A Software Framework for Intelligent Security Measures Regarding Sensor Data in the Context of Ambient Assisted Technology

被引:4
作者
Ahmed, Shakeel [1 ]
Srinivasu, Parvathaneni Naga [2 ]
Alhumam, Abdulaziz [1 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, Al Hasa 31982, Saudi Arabia
[2] Prasad V Potluri Siddhartha Inst Technol, Dept Comp Sci & Engn, Vijayawada 520007, India
关键词
ambient assistive technology; encryption; Internet of Medical Things; security framework; residual energy; energy consumption; network lifetime; PRIVACY;
D O I
10.3390/s23146564
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Ambient assisted technology (AAT), which has the potential to enhance patient care and productivity and save costs, has emerged as a strategic goal for developing e-healthcare in the future. However, since the healthcare sensor must be interconnected with other systems at different network tiers, distant enemies have additional options to attack. Data and resources integrated into the AAT are vulnerable to security risks that might compromise privacy, integrity, and availability. The gadgets and network sensor devices are layered with clinical data since they save personal information such as patients' names, addresses, and medical histories. Considering the volume of data, it is difficult to ensure its confidentiality and security. As sensing devices are deployed over a wider region, protecting the privacy of the collected data becomes more difficult. The current study proposes a lightweight security mechanism to ensure the data's confidentiality and integrity of the data in ambient-assisted technology. In the current study, the data are encrypted by the master node with adequate residual energy, and the master node is responsible for encrypting the data using the data aggregation model using a node's key generated using an exclusive basis system and a Chinese remainder theorem. The integrity of the data is evaluated using the hash function at each intermediate node. The current study defines the design model's layered architecture and layer-wise services. The model is further analyzed using various evaluation metrics, such as energy consumption, network delay, network overhead, time in generating hash, tradeoff between encryption and decryption, and entropy metrics. The model is shown to adequately perform on all measures considered in the analysis.
引用
收藏
页数:20
相关论文
共 34 条
[1]  
Al-Hamadi H, 2017, IEEE INT CONF COMM, P1282, DOI 10.1109/ICCW.2017.7962835
[2]   Interoperability of Security-Enabled Internet of Things [J].
Alam, Sarfraz ;
Chowdhury, Mohammad M. R. ;
Noll, Josef .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) :567-586
[3]   A Data Aggregation Approach Exploiting Spatial and Temporal Correlation among Sensor Data in Wireless Sensor Networks [J].
Dash, Lucy ;
Pattanayak, Binod Kumar ;
Mishra, Sambit Kumar ;
Sahoo, Kshira Sagar ;
Jhanjhi, Noor Zaman ;
Baz, Mohammed ;
Masud, Mehedi .
ELECTRONICS, 2022, 11 (07)
[4]  
Ellouze Fatma, 2020, Impact of Digital Technologies on Public Health in Developed and Developing Countries. 18th International Conference, ICOST 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12157), P259, DOI 10.1007/978-3-030-51517-1_22
[5]  
Fatima S., 2022, Eng. Proc., V20, P14
[6]   A Review of Blockchain Technology Applications in Ambient Assisted Living [J].
Florea, Alexandru-Ioan ;
Anghel, Ionut ;
Cioara, Tudor .
FUTURE INTERNET, 2022, 14 (05)
[7]   Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities [J].
Guan, Zhitao ;
Si, Guanlin ;
Zhang, Xiaosong ;
Wu, Longfei ;
Guizani, Nadra ;
Du, Xiaojiang ;
Ma, Yinglong .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (07) :82-88
[8]   Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach [J].
Gupta, Lav ;
Salman, Tara ;
Ghubaish, Ali ;
Unal, Devrim ;
Al-Ali, Abdulla Khalid ;
Jain, Raj .
APPLIED SOFT COMPUTING, 2022, 118
[9]   AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things [J].
HaddadPajouh, Hamed ;
Khayami, Raouf ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond ;
Parizi, Reza M. .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (20) :16119-16133
[10]  
Hiromoto RE, 2017, PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 1, P431, DOI 10.1109/IDAACS.2017.8095118