An Intelligent Healthcare System Using IoT in Wireless Sensor Network

被引:16
作者
Jabeen, Tallat [1 ]
Jabeen, Ishrat [1 ]
Ashraf, Humaira [2 ]
Jhanjhi, N. Z. [3 ]
Yassine, Abdulsalam [4 ]
Hossain, M. Shamim [5 ]
机构
[1] NUST, Sch Interdisciplinary Engn & Sci SINES, Islamabad 44000, Pakistan
[2] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad 44000, Pakistan
[3] SCS Taylors Univ, Sch Comp Sci, Subang Jaya 47500, Malaysia
[4] Lakehead Univ, Fac Engn, Dept Software Engn, 955 Oliver Rd, Thunder Bay, ON P7B 5E1, Canada
[5] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 11543, Saudi Arabia
关键词
genetic algorithm; cryptography; wireless sensor networks; authentication; IoT; remote patients monitoring system; intelligent healthcare;
D O I
10.3390/s23115055
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) uses wireless networks without infrastructure to install a huge number of wireless sensors that track system, physical, and environmental factors. There are a variety of WSN uses, and some well-known application factors include energy consumption and lifespan duration for routing purposes. The sensors have detecting, processing, and communication capabilities. In this paper, an intelligent healthcare system is proposed which consists of nano sensors that collect real-time health status and transfer it to the doctor's server. Time consumption and various attacks are major concerns, and some existing techniques contain stumbling blocks. Therefore, in this research, a genetic-based encryption method is advocated to protect data transmitted over a wireless channel using sensors to avoid an uncomfortable data transmission environment. An authentication procedure is also proposed for legitimate users to access the data channel. Results show that the proposed algorithm is lightweight and energy efficient, and time consumption is 90% lower with a higher security ratio.
引用
收藏
页数:14
相关论文
共 29 条
[1]   An ANN Approach for Fault Tolerant Wireless Sensor Networks [J].
Acharya, Sasmita ;
Tripathy, C. R. .
EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 :475-483
[2]   Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues [J].
Ahmad, Rami ;
Wazirali, Raniyah ;
Abu-Ain, Tarik .
SENSORS, 2022, 22 (13)
[3]  
Akyildiz I.F., 2010, Nano Commun. Netw., V1, P3, DOI DOI 10.1016/J.NANCOM.2010.04.001
[4]  
Akyildiz I. F., 2004, Ad Hoc Networks, V2, P351, DOI DOI 10.1016/J.ADH0C.2004.04.003
[5]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[6]   Security to wireless sensor networks against malicious attacks using Hamming residue method [J].
Alotaibi, Majid .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
[7]  
Basagni S., 2013, Mobile Ad Hoc Networking: The Cutting Edge Directions
[8]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[9]  
Dorothy A.B., 2019, INT J SCI TECHNOL RE, V8, P9
[10]   Connecting the physical world with pervasive networks [J].
Estrin, Deborah ;
Culler, David ;
Pister, Kris ;
Sukhatme, Gaurav .
IEEE Pervasive Computing, 2002, 1 (01) :59-69