A Software Framework for Intelligent Security Measures Regarding Sensor Data in the Context of Ambient Assisted Technology

被引:4
作者
Ahmed, Shakeel [1 ]
Srinivasu, Parvathaneni Naga [2 ]
Alhumam, Abdulaziz [1 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, Al Hasa 31982, Saudi Arabia
[2] Prasad V Potluri Siddhartha Inst Technol, Dept Comp Sci & Engn, Vijayawada 520007, India
关键词
ambient assistive technology; encryption; Internet of Medical Things; security framework; residual energy; energy consumption; network lifetime; PRIVACY;
D O I
10.3390/s23146564
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Ambient assisted technology (AAT), which has the potential to enhance patient care and productivity and save costs, has emerged as a strategic goal for developing e-healthcare in the future. However, since the healthcare sensor must be interconnected with other systems at different network tiers, distant enemies have additional options to attack. Data and resources integrated into the AAT are vulnerable to security risks that might compromise privacy, integrity, and availability. The gadgets and network sensor devices are layered with clinical data since they save personal information such as patients' names, addresses, and medical histories. Considering the volume of data, it is difficult to ensure its confidentiality and security. As sensing devices are deployed over a wider region, protecting the privacy of the collected data becomes more difficult. The current study proposes a lightweight security mechanism to ensure the data's confidentiality and integrity of the data in ambient-assisted technology. In the current study, the data are encrypted by the master node with adequate residual energy, and the master node is responsible for encrypting the data using the data aggregation model using a node's key generated using an exclusive basis system and a Chinese remainder theorem. The integrity of the data is evaluated using the hash function at each intermediate node. The current study defines the design model's layered architecture and layer-wise services. The model is further analyzed using various evaluation metrics, such as energy consumption, network delay, network overhead, time in generating hash, tradeoff between encryption and decryption, and entropy metrics. The model is shown to adequately perform on all measures considered in the analysis.
引用
收藏
页数:20
相关论文
共 34 条
[31]   A Delayed Epidemic Model for Propagation of Malicious Codes in Wireless Sensor Network [J].
Zhang, Zizhen ;
Kundu, Soumen ;
Wei, Ruibin .
MATHEMATICS, 2019, 7 (05)
[32]   An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem [J].
Zhao, Zhenguo .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (02)
[33]   Wireless Sensor Network Security Based on Improved Identity Encryption [J].
Zhou, Hao ;
Bi, Haochang .
SCIENTIFIC PROGRAMMING, 2022, 2022
[34]   Multi-access edge computing enabled internet of things: advances and novel applications [J].
Zhu, Rongbo ;
Liu, Lu ;
Song, Houbing ;
Ma, Maode .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (19) :15313-15316