A novel security framework for healthcare data through IOT sensors
In recent times, the Internet of things (IoT) has emerged as a popular and effective way to store encryption keys as technology is experiencing rapid growth. Essential elements in IoT include:
- Detection equipment,
- Connection,
- Data management,
- Interaction with users
Initially, various sensors were used for gathering information like sugar levels, pulse rates, etc. The medical industry has adapted to cloud technology and has been employing it to use it to make health care more affordable & effective due to the growing benefits of digital transfer through IoT. But the concerning issue was that the security for protecting medical data was not provided.
Keywords: IoT sensors, digital transfer, healthcare sector, encrypted, specific key, recipient's side, ASCII/binary
Researchers have developed a new security framework for protecting data in the healthcare sector using IoT sensors.
IoT sensors installed in warm homes or treatment center rooms tend to provide additional and valuable information relevant to the environment where the monitored person is located. For example, the temperatures, the amount of humidity, the illumination, and certain patients' perspiration can all be recorded by modern smart beds, allowing the hospital personnel to do more accurate analyses and provide a more appropriate cure.
IoT medical equipment must be under the supervision of the FDA. IoT firms have issued several guidelines to consumers:
1. Follow appropriate security measures while going to add IoT devices to their channels
2. Start changing all fallback passwords and personal titles
3. Make sure that passwords have been formed using the proposed mixture of figures, character types, signifiers, & duration
4. Before buying a gadget, check to see if the ScienceDirect's AI-generated Topic Pages" class="topic-link" style="margin: 0px; padding: 0px; color: rgb(46, 46, 46); word-break: break-word; text-underline-offset: 1px; font-family: NexusSerif, Georgia, "Times New Roman", Times, STIXGeneral, "Cambria Math", "Lucida Sans Unicode", "Microsoft Sans Serif", "Segoe UI Symbol", "Arial Unicode MS", serif; font-size: 18px;">automaker would then have various levels for the gadget.
This work encrypted the information with a specific key on the recipient's side. Initially, data was collected using a sensitive element related to a person's blood. Generally, the information is transferred through the cloud infrastructure. But it is highly prone to hackers. Thus, it became necessary to develop an encrypted solution.
The information was acquired from the matrix-sized sensors and combined with a patient-specific code. Then, based on the option, the multiplied information was translated into ASCII/ binary. It was repeated a second time with a key that appeared to be in ASCII/binary. The output of this provided the encoded text.
To determine the efficiency of the proposed system, the researchers checked the encryption and decryption algorithm. Researchers evaluated it based on various needs in terms of:
- Calculation
- Storage
- Information processing
- Key size
- Vulnerability to various vulnerabilities
- Communication overhead
- Thermal efficiency
- Scalability to various kinds of IoT
- Prices
The advantages of this system are:
- It consumes less energy.
- It is time friendly.
- It consumes less memory than modern security techniques.
This approach focuses on addressing fundamental security issues for the elimination of any risk of third-party exploitation of information. The information was likewise guarded until it arrives at its destination also including a doctor's clinic or health databases. It could only be decrypted if the recipient ends were informed of the key that has been used to encrypt it originally, presuming the cloud has been protected with a current security system.
This system has surely given a new side to use IoT in various applications.
Story Source:
Materials provided by Measurement: Sensors. The original text of this story is licensed under a Creative Commons License. Note: Content may be edited for style and length.
Journal Reference:
- [1]
- M.R. Bataineh, W. Mardini, Y.M. Khamayseh, M.M.B. YasseinNovel and secure blockchain framework for health applications in IoTIEEE Access, 10 (2022), pp. 14914-14926
- [2]
- S.M. Karunarathne, N. Saxena, M.K. KhanSecurity and privacy in IoT smart healthcareIEEE Internet Comput., 25 (4) (2021), pp. 37-48
- [3]
- A. Karakaya, S. AkleylekA novel IoT-based health and tactical analysis model with fog computingPeerJ Comput. Sci., 7 (2021), p. e342
- [4]
- M.S. Minu, R. Aroul Canessane, S.S. Subashka RameshOptimal squeeze net with deep neural network-based arial image classification model in unmanned aerial vehiclesTrait. Du. Signal, 39 (1) (2022), pp. 275-281
- [5]
- A. Ali, M.A. Almaiah, F. Hajjej, M.F. Pasha, O.H. Fang, R. Khan, ..., M. ZakaryaAn industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural networkSensors, 22 (2) (2022), p. 572
- [6]
- F.A. Almalki, B.O. SoufieneEPPDA: an efficient and privacy-preserving data aggregation scheme with authentication and authorization for IoT-based healthcare applicationsWireless Commun. Mobile Comput., 2021 (5594159) (2021)2021
- [7]
- B. Karnan, A. KuppusamyGraph theory and matrix approach for machinability enhancement of cryogenic treated cobalt bonded tungsten carbide insertsJ. Homepage, 39 (4) (2021), pp. 1372-1382
- [8]
- M. Vedaraj, P. EzhumalaiHERDE-MSNB: a predictive security architecture for IoT health cloud systemJ. Ambient Intell. Hum. Comput., 12 (7) (2021), pp. 7333-7342
- [9]
- M.A. Almaiah, F. Hajjej, A. Ali, M.F. Pasha, O. AlmomaniA novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPSSensors, 22 (4) (2022), p. 1448
- [10]
- S.S. Kumar, M.S. KotiA hybrid security framework using the internet of things for the healthcare systemNetw. Model. Anal. Health Inform. Bioinform., 10 (1) (2021), pp. 1-10
- [11]
- H. Nankani, S. Gupta, S. Singh, S.S. Subashka RameshDetection analysis of various types of cancer by logistic regression using machine learningInt. J. Eng. Adv. Technol., 9 (1) (2019), pp. 99-104
- [12]
- Control techniques, MPPT methods, and control strategies for standalone battery integrated system. In AIP Conf. Proc. (Vol. 2405, No. 1, p. 040013). AIP Publishing LLC.
