scholarly journals Multi-key Modified Tiny Encryption Algorithm for HealthCare

2018 ◽  
Vol 7 (2.14) ◽  
pp. 559
Author(s):  
Sharath Aradhyamath ◽  
Joy Paulose

Healthcare data is crucial in patient’s surveillance. To give the finest treatment to patients the data should be of the best quality. Many security threats affect the integrity and ingenuity of the medical data. In the recent times, medical data can be accessed anytime and anywhere with the help of an overwhelming technology called the Internet of Things (IoT). IoT has numerous applications based on healthcare, however, it facilitates data misuse such as data breach and health care fraud. Sensitive and protected data is stolen and modified by an unauthorized person. Due to these data abuses, it degrades the quality of medical data and service. In this paper, secure data transfer is done in IoT based healthcare to enhance the security of the medical data. Data confidentiality can be achieved using encryption algorithms such as Tiny Encryption Algorithm (TEA) which is lightweight and suitable for resource constraint devices. The results of the proposed system show that the modified TEA overcomes the drawback of the equivalent key and also provides a better security to healthcare data.

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Mary Subaja Christo ◽  
V. Elizabeth Jesi ◽  
Uma Priyadarsini ◽  
V. Anbarasu ◽  
Hridya Venugopal ◽  
...  

Hospital data management is one of the functional parts of operations to store and access healthcare data. Nowadays, protecting these from hacking is one of the most difficult tasks in the healthcare system. As the user’s data collected in the field of healthcare is very sensitive, adequate security measures have to be taken in this field to protect the networks. To maintain security, an effective encryption technology must be utilised. This paper focuses on implementing the elliptic curve cryptography (ECC) technique, a lightweight authentication approach to share the data effectively. Many researches are in place to share the data wirelessly, among which this work uses Electronic Medical Card (EMC) to store the healthcare data. The work discusses two important data security issues: data authentication and data confidentiality. To ensure data authentication, the proposed system employs a secure mechanism to encrypt and decrypt the data with a 512-bit key. Data confidentiality is ensured by using the Blockchain ledger technique which allows ethical users to access the data. Finally, the encrypted data is stored on the edge device. The edge computing technology is used to store the medical reports within the edge network to access the data in a very fast manner. An authenticated user can decrypt the data and process the data at optimum speed. After processing, the updated data is stored in the Blockchain and in the cloud server. This proposed method ensures secure maintenance and efficient retrieval of medical data and reports.


Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 293 ◽  
Author(s):  
Sreeja Rajesh ◽  
Varghese Paul ◽  
Varun Menon ◽  
Mohammad Khosravi

Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT) revolution. Large amounts of data are captured, processed and transmitted through the network by these embedded devices. Security of the transmitted data is a major area of concern in IoT networks. Numerous encryption algorithms have been proposed in these years to ensure security of transmitted data through the IoT network. Tiny encryption algorithm (TEA) is the most attractive among all, with its lower memory utilization and ease of implementation on both hardware and software scales. But one of the major issues of TEA and its numerous developed versions is the usage of the same key through all rounds of encryption, which yields a reduced security evident from the avalanche effect of the algorithm. Also, the encryption and decryption time for text is high, leading to lower efficiency in IoT networks with embedded devices. This paper proposes a novel tiny symmetric encryption algorithm (NTSA) which provides enhanced security for the transfer of text files through the IoT network by introducing additional key confusions dynamically for each round of encryption. Experiments are carried out to analyze the avalanche effect, encryption and decryption time of NTSA in an IoT network including embedded devices. The results show that the proposed NTSA algorithm is much more secure and efficient compared to state-of-the-art existing encryption algorithms.


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4921 ◽  
Author(s):  
Peter Kaňuch ◽  
Dominik Macko

The rapidly growing segment of the Internet of Things (IoT) makes the security threats more prominent than ever. The research around communication security and cybersecurity in such networks is still a challenge, mainly due to the typically limited energy and computation resources of IoT devices. The strong security mechanisms require significant power and thus the energy wastage must be minimized. Optimized application-specific security protocols are commonly used to make the data transfer more efficient, while still offering a high level of security. The supported security features, such as confidentiality, integrity or authenticity, should not be affected by the optimization. Our work is focused on optimizing one of the existing security protocols for the use in the IoT area, namely the Host Identity Protocol (HIP). Based on the analysis of related works, we have identified multiple possibilities for optimization and combined some of them into the proposed E-HIP optimized protocol. For verification purpose, it has been implemented as a modification of the open-source OpenHIP library and applied on a communication between real hardware devices. The secured communication worked correctly. The resulting effect of the proposed optimization has been evaluated experimentally and it represents an increase in energy efficiency by about 20%. Compared to other HIP optimizations, the achieved results are similar; however, the proposed optimizations are unique and can be further combined with some of the existing ones to achieve even higher efficiency.


Author(s):  
George Tzanis

Undoubtedly the IoT is the future of technology, which can provide manifold benefits to health care. However, the challenges posed are also great. Concerning the analysis of healthcare data, various tools have been introduced to deal efficiently with the large volumes as well as the various peculiarities of data (e.g. missing values, noise, etc.). Most popular representative of these modern tools is data mining, or the KDD process, strictly speaking. Although the KDD process has provided a lot of solutions, in many cases these techniques have to be scaled in order to deal with the new challenges posed by the big data paradigm. Cloud computing is the modern infrastructure that can provide the means to efficiently manage big data. Both cloud computing and the IoT are very promising concepts of technology and their complementary characteristics assure that their integration, Cloud-IoT, is very promising too. The introduction of the Cloud-IoT paradigm in the healthcare domain can offer manifold benefits and opportunities that will considerably improve the quality of health care.


