Secure medical sensor monitoring framework using novel optimal encryption algorithm driven by Internet of Things

被引:0
|
作者
Lekha J. [1 ]
Sandhya K. [2 ]
Archana U. [3 ]
Anilkumar C. [4 ]
Soman S.J. [5 ]
Satheesh S. [6 ]
机构
[1] Department of Data Science Christ (Deemed to be University), Pune Lavasa Campus, Pune
[2] Department of CSE, Mohan Babu University (Erstwhile Sree Vidyanikethan Engineering College), AP, Tirupati
[3] Department of Information Technology, GMR Institute of Technology, Rajam, Andhra Pradesh, Vizianagaram
[4] Department of Information Technology, GMR Institute of Technology, Andhra Pradesh
[5] Department of Computer Science and Engineering, SNG College of Engineering, Kadayiruppu, kolenchery, Kerala
[6] Department of Computer Science and Engineering, Arjun College of Technology, Tamilnadu
来源
Measurement: Sensors | 2023年 / 30卷
关键词
Attacks; Encryption and authentication scheme; Internet of Things; Security;
D O I
10.1016/j.measen.2023.100929
中图分类号
学科分类号
摘要
Recently, healthcare monitoring systems have emerged as significant tolls for constant monitoring of patient's physiological characteristics. These systems use implanted sensors. IoT (Internet of Things) have revolutionized healthcare systems where health care equipment's are equipped with many sensors that actively collect data from patients and pass it on to cloud based storages using gateway sensors. Securing data have been significant barriers in many applications as false information get injected, or important information are modified or stolen at different phases of health care systems dependent on IoT. The attacks can also result in fatalities making it imperative to secure IoT based health care systems. A Hybrid technique combining MOAES (Modified Optimal Advanced Encryption Standard) with CM (Chaotic Map) Encryptions called HMOAES-CM technique is proposed. This technique can be helpful in securely accessing the patient data over online mode, and in addition, the data sharing can be performed in an encrypted form for the necessary targets of stakeholders. The proposed authentication approach is aimed at IoT, which is resilient to all kinds of network attacks and its implementation is also simpler. Comparing the suggested work to similar works, the level of evaluation is much improved. © 2023 The Authors
引用
收藏
相关论文
共 50 条
  • [21] Quantum Secure Authentication Scheme for Internet of Medical Things Using Blockchain
    Prajapat, Sunil
    Kumar, Pankaj
    Kumar, Dheeraj
    Das, Ashok Kumar
    Hossain, M. Shamim
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23): : 38496 - 38507
  • [22] Medicine reminder and monitoring system for secure health using Internet of things
    Prafulla, Fadanvis
    Manisha, Dehankar
    Shubhada, Guru
    Patil, Sachin
    Bankar, Nandkishor
    ANNALS OF MEDICAL AND HEALTH SCIENCES RESEARCH, 2021, 11 : 174 - 177
  • [23] On the design of an AI-driven secure communication scheme for internet of medical things environment
    Garg, Neha
    Petwal, Rajat
    Wazid, Mohammad
    Singh, D. P.
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (05) : 1080 - 1089
  • [24] A secure authentication protocol for remote patient monitoring in an internet-of-medical-things environment
    Mookherji, Srijanee
    Vanga, Odelu
    Prasath, Rajendra
    Das, Ashok Kumar
    SECURITY AND PRIVACY, 2024, 7 (06):
  • [25] Sensor node easy moving monitoring region location algorithm in internet of things
    Feng, Donghua
    Li, Yahong
    Telkomnika (Telecommunication Computing Electronics and Control), 2015, 13 (02) : 703 - 710
  • [26] A Novel Secure and Energy-efficient Routing Method for the Agricultural Internet of Things Using Whale Optimization Algorithm
    Wang Y.
    Yang Y.
    Journal of Cyber Security and Mobility, 2024, 13 (04): : 725 - 750
  • [27] Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning
    Safeer, Ehtesham
    Tahir, Sidra
    Nawaz, Asif
    Humayun, Mamoona
    Shaheen, Momina
    Khan, Maqbool
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [28] QoS-aware secure transaction framework for internet of things using blockchain mechanism
    Roy, Deepsubhra Guha
    Das, Puj A.
    De, Debashis
    Buyya, Rajkumar
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 144 : 59 - 78
  • [29] Blockchain enabled optimal Hopfield Chaotic Neural network based secure encryption technique for industrial internet of things environment
    Khayyat, Manal M.
    Khayyat, Mashael M.
    Abdel-Khalek, S.
    Mansour, Romany F.
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) : 11377 - 11389
  • [30] Secure Internet of Things network using light-weighted trust and blockchain-powered PoW framework
    Vairagade, Rupali Sachin
    Hanumantha, Brahmananda Savadatti
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (21)