- [13]
- V.K.S. Maddala, K. Jayarajan, M. Braveen, R. Walia, P. Krishna, S. Ponnusamy, K. KaliyaperumalMultisensor data and cross-validation technique for merging temporal images for the agricultural performance monitoring systemJ. Food Qual., 2022 (9575423) (2022)2022
- [14]
- G.N.R. Devi, S. Ponnusamy, J. Pandit, B. BuvaneswariDevelopment of medicinal industries in building A replica to the damaged human tissue for artificial organs with the application of micro-and nano technology (Mnt)J. Optoelectron. - Laser, 41 (3) (2022), pp. 79-83
- [15]
- T.P. Latchoumi, R. Swathi, P. Vidyasri, K. BalamuruganDevelop New Algorithm to Improve Safety on WMSN in Health Disease Monitoring2022 International Mobile and Embedded Technology Conference (MECON), IEEE (2022, March), pp. 357-362, 10.1109/MECON53876.2022.9752178
- [16]
- A. Kore, S. PatilCross-layered cryptography-based secure routing for IoT-enabled smart healthcare systemsWireless Network, 28 (1) (2022), pp. 287-301
- [17]
- A. Hussain, T. Ali, F. Althobiani, U. Draz, M. Irfan, S. Yasin, ..., S. AlqhtaniSecurity framework for IoT-based real-time health applicationsElectronics, 10 (6) (2021), p. 719
- [18]
- I. Ullah, H.Y. Youn, Y.H. HanIntegration of type-2 fuzzy logic and Dempster–Shafer Theory for accurate inference of IoT-based healthcare systemFuture Generat. Comput. Syst., 124 (2021), pp. 369-380
- [19]
- J. Al-Muhtadi, K. Saleem, S. Al-Rabiaah, M. Imran, A. Gawanmeh, J.J. RodriguesA lightweight cyber security framework with context-awareness for pervasive computing environmentsSustain. Cities Soc., 66 (2021), Article 102610
- [20]
- P.D. Singh, G. Dhiman, R. SharmaInternet of things for sustaining a smart and secure healthcare systemSustain. Comput.: Inform. Syst., 33 (2022), Article 100622
- [21]
- A. Mohiyuddin, A.R. Javed, C. Chakraborty, M. Rizwan, M. Shabbir, J. NebhenSecure cloud storage for medical IoT data using an adaptive neuro-fuzzy inference systemInt. J. Fuzzy Syst., 24 (2) (2022), pp. 1203-1215
- [22]
- P. Deeraj, G. Rohit, K.S. Abhishek, S.S. SubashkaA trash barrel suitable for both indoor and outdoor uses (A better way to clean your garbage)Int. J. Adv. Sci. Technol., 29 (5) (2020), pp. 3103-3110
- [23]
- R. Dave, N. Seliya, N. SiddiquiThe Benefits of Edge Computing in Healthcare, Smart Cities, and IoT(2021)arXiv preprint arXiv:2112.01250
- [24]
- J.D. Lee, H.S. Cha, S. Rathore, J.H. ParkM-IDM: a multi-classification-based intrusion detection model in healthcare IoTComput. Mater. Continua (CMC), 67 (2) (2021), pp. 1537-1553
- [25]
- A. Ullah, M. Azeem, H. Ashraf, A.A. Alaboudi, M. Humayun, N.Z. JhanjhiSecure healthcare data aggregation and transmission in IoT—a surveyIEEE Access, 9 (2021), pp. 16849-16865
0 Comments