A secure data transmission framework for IoT enabled healthcare

被引:3
作者
Saif, Sohail [1 ]
Das, Priya [2 ]
Biswas, Suparna [3 ]
Khan, Shakir [4 ,5 ]
Haq, Mohd Anul [6 ]
Kovtun, Viacheslav [7 ]
机构
[1] Maulana Abul Kalam Azad Univ Technol, Dept Comp Applicat, Haringhata 741249, India
[2] Chakdaha Coll, Dept Comp Sci, Chakdaha 741222, India
[3] Maulana Abul Kalam Azad Univ Technol, Dept Comp Sci & Engn, Haringhata 741249, India
[4] Imam Mohammad Ibn Saud Islamic Univ IMSIU, Coll Comp & Informat Sci, Riyadh 11432, Saudi Arabia
[5] Chandigarh Univ, Univ Ctr Res & Dev, Mohali 140413, India
[6] Majmaah Univ, Coll Comp & Informat Sci, Dept Comp Sci, Al Majmaah 11952, Saudi Arabia
[7] Vinnytsia Natl Tech Univ, Comp Control Syst Dept, Vinnytsia, Ukraine
关键词
IoT; Encryption; Security; Healthcare; IoMT; KEY GENERATION;
D O I
10.1016/j.heliyon.2024.e36269
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The Internet of Medical Things (IoMT) has transformed healthcare by connecting medical devices, sensors, and patients, significantly improving patient care. However, the sensitive data exchanged through IoMT is vulnerable to security attacks, raising serious privacy concerns. Traditional key sharing mechanisms are susceptible to compromise, posing risks to data integrity. This paper proposes a Timestamp-based Secret Key Generation (T-SKG) scheme for resource-constrained devices, generating a secret key at the patient's device and regenerating it at the doctor's device, thus eliminating direct key sharing and minimizing key compromise risks. Simulation results using MATLAB and Java demonstrate the T-SKG scheme's resilience against guessing, birthday, and brute force attacks. Specifically, there is only a 9 % chance of key compromise in a guessing attack if the attacker knows the key sequence pattern, while the scheme remains secure against brute force and birthday attacks within a specified timeframe. The T-SKG scheme is integrated into a healthcare framework to securely transmit health vitals collected using the MySignals sensor kit. For confidentiality, the Data Encryption Standard (DES) with various Cipher Block modes (ECB, CBC, CTR) is employed.
引用
收藏
页数:14
相关论文
共 61 条
[1]   An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems [J].
Adil, Muhammad ;
Khan, Muhammad Khurram ;
Jadoon, Muhammad Mohsin ;
Attique, Muhammad ;
Song, Houbing ;
Farouk, Ahmed .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05) :2719-2730
[2]   Federated Fusion of Magnified Histopathological Images for Breast Tumor Classification in the Internet of Medical Things [J].
Agbley, Bless Lord Y. ;
Li, Jian Ping ;
Haq, Amin Ul ;
Bankas, Edem Kwedzo ;
Mawuli, Cobbinah Bernard ;
Ahmad, Sultan ;
Khan, Shakir ;
Khan, Ahmad Raza .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2024, 28 (06) :3389-3400
[3]   Deep Learning Enabled Disease Diagnosis for Secure Internet of Medical Things [J].
Ahmad, Sultan ;
Khan, Shakir ;
AlAjmi, Mohamed Fahad ;
Dutta, Ashit Kumar ;
Dang, L. Minh ;
Joshi, Gyanendra Prasad ;
Moon, Hyeonjoon .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01) :965-979
[4]   IoMT-fog-cloud based architecture for Covid-19 detection [J].
Akram, Khelili Mohamed ;
Sihem, Slatnia ;
Okba, Kazar ;
Harous, Saad .
BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2022, 76
[5]   A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Usinga Fog Computing Facility With Pairing-Based Cryptography [J].
Al Hamid, Hadeal Abdulaziz ;
Rahman, Sk Md Mizanur ;
Hossain, M. Shamim ;
Almogren, Ahmad ;
Alamri, Atif .
IEEE ACCESS, 2017, 5 :22313-22328
[6]   IoMT-SAF: Internet of Medical Things Security Assessment Framework [J].
Alsubaei, Faisal ;
Abuhussein, Abdullah ;
Shandilya, Vivek ;
Shiva, Sajjan .
INTERNET OF THINGS, 2019, 8
[7]  
Bhadra Prasenjit, 2023, Confluence of Artificial Intelligence and Robotic Process Automation. Smart Innovation, Systems and Technologies (335), P355, DOI 10.1007/978-981-19-8296-5_15
[8]  
Bindiya A. J., 2023, 2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), P685, DOI 10.1109/IITCEE57236.2023.10090996
[9]   Security and privacy of UAV data using blockchain technology [J].
Ch, Rupa ;
Srivastava, Gautam ;
Gadekallu, Thippa Reddy ;
Maddikunta, Praveen Kumar Reddy ;
Bhattacharya, Sweta .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55 (55)
[10]  
Chavan G T, 2023, 2023 3 INT C SMART G, P1