ANAF-IoMT: A Novel Architectural Framework for IoMT-Enabled Smart Healthcare System by Enhancing Security Based on RECC-VC

被引:48
作者
Kumar, Mohit [1 ]
Kavita [2 ]
Verma, Sahil [2 ]
Kumar, Ashwani [3 ]
Ijaz, Muhammad Fazal [4 ]
Rawat, Danda B. [5 ]
机构
[1] Cambridge Inst Technol, Dept Comp Sci & Engn, Ranchi 835103, Bihar, India
[2] Chandigarh Univ, Dept Comp Sci & Engn, Mohali 140413, India
[3] Sreyas Inst Engn & Technol, Dept Artificial Intelligence & Machine Learning, Hyderabad 500068, India
[4] Sejong Univ, Seoul 05006, South Korea
[5] Howard Univ, Dept Elect Engn & Comp Sci, Washington, WA 20059 USA
关键词
Security; Internet of Things; Authentication; Privacy; Sensors; Monitoring; Electronic mail; Blockchain technology; exponential K-anonymity (EKA); Gaussian mutated chimp optimization (GMCO); improved Elman neural network (IENN); Internet of Medical Things (IoMT); rooted elliptic curve cryptography with Vigenere cipher (RECC-VC); INTERNET; THINGS;
D O I
10.1109/TII.2022.3181614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Medical Things (IoMT) is an arising trend that provides a significant amount of efficient and effective services for patients as well as healthcare professionals for the treatment of disparate diseases. The IoMT has numerous benefits; however, the security issue still persists as a challenge. The lack of security awareness among novice IoMT users and the risk of several intermediary attacks for accessing health information severely endanger the use of IoMT. In this article, rooted elliptic curve cryptography with Vigenere cipher (RECC-VC) centered security amelioration on the IoMT is proposed for enhancing security. First, this work utilizes the exponential K-anonymity algorithm for privacy preservation. Second, a new improved Elman neural network (IENN) is proposed for analyzing the sensitivity level of data. The Gaussian mutated chimp optimization is employed for weight updating in this IENN. Finally, a novel RECC-VC is proposed for securely uploading the data to the cloud server. Additionally, data are stored in the cloud server using blockchain technology. In experimental analysis, the proposed methodologies attain better results than the prevailing methods. The proposed IENN model achieves an accuracy of 96% and is validated against state-of-the-art methods. Also, the proposed RECC-VC attains 98% of the security level.
引用
收藏
页码:8936 / 8943
页数:8
相关论文
共 29 条
[1]  
Ali D., 2019, PROC INT C COMPUT IN, P1
[2]  
Amaraweera Suvini P., 2019, Security, Privacy and Trust in the IoT Environment
[3]   A lightweight IoT-based security framework for inventory automation using wireless sensor network [J].
Batra, Isha ;
Verma, Sahil ;
Kavita ;
Alazab, Mamoun .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (04)
[4]  
Chacko A., 2018, EAI Endorsed Trans Pervasive Health Technol, V4, DOI DOI 10.4108/EAI.13-7-2018.155079
[5]  
Deebak B. D., 2017, IEEE ACCESS, V7
[6]  
Dua D., 2019, UCIMACHINE LEARNING
[7]   Data provenance and trust establishment in the Internet of Things [J].
Elkhodr, Mahmoud ;
Alsinglawi, Belal .
SECURITY AND PRIVACY, 2020, 3 (03)
[8]  
Elkhodr M, 2019, EAI SPRINGER INNOVAT, P47, DOI 10.1007/978-3-319-96139-2_5
[9]  
Elngar Ahmed A., 2019, International Journal of Information and Computer Security, V11, P431
[10]   A Resource-Efficient Hybrid Proxy Mobile IPv6 Extension for Next-Generation IoT Networks [J].
Hussain, Anwar ;
Nazir, Shah ;
Khan, Fazlullah ;
Nkenyereye, Lewis ;
Ullah, Ayaz ;
Khan, Sulaiman ;
Verma, Sahil ;
Kavita .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (03) :2095-2103