Abstract
Internet has become a part of our daily life. Most of the communications or the transfer of the data across the globe is happening over the internet. With Internet of Things [IoT], the devices can transmit data with each other over the internet. As the internet play a crucial role, the security of the data also becomes important. Confidentiality is important in the healthcare sector where encryption plays an important role. There are many effective encryption algorithms available, but through this work we are proposing a novel method that aims at adding the randomness to the encryption algorithm. The random number generation technique used in this paper is Web Scraping, here the data is scraped from the web page where the data gets constantly updated which adds to the randomness. The random number generation module is added to the existing encryption algorithm and the encryption algorithm is tested on different file sizes to test the level of encryption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jha, D., Shahi, B.: A proposed methodology for end to end encryption for communicating embedded systems. In: International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore (2017)
Deshpande, P., Santhanalakshmi, S., Lakshmi