A novel security framework for healthcare data through IOT sensors


A novel security framework for healthcare data through IOT sensors

In recent times, the Internet of things (IoT) has emerged as a popular and effective way to store encryption keys as technology is experiencing rapid growth. Essential elements in IoT include:

  • Detection equipment,
  • Connection,
  • Data management,
  • Interaction with users

Initially, various sensors were used for gathering information like sugar levels, pulse rates, etc. The medical industry has adapted to cloud technology and has been employing it to use it to make health care more affordable & effective due to the growing benefits of digital transfer through IoT. But the concerning issue was that the security for protecting medical data was not provided. 

Keywords: IoT sensors, digital transfer, healthcare sector, encrypted, specific key, recipient's side, ASCII/binary


Researchers have developed a new security framework for protecting data in the healthcare sector using IoT sensors. 


                                     


IoT sensors installed in warm homes or treatment center rooms tend to provide additional and valuable information relevant to the environment where the monitored person is located. For example, the temperatures, the amount of humidity, the illumination, and certain patients' perspiration can all be recorded by modern smart beds, allowing the hospital personnel to do more accurate analyses and provide a more appropriate cure.

IoT medical equipment must be under the supervision of the FDA. IoT firms have issued several guidelines to consumers:

1. Follow appropriate security measures while going to add IoT devices to their channels

2.  Start changing all fallback passwords and personal titles

3. Make sure that passwords have been formed using the proposed mixture of figures, character types, signifiers, & duration

4. Before buying a gadget, check to see if the ScienceDirect's AI-generated Topic Pages" class="topic-link" style="margin: 0px; padding: 0px; color: rgb(46, 46, 46); word-break: break-word; text-underline-offset: 1px; font-family: NexusSerif, Georgia, "Times New Roman", Times, STIXGeneral, "Cambria Math", "Lucida Sans Unicode", "Microsoft Sans Serif", "Segoe UI Symbol", "Arial Unicode MS", serif; font-size: 18px;">automaker would then have various levels for the gadget. 

This work encrypted the information with a specific key on the recipient's side. Initially, data was collected using a sensitive element related to a person's blood. Generally, the information is transferred through the cloud infrastructure. But it is highly prone to hackers. Thus, it became necessary to develop an encrypted solution. 

The information was acquired from the matrix-sized sensors and combined with a patient-specific code. Then, based on the option, the multiplied information was translated into ASCII/ binary. It was repeated a second time with a key that appeared to be in ASCII/binary. The output of this provided the encoded text.

To determine the efficiency of the proposed system, the researchers checked the encryption and decryption algorithm. Researchers evaluated it based on various needs in terms of:

  • Calculation
  • Storage
  • Information processing
  • Key size
  • Vulnerability to various vulnerabilities
  • Communication overhead
  • Thermal efficiency
  • Scalability to various kinds of IoT 
  • Prices

The advantages of this system are:

  1. It consumes less energy.
  2. It is time friendly.
  3. It consumes less memory than modern security techniques.

This approach focuses on addressing fundamental security issues for the elimination of any risk of third-party exploitation of information. The information was likewise guarded until it arrives at its destination also including a doctor's clinic or health databases. It could only be decrypted if the recipient ends were informed of the key that has been used to encrypt it originally, presuming the cloud has been protected with a current security system.

This system has surely given a new side to use IoT in various applications.


Story Source:
Materials provided by Measurement: Sensors. The original text of this story is licensed under a Creative Commons License. Note: Content may be edited for style and length.


Journal Reference: