Journal, v. 40, n. 3, p. 396-409, June 2018. Available from: https://doi.org/10.4218/etrij.2017-0220.

TORNEA, O.; BORDA, M. E. Security and complexity of a DNA-based cipher. In: 2013 ROEDUNET INTERNATIONAL CONFERENCE, 11TH EDITION: NETWORKING IN EDUCATION AND RESEARCH, 2013, Sinaia. 2013 RoEduNet International Conference, 11th Edition: Networking in Education and Research. [S. l.]: IEEE, 2013. ISBN 9781467361163. Available from: https://doi.org/10.1109/


VERMA, A. K.; DAVE, Mayank; JOSHI, R. C. DNA cryptography: a novel paradigm for secure routing in Mobile Ad hoc Networks (MANETs). Journal of Discrete Mathematical Sciences and Cryptography, v. 11, n. 4, p. 393-404, Aug. 2008. Available from: https://doi.org/10.1080/09720529.2008.10698192.

VIEW 26 Dna To Mrna Transcription Letters. Available from: https://supra

manwallpaper.blogspot.com/2021/07/view-26-dna-to-mrna-transcription.html. Accessed: 21 Apr. 2023.




How to Cite

Benyahia, K., Khobzaoui, A., & Benbakreti, S. (2024). DNA sequences for robust encryption: a strategy for IoT security enhancement. STUDIES IN ENGINEERING AND EXACT SCIENCES, 5(1), 1296–1316. https://doi.org/10.54021/seesv5n1-067