Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Internet of Things (IoT) in Healthcare Systems Using Security Mechanisms, Cyber Discussions and Priority Protocols

Dr. G. Angeline Prasanna, M. Krishnapriya

Abstract


Internet of Things (IoT) is a field where we are discussing of smart titled things which includes the altogether concept of, where smart cities, smart homes, smart industries and what not for the industry revolution 4.0. And to that technology being existing as wired and wireless networks and a combination of topologies for the infrastructure. Being security mechanisms a common breach now, it cannot be compromised with the health and the single “physical unit” of all invention-Man who is behind the finding and also the breaches.so healthcare needs more security mechanisms both in areas of algorithms and techniques as well as tools are being studied through various papers mentioned below.


Keywords


Industry4.0, Security Breach, Wireless Networks

Full Text:

PDF

References


Deogirikar J, Vidhate A. Security attacks in IoT: A survey. Proceed- ing of 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). 2017 Feb 10-11; Palladam, India. IEEE; 2017: 32-37.

Dr. Angeline Prasanna G 1, Krishnapriya M, Journal of the Gujarat Research society, ISSN: 0374-8588. The Internet of Things, A novel Paradigm for various fields. Volume 21 issue, 17 December 2019.

Islam SMR, Kwak D, Kabir MH, Hossain M, Kwak KS. The Inter- net of Things for Health Care: A Comprehensive Survey. IEEE Ac- cess. 2015; 3: 678-708.

Gholamhosseini L, Sadoughi F, Ahmadi H, Safaei A. Health Inter- net of Things: Strengths, Weakness, Opportunity, and Threats. Proceeding of 2019 5th International Conference on Web Research (ICWR). 24-25 April 2019; Tehran, Iran. IEEE; 2019: 287-296.

Strielkina A, Kharchenko V, Uzun D. Availability models for healthcare IoT systems: Classification and research considering attacks on vulnerabilities. Proceeding of 2018 IEEE 9th Interna- tional Conference on Dependable Systems, Services and Technol-ogies (DESSERT). 2018 May 24-27; Kiev, Ukraine. IEEE; 2018: 58- 62.

Jaghirdar FT, Rudolph C, Bain C, Acm. Can I Trust the Data I See? A Physician’s Concern on Medical Data in IoT Health Architectures. Proceeding of Proceedings of the Australasian Computer Science Week Multiconference. 2019 Jan 29-31; Sydney, NSW, Australia. New York: Association for Computing Machinery (ACM); 2019: 1-10.

Alsubaei F, Shiva S, Abuhussein A. Security and Privacy in the In- ternet of Medical Things: Taxonomy and Risk Assessment. Pro- ceeding of 2017 Ieee 42nd Conference on Local Computer Net- works Workshops. 2017 Oct 9; Singapore, Singapore IEEE; 2017: 112-120.

Lu Y, Da Xu L. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics. IEEE Internet Things J. 2018; 6(2): 2103-2115.

Karen Rose, Scott Eldridge, Lyman Chapin, “The Internet of Things: An Overview; Understanding the Issues and Challenges of a More Connected World”, The Internet Society (ISOC), October 2015.

M. Katagi and S. Moriai, “Lightweight cryptography for the internet of things,” Sony Corporation, pp. 7-10, 2008.

T. Bhattasali, “LICRYPT: Lightweight Cryptography Technique for Securing Smart Objects in Internet of Things Environment,” CSI Communications, 2013.

J.-Y. Lee, W.-C. Lin, and Y.-H. Huang, “A lightweight authentication protocol for internet of things,” in Next-Generation Electronics (ISNE),2014 International Symposium on, 2014, pp. 1-2.

Z Bohan, W. Xu, Z. Kaili, and Z. Xueyuan, “Encryption Node Design in Internet of Things Based on Fingerprint Features and CC2530,” in Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conferenceon and IEEE Cyber, Physical and Social Computing, 2013, pp. 1454- 1457.Second Generation System-on-Chip Solution for 2.4 GHz IEEE802.15.4 / RF4CE / ZigBee. Texas Instruments. Available: http://www.ti.com/product/cc2530 (2015).

A. Fragkiadakis, E. Tragos, and A. Traganitis, “Lightweight and secure encryption using channel measurements,” in Wireless Communications Vehicular Technology, Information Theory and Aerospace & Electronics Systems (VITAE), 2014 4th International Conference on, 2014, pp. 1-5.

L. Touati, Y. Challal, and A. Bouabdallah, “C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things,” in Advanced Networking Distributed Systems and Applications (INDS), 2014 International Conference on, 2014, pp. 64- 69.

