INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.9, No.1, Jan. 2019

A Hybrid Cryptosystem to Enhance Security in IoT Health Care System

Full Text (PDF, 577KB), PP.1-10


Views:7   Downloads:0

Author(s)

Kavitha.S, P.J.A.Alphonse

Index Terms

Attacks;Hessain Curve;Diffie Hellman;AES;IoT security

Abstract

Internet of Things (IoT) based health care system provides an essential interface between tiny devices and customers, who require customary checking by remedial focus. The technological innovation is important to guarantee the data protection and security among customer and devices, though it is vulnerable by various security assaults. The cryptographic technique is a prominent method for data protection in a healthcare management system. Single cryptographic algorithm based solution suffered to provide efficient security as its high probability of attacks. So this paper proposes a hybrid cryptographic algorithm that secures the sensitive medicinal information in IoT health care system.  The proposed hybrid algorithm is dealing with various security attacks in a proficient way, and also increases its performance when compared to other cryptographic algorithms.

Cite This Paper

Kavitha.S, P.J.A.Alphonse, "A Hybrid Cryptosystem to Enhance Security in IoT Health Care System", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.9, No.1, pp. 1-10, 2019.DOI: 10.5815/ijwmt.2019.01.01

Reference

[1]L. Eschenauer,V. D. Gligor, A key-management scheme for distributed sensor networks, in: Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM, 2002, pp. 41-47.

[2]Y. Yang, X. Zheng, C. Tang, Lightweight distributed secure data management system for health internet of things, Journal of Network and Computer Applications 89 (2017) 26-37.

[3]M. Bhatia, S. K. Sood, A comprehensive health assessment framework to facilitate iot-assisted smart workouts: A predictive healthcare perspective,Computers in Industry 92 (2017) 50-66.

[4]V. Sermakani, Transforming healthcare through internet   of things, in: of Project Management Practitioners' Conference, 2014.

[5]F. Zubaydi, A. Saleh, F. Aloul, A. Sagahyroon, Security of mobile health (mhealth) systems, in: Bioinformatics and Bioengineering (BIBE), 2015 IEEE 15th International Conference on, IEEE,     2015, pp. 1-5.

[6]T. K. Goyal, V. Sahula, Lightweight security algorithm for low power iot devices, in: Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on, IEEE, 2016, pp. 1725-1729.

[7]M. T. Gebrie, H. Abie, Risk-based adaptive authentication for internet of things in smart home ehealth, in: Proceedings of the 11th European  Conference on Software Architecture: Companion Proceedings, ACM, 2017, pp. 102-108.11

[8]C. Doukas, I. Maglogiannis, V. Kou_, F. Malamateniou, G. Vassilacopoulos, Enabling data protection through pki encryption in iot m-health devices, in: Bioinformatics & Bio engineering (BIBE), 2012 IEEE 12th International Conference on, IEEE, 2012, pp. 25-29.

[9]L. Marin, M. P. Pawlowski, A. Jara, Optimized ecc implementation for secure communication between heterogeneous iot devices, Sensors 15 (9) (2015) 21478-21499.

[10]R. R. Farashahi, M. Joye, E_cient arithmetic on hessian curves, in: International Workshop on Public Key Cryptography, Springer, 2010, pp. 243-260.

[11]A. Liu, P. Ning, Tinyecc: A con_gurable library for elliptic curve cryptography in wireless sensor networks, in: Proceedings of the 7th international conference on Information processing in sensor networks,IEEE Computer Society, 2008, pp. 245-256.

[12]M. Usman, I. Ahmed, M. I. Aslam, S. Khan, U. A. Shah, Sit: A lightweight encryption algorithm for secure internet of things, arXiv preprint Xiv:1704.08688.

[13]D. J. Bernstein, C. Chuengsatiansup, D. Kohel, T. Lange, Twisted  hessian curves, in: International Conference on Cryptology and Information Security in Latin America, Springer, 2015, pp. 269-294.

[14]A. Mathur, T. Newe, W. Elgenaidi, M. Rao, G. Dooly, D. Toal, A secure end-to-end IoT solution, Sensors and Actuators A: Physical 263 (2017)291-299.

[15]K. B. Adedeji, J. O. Famoriji, Investigating the effects of varying the key size on the performance of  aes algorithm for encryption of data over a communication channel.12

[16]S. Thangavelu, V. Vijaykumar, Efficiient modified elliptic curve diffie-hellman algorithm for voip networks.,International Arab Journal of  Information Technology (IAJIT) 13 (5).

[17]M. Xin, A mixed encryption algorithm used in internet of things security transmission system, in: Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2015 International Conference on, IEEE,2015, pp. 62-65.

[18]B. Pieper, An overview of the hipaa security rule, part ii: Standards and specifications., Optometry (St. Louis, Mo.) 75 (11) (2004) 728.