Data security for WBAN in e-health IoT applications

Author(s):  
K.V. Arya ◽  
Rajasi Gore

Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 433
Author(s):  
M. Tanooj Kumar ◽  
T. Praveena ◽  
T. Lakshman ◽  
M. Sai Krishna

This paper proposes a new compressive sensing based method for data collection and recovery related to IoT based systems. It performs data capturing, its compression and encryption at the same time, transmission, storage and its recovery. The measurement matrix, used in compressive sensing, is generated based on the user private key and is utilized for encrypting the captured data. Basis Pursuit is used for reconstruction of the data. The results shows that it is very suitable for the IoT based applications by considering data security, transmission cost and storage cost.  


2022 ◽  
Vol 11 (1) ◽  
pp. e0411124270
Author(s):  
Creciana Maria Endres ◽  
Crivian Pelisser ◽  
Doglas André Finco ◽  
Maristela Schleicher Silveira ◽  
Valério Junior Piana

The Industry 4.0 technologies are in ascension in the worldwide market, in Brazil still needs to be explored. It was made a Systematic Review to measure the application of IoT in the food industry. Some platforms were used to select works, applying the string “IoT AND Raspberry Pi AND Cheese”. It was possible to evidence the majority of IoT applications in the food industry, focus on the control of temperature, humidity, color, traceability of productive chain, and enlargement of sustainability in the food industry. The most difficulties faced in the conventional application of IoT are related to the high cost of proprietary arquitectures, qualified manpower and obstacles of data security implementation. There are alternatives that aim to reduce the costs of implementation, like the utilization of Raspberry Pi. The food industry presents potential application of technologies that aim for the quality of products, being an excellent opportunity.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 887 ◽  
Author(s):  
M Sri Lakshmi ◽  
V Srikanth

IOT - things like the smart devices and sensors that connects and communicates through Internet. IOT applications like smart home, smart vehicles, smart retail, which makes the mankind’s life easier.  There is a prediction that we will be having million of devices connects to the Internet. Since the sensitive devices like baby monitoring devices,  health monitoring devices are the part of interconnected world there is the necessity to address the consequence of the security aspects of the IOT. The built-in nature of the IOT is to trace user’s identity easily, so the security and privacy concerns like stealing the data, disruption of operations and even the loss of life are becoming critical issues in today’s IOT applications.  Due to the resource constrained environment in IOT  the conventional algorithms is not enough to ensure the data security. So we need a less computational cost in terms of power consumption and memory management and more efficient cryptography algorithms which are discussed in this paper.  


Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2484 ◽  
Author(s):  
Sudip Maitra ◽  
Kumar Yelamarthi

Internet of Things (IoT) has brought about a new horizon in the field of pervasive computing and integration of heterogeneous objects connected to the network. The broad nature of its applications requires a modular architecture that can be rapidly deployed. Alongside the increasing significance of data security, much research has focused on simulation-based encryption algorithms. Currently, there is a gap in the literature on identifying the effect of encryption algorithms on timing and energy consumption in IoT applications. This research addresses this gap by presenting the design, implementation, and practical evaluation of a rapidly deployable IoT architecture with embedded data security. Utilizing open-source off-the-shelf components and widely accepted encryption algorithms, this research presents a comparative study of Advanced Encryption Standards (AES) with and without hardware accelerators and an eXtended Tiny Encryption Algorithm (XTEA) to analyze the performance in memory, energy, and execution time. Experimental results from implementation in multiple IoT applications has shown that utilizing the AES algorithm with a hardware accelerator utilizes the least amount of energy and is ideal where timing is a major constraint, whereas the XTEA algorithm is ideal for resource constrained microcontrollers. Additionally, software implementation of AES on 8-bit PIC architecture required 6.36x more program memory than XTEA.


Author(s):  
Omar Sapti Guma'a ◽  
Qasim Mohammed Hussein ◽  
Ziyad Tariq Mustafa Al-Ta'i

<span>In several aspects, interest in IoT has become considerable by researchers and academics in recent years. Data security becomes one of the important challenges facing development of IoT environment. Many algorithms were proposed to secure the IoT applications. The traditional public key cryptographic are inappropriate because it requires high computational. Therefore, lattice-based public-key cryptosystem (LB-PKC) is a favorable technique for IoT security. NTRU is one of a LB-PKC that based on truncated polynomial ring, it has good features, which make it to be an effective alternative to the RSA and ECC algorithms. But, there is LLL algorithm can success to attack it under certain conditions. This paper proposes modifications to NTRU public key cryptosystem to be secure against the lattice-based attack by using LLL algorithm, as well as a method for generating a new keys sequence dynamically. The results from simulations show that the performance of these modifications gives more secure from NTRU. </span>


2009 ◽  
Vol 42 (21) ◽  
pp. 1-2
Author(s):  
ERIK L. GOLDMAN
Keyword(s):  

1997 ◽  
Vol 36 (02) ◽  
pp. 79-81
Author(s):  
V. Leroy ◽  
S. Maurice-Tison ◽  
B. Le Blanc ◽  
R. Salamon

Abstract:The increased use of computers is a response to the considerable growth in information in all fields of activities. Related to this, in the field of medicine a new component appeared about 40 years ago: Medical Informatics. Its goals are to assist health care professionals in the choice of data to manage and in the choice of applications of such data. These possibilities for data management must be well understood and, related to this, two major dangers must be emphasized. One concerns data security, and the other concerns the processing of these data. This paper discusses these items and warns of the inappropriate use of medical informatics.


Sign in / Sign up

Export Citation Format

Share Document