Secure medical sensor monitoring framework using novel optimal encryption algorithm driven by Internet of Things

被引:0
|
作者
Lekha J. [1 ]
Sandhya K. [2 ]
Archana U. [3 ]
Anilkumar C. [4 ]
Soman S.J. [5 ]
Satheesh S. [6 ]
机构
[1] Department of Data Science Christ (Deemed to be University), Pune Lavasa Campus, Pune
[2] Department of CSE, Mohan Babu University (Erstwhile Sree Vidyanikethan Engineering College), AP, Tirupati
[3] Department of Information Technology, GMR Institute of Technology, Rajam, Andhra Pradesh, Vizianagaram
[4] Department of Information Technology, GMR Institute of Technology, Andhra Pradesh
[5] Department of Computer Science and Engineering, SNG College of Engineering, Kadayiruppu, kolenchery, Kerala
[6] Department of Computer Science and Engineering, Arjun College of Technology, Tamilnadu
来源
Measurement: Sensors | 2023年 / 30卷
关键词
Attacks; Encryption and authentication scheme; Internet of Things; Security;
D O I
10.1016/j.measen.2023.100929
中图分类号
学科分类号
摘要
Recently, healthcare monitoring systems have emerged as significant tolls for constant monitoring of patient's physiological characteristics. These systems use implanted sensors. IoT (Internet of Things) have revolutionized healthcare systems where health care equipment's are equipped with many sensors that actively collect data from patients and pass it on to cloud based storages using gateway sensors. Securing data have been significant barriers in many applications as false information get injected, or important information are modified or stolen at different phases of health care systems dependent on IoT. The attacks can also result in fatalities making it imperative to secure IoT based health care systems. A Hybrid technique combining MOAES (Modified Optimal Advanced Encryption Standard) with CM (Chaotic Map) Encryptions called HMOAES-CM technique is proposed. This technique can be helpful in securely accessing the patient data over online mode, and in addition, the data sharing can be performed in an encrypted form for the necessary targets of stakeholders. The proposed authentication approach is aimed at IoT, which is resilient to all kinds of network attacks and its implementation is also simpler. Comparing the suggested work to similar works, the level of evaluation is much improved. © 2023 The Authors
引用
收藏
相关论文
共 50 条
  • [31] Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring
    Mimoza Durresi
    Anisa Subashi
    Arjan Durresi
    Leonard Barolli
    Kazunori Uchida
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 1631 - 1640
  • [32] Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring
    Durresi, Mimoza
    Subashi, Anisa
    Durresi, Arjan
    Barolli, Leonard
    Uchida, Kazunori
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (04) : 1631 - 1640
  • [33] A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0
    Natarajan, Rajesh
    Lokesh, Gururaj Harinahallo
    Flammini, Francesco
    Premkumar, Anitha
    Venkatesan, Vinoth Kumar
    Gupta, Shashi Kant
    INFRASTRUCTURES, 2023, 8 (02)
  • [34] A Novel Internet of Things Framework Integrated with Real Time Monitoring for Intelligent Healthcare Environment
    A. Suresh
    R. Udendhran
    M. Balamurgan
    R. Varatharajan
    Journal of Medical Systems, 2019, 43
  • [35] A Novel Internet of Things Framework Integrated with Real Time Monitoring for Intelligent Healthcare Environment
    Suresh, A.
    Udendhran, R.
    Balamurgan, M.
    Varatharajan, R.
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (06)
  • [36] Secure Internet of Things based hybrid optimization techniques for optimal centroid routing protocol in wireless sensor network
    Wasay Mudasser, Abdul
    Ahmed Abdul Gafoor, Shah Aqueel
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (06) : 1
  • [37] Industrial Greenhouse Electrical Power Monitoring Using Secure Internet-of-Things(IoT) Platform
    Apse-Apsitis, Peteris
    Avotins, Ansis
    Porins, Ricards
    2018 IEEE 6TH WORKSHOP ON ADVANCES IN INFORMATION, ELECTRONIC AND ELECTRICAL ENGINEERING (AIEEE), 2018,
  • [38] A novel methodology for the development of an optimal agricultural crop field using Internet of Things
    Manikandan, Ramasamy
    Prasanna, Santhanam
    Ashwin, Muniyappan
    Sathish Kumar, Lakshmanan
    Pandiyan, Sanjeevi
    COMPUTATIONAL INTELLIGENCE, 2024, 40 (01)
  • [39] Next-Gen fortified health monitoring for cyber physical systems in internet of things using logistic maps based encryption
    Sarkar, Ankita
    Jhamb, Mansi
    ENGINEERING RESEARCH EXPRESS, 2025, 7 (01):
  • [40] A Novel Effective Framework for Medical Images Secure Storage Using Advanced Cipher Text Algorithm in Cloud Computing
    Praveen, S. Phani
    Sindhura, S.
    Madhuri, A.
    Karras, Dimitrios A.
    2021 IEEE INTERNATIONAL CONFERENCE ON IMAGING SYSTEMS AND TECHNIQUES (IST), 2021,