Author(s):  
Я.О. Ключка ◽  
О.В. Шматко ◽  
С.П. Євсеєв ◽  
С.В. Милевський

The current situation in the field of health care is considered and the key problems faced by this industry are described. Today, there are two main issues to be addressed in healthcare: data ownership and data security. The patient's medical data is preferably stored in centralized, isolated systems that are incompatible with each other. This situation creates difficulties in terms of timely exchange of medical data and access to them. The lack of data complicates further diagnosis and treatment of the patient. In addition, systems that store medical data are not completely reliable. Third parties can easily access and modify medical data. It is expected that blockchain technology can solve the problems that currently exist in the field of health care. Blockchain technology will create distributed, decentralized systems that will significantly improve the quality of care provided. The paper considers the areas in the field of health care, in which blockchain technology is beginning to develop, as well as related projects. All considered projects can be divided into four areas: supply chain surveillance and fight against counterfeit products, telemedicine, diagnostics, storage and management of medical data. The healthcare sector is developing rapidly and new areas are expected in which the blockchain will be used. Although there are still some problems that need to be overcome for the blockchain to be fully used.


Author(s):  
George Tzanis

Undoubtedly the IoT is the future of technology; it can provide manifold benefits to healthcare. However, the challenges posed are also great. Concerning the analysis of healthcare data, various tools have been introduced to deal efficiently with the large volumes as well as the various peculiarities of data (e.g., missing values, noise, etc.). The most popular representative of these modern tools is data mining, or the KDD process, strictly speaking. Although the KDD process has provided a lot of solutions, in many cases these techniques have to be scaled in order to deal with the new challenges posed by the big data paradigm. Cloud computing is the modern infrastructure that can provide the means to efficiently manage big data. Both cloud computing and the IoT are very promising concepts of technology and their complementary characteristics assure that their integration, Cloud-IoT, is very promising too. The introduction of the Cloud-IoT paradigm in the healthcare domain can offer manifold benefits and opportunities that will considerably improve the quality of healthcare.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2962
Author(s):  
Xingda Chen ◽  
Margaret Lech ◽  
Liuping Wang

Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications. The latest LoRaWAN release v.1.1 has provided a security framework that includes data confidentiality protection, data integrity check, device authentication and key management. However, its key management part is only ambiguously defined. In this paper, a complete key management scheme is proposed for LoRaWAN. The scheme addresses key updating, key generation, key backup, and key backward compatibility. The proposed scheme was shown not only to enhance the current LoRaWAN standard, but also to meet the primary design consideration of LoRaWAN, i.e., low power consumption.


2021 ◽  
Vol 17 (3) ◽  
pp. 1-23
Author(s):  
Ning Chen ◽  
Tie Qiu ◽  
Mahmoud Daneshmand ◽  
Dapeng Oliver Wu

The Internet of Things (IoT) has been extensively deployed in smart cities. However, with the expanding scale of networking, the failure of some nodes in the network severely affects the communication capacity of IoT applications. Therefore, researchers pay attention to improving communication capacity caused by network failures for applications that require high quality of services (QoS). Furthermore, the robustness of network topology is an important metric to measure the network communication capacity and the ability to resist the cyber-attacks induced by some failed nodes. While some algorithms have been proposed to enhance the robustness of IoT topologies, they are characterized by large computation overhead, and lacking a lightweight topology optimization model. To address this problem, we first propose a novel robustness optimization using evolution learning (ROEL) with a neural network. ROEL dynamically optimizes the IoT topology and intelligently prospects the robust degree in the process of evolutionary optimization. The experimental results demonstrate that ROEL can represent the evolutionary process of IoT topologies, and the prediction accuracy of network robustness is satisfactory with a small error ratio. Our algorithm has a better tolerance capacity in terms of resistance to random attacks and malicious attacks compared with other algorithms.


2021 ◽  
Vol 11 (8) ◽  
pp. 3623
Author(s):  
Omar Said ◽  
Amr Tolba

Employment of the Internet of Things (IoT) technology in the healthcare field can contribute to recruiting heterogeneous medical devices and creating smart cooperation between them. This cooperation leads to an increase in the efficiency of the entire medical system, thus accelerating the diagnosis and curing of patients, in general, and rescuing critical cases in particular. In this paper, a large-scale IoT-enabled healthcare architecture is proposed. To achieve a wide range of communication between healthcare devices, not only are Internet coverage tools utilized but also satellites and high-altitude platforms (HAPs). In addition, the clustering idea is applied in the proposed architecture to facilitate its management. Moreover, healthcare data are prioritized into several levels of importance. Finally, NS3 is used to measure the performance of the proposed IoT-enabled healthcare architecture. The performance metrics are delay, energy consumption, packet loss, coverage tool usage, throughput, percentage of served users, and percentage of each exchanged data type. The simulation results demonstrate that the proposed IoT-enabled healthcare architecture outperforms the traditional healthcare architecture.


Sign in / Sign up

Export Citation Format

Share Document