R. Roman, P. Najera, and J. Lopez, “Securing the Internet of Things”, IEEE Computer, vol. 44, pp. 51 -58, 2011.

J. Brandt. (2015). 50 billion connected IoT devices by 2020. Available: http://www.smartgridnews.com/story/50-billion-connected-iot-devices- 2020/2015-04-21.

T. Bradley, “Experts pick the top 5 security threats for 2015 | PCWorld,” 2015-01-14 2015.

M. J. Covington and R. Corscadden, “Threat implications of the internet of things,” in Cyber Conflict (CyCon), 2013 5th International Conference on, 2013, pp. 1-12.

S. Katzenbeisser and F. Petitcolas, “I and digital watermarking”: Artech house, Boston, London 2000.

N. Provos and P. Honey man, “Hide and seek: An introduction to steganography,” Security & Privacy, IEEE, vol. 1, pp. 32-44, 2003.

N. Tiwari and D. M. Shandilya, “Evaluation of Various LSB based Methods of Image Steganography on GIF File Format,” International Journal of Computer Applications (0975–8887), 2010, pp. 35-41.

D. R. Stinson, “Cryptography: theory and practice”: CRC press, 2005

T. Bhattasali, “LICRYPT: Lightweight Cryptography Technique for Securing Smart Objects in Internet of Things Environment ,” CSI Communications, 2013.

J.-Y. Lee, W.-C. Lin, and Y.-H. Huang, “A lightweight authentication protocol for internet of things,” in Next-Generation Electronics (ISNE), international Symposium on, 2014, pp. 1-2.

Z. Bohan, W. Xu, Z. Kaili, and Z. Xueyuan, “Encryption Node Design in Internet of Things Based on Fingerprint Features and CC2530,” in Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, 2013, pp. 1454- 1457.

Second Generation System-on-Chip Solution for 2.4 GHz IEEE 802.15.4 / RF4CE / ZigBee. Texas Instruments. Available: http://www.ti.com/product/cc2530 (2015).

Fragkiadakis, E. Tragos, and A. Traganitis, “Lightweight and secure encryption using channel measurements,” in Wireless Communications Vehicular Technology, Information Theory and Aerospace & Electronics Systems (VITAE), 2014 4th International Conference on, 2014, pp. 1-5.

L. Touati, Y. Challal, and A. Bouabdallah, “C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things,” in Advanced Networking Distributed Systems and Applications (INDS), 2014 International Conference on, 2014, pp. 64- 69.

S. Guicheng and Y. Zhen, “Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things,” in 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013, pp. 452-455.

R. Watro, D. Kong, S.-f. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: securing sensor networks with public key technology,” in Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 2004, pp. 59-64.

Gupta, O. J. Pandey, M. Shukla, A. Dadhich, S. Mathur, and A Ingle, “Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks,” in Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on, 2013, pp. 1-7.

Lakshmi and B. V. Raju, “FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor,” International Journal of Computer Trends and Technology (IJCTT), vol. 6, pp. 6-14, 2013.

M. N. B. NAIK and M. A. N. NAIK, “Steganographic Secure Data Communication using ZIGBEE”, International Journal of Research in Science and Technology, (IJRST) 2015, Vol. No. 5, Issue No. II, Apr- Jun, ISSN: 2249-0604.

M. S. Shahreza, “An improved method for steganography on mobile phone,” WSEAS (World Scientific and Engineering Academy and Society Transactions on Systems, vol. 4, pp. 955-957, 2005.

M. Shirali-Shahreza, “Steganography in MMS,” in Multitopic Conference, 2007. INMIC 2007. IEEE International, 2007, pp. 1-4.

D. Stanescu, V. Stangaciu, I. Ghergulescu, and M. Stratulat, “Steganography on embedded devices,” in Applied Computational Intelligence and Informatics, 2009. SACI'09. 5th International Symposium on, 2009, pp. 313-318.

S. Chakraborty and D. Das, “An overview of face liveness detection,” International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014.

“Cryptography and Network Security “by William Stallings.

C.-K. Chan and L.-M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern recognition, vol. 37, pp. 469-474, 2004.

S. A. Laskar and K. Hema Chandran, “High-Capacity data hiding using LSB Steganography and Encryption,” International Journal of Database Management Systems (IJDMS) Vol, vol. 4, 2012, pp. 57 – 68.

T. Morkel, J. H. Eloff, and M. S. Olivier, “An overview of image steganography,” in ISSA, 2005, pp. 1-11.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.