Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare

被引:108
作者
Tao, Hai [1 ]
Bhuiyan, Md Zakirul Alam [2 ,3 ]
Abdalla, Ahmed N. [4 ]
Hassan, Mohammad Mehedi [5 ]
Zain, Jasni Mohamad [6 ]
Hayajneh, Thaier [2 ]
机构
[1] Baoji Univ Art & Sci, Sch Comp Sci, Baoji 721007, Shaanxi, Peoples R China
[2] Fordham Univ, Dept Comp & Informat Sci, New York, NY 10458 USA
[3] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
[4] Huaiyin Inst Technol, Fac Elect & Informat Engn, Huaian 223002, Peoples R China
[5] King Saud Univ, Coll Comp & Informat Sci, Chair Pervas & Mobile Comp, Riyadh 11543, Saudi Arabia
[6] Univ Teknol MARA, Fac Comp & Math Sci, Shah Alam 40450, Malaysia
关键词
Data collection; hardware-based security; healthcare; Internet of Things (IoT); privacy; secret cipher; threats; LIGHTWEIGHT BLOCK CIPHERS; NETWORKS; DESIGN;
D O I
10.1109/JIOT.2018.2854714
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are tremendous security concerns with patient health monitoring sensors in Internet of Things (IoT). The concerns are also realized by recent sophisticated security and privacy attacks, including data breaching, data integrity, and data collusion. Conventional solutions often offer security to patients' health monitoring data during the communication. However, they often fail to deal with complicated attacks at the time of data conversion into cipher and after the cipher transmission. In this paper, we first study privacy and security concerns with healthcare data acquisition and then transmission. Then, we propose a secure data collection scheme for IoT-based healthcare system named SecureData with the aim to tackle security concerns similar to the above. SecureData scheme is composed of four layers: 1) IoT network sensors/devices; 2) Fog layers; 3) cloud computing layer; and 4) healthcare provider layer. We mainly contribute to the first three layers. For the first two layers, SecureData includes two techniques: 1) light-weight field programmable gate array (FPGA) hardware-based cipher algorithm and 2) secret cipher share algorithm. We study KATAN algorithm and we implement and optimize it on the FPGA hardware platform, while we use the idea of secret cipher sharing technique to protect patients' data privacy. At the cloud computing layer, we apply a distributed database technique that includes a number of cloud data servers to guarantee patients' personal data privacy at the cloud computing layer. The performance of SecureData is validated through simulations with FPGA in terms of hardware frequency rate, energy cost, and computation time of all the algorithms and the results show that SecureData can be efficient when applying for protecting security risks in IoT-based healthcare.
引用
收藏
页码:410 / 420
页数:11
相关论文
共 32 条
[1]   Trends and Challenges of the Emerging Technologies toward Interoperability and Standardization in e-Health Communications [J].
Araguees, Antonio ;
Escayola, Javier ;
Martinez, Ignacio ;
del Valle, Pilar ;
Munoz, Pilar ;
Trigo, Jesus D. ;
Garcia, Jose .
IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (11) :182-188
[2]   Dependable Structural Health Monitoring Using Wireless Sensor Networks [J].
Bhuiyan, Md Zakirul Alam ;
Wang, Guojun ;
Wu, Jie ;
Cao, Jiannong ;
Liu, Xuefeng ;
Wang, Tian .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) :363-376
[3]   Collusion Attack Detection in Networked Systems [J].
Bhuiyan, Md Zakirul Alam ;
Wu, Jie .
2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, :286-293
[4]   Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring [J].
Bhuiyan, Md Zakirul Alam ;
Wang, Guojun ;
Cao, Jiannong ;
Wu, Jie .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) :382-395
[5]  
Cai N., 2002, P IEEE INT S INF THE, P1
[6]  
De Cannière C, 2009, LECT NOTES COMPUT SC, V5747, P272
[7]   Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference [J].
Fan, Lisheng ;
Lei, Xianfu ;
Yang, Nan ;
Duong, Trung Q. ;
Karagiannidis, George K. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1494-1505
[8]  
Fan X., 2013, International conference on heterogeneous networking for quality, reliability, security and robustness, P617, DOI DOI 10.1007/978-3-642-37949-9_54
[9]   Secure Multiplex Coding With Dependent and Non-Uniform Multiple Messages [J].
Hayashi, Masahito ;
Matsumoto, Ryutaroh .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) :2355-2409
[10]   HIGHT: A new block cipher suitable for low-resource device [J].
Hong, Deukjo ;
Sung, Jaechul ;
Hong, Seokhie ;
Lim, Jongin ;
Lee, Sangjin ;
Koo, Bon-Seok ;
Lee, Changhoon ;
Chang, Donghoon ;
Lee, Jesang ;
Jeong, Kitae ;
Kim, Hyun ;
Kim, Jongsung ;
Chee, Seongtaek .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 :46-59