A Software Framework for Intelligent Security Measures Regarding Sensor Data in the Context of Ambient Assisted Technology

被引:4
|
作者
Ahmed, Shakeel [1 ]
Srinivasu, Parvathaneni Naga [2 ]
Alhumam, Abdulaziz [1 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, Al Hasa 31982, Saudi Arabia
[2] Prasad V Potluri Siddhartha Inst Technol, Dept Comp Sci & Engn, Vijayawada 520007, India
关键词
ambient assistive technology; encryption; Internet of Medical Things; security framework; residual energy; energy consumption; network lifetime; PRIVACY;
D O I
10.3390/s23146564
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Ambient assisted technology (AAT), which has the potential to enhance patient care and productivity and save costs, has emerged as a strategic goal for developing e-healthcare in the future. However, since the healthcare sensor must be interconnected with other systems at different network tiers, distant enemies have additional options to attack. Data and resources integrated into the AAT are vulnerable to security risks that might compromise privacy, integrity, and availability. The gadgets and network sensor devices are layered with clinical data since they save personal information such as patients' names, addresses, and medical histories. Considering the volume of data, it is difficult to ensure its confidentiality and security. As sensing devices are deployed over a wider region, protecting the privacy of the collected data becomes more difficult. The current study proposes a lightweight security mechanism to ensure the data's confidentiality and integrity of the data in ambient-assisted technology. In the current study, the data are encrypted by the master node with adequate residual energy, and the master node is responsible for encrypting the data using the data aggregation model using a node's key generated using an exclusive basis system and a Chinese remainder theorem. The integrity of the data is evaluated using the hash function at each intermediate node. The current study defines the design model's layered architecture and layer-wise services. The model is further analyzed using various evaluation metrics, such as energy consumption, network delay, network overhead, time in generating hash, tradeoff between encryption and decryption, and entropy metrics. The model is shown to adequately perform on all measures considered in the analysis.
引用
收藏
页数:20
相关论文
共 6 条
  • [1] An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management
    Gupta, Kishu
    Saxena, Deepika
    Rani, Pooja
    Kumar, Jitendra
    Makkar, Aaisha
    Singh, Ashutosh Kumar
    Lee, Chung-Nan
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2025, 22 : 6884 - 6895
  • [2] A Blockchain-Assisted Massive IoT Data Collection Intelligent Framework
    Zhang, Lupeng
    Li, Fengqi
    Wang, Pingchuan
    Su, Rui
    Chi, Zongzheng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 14708 - 14722
  • [3] Towards Big Data Security Framework by Leveraging Fragmentation and Blockchain Technology
    Alhazmi, Hanan E.
    Eassa, Fathy E.
    Sandokji, Suhelah M.
    IEEE ACCESS, 2022, 10 : 10768 - 10782
  • [4] A Security Framework for Privacy-Preserving Data Aggregation in Wireless Sensor Networks
    Chan, Aldar C-F.
    Castelluccia, Claude
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2011, 7 (04)
  • [5] Internet of Things-based wireless sensor networks for monitoring access constraint security measures in liable data aggregation
    Gunasekaran, Amudha
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (17)
  • [6] Software Framework for authorized and unauthorized Users in an Organization & maintain high security for IT Gadgets and data (Using Encryption, Biometric, Bar Code)
    Balakrishnan, Bhargav
    2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: ICCEA 2010, PROCEEDINGS, VOL 2, 2010, : 335 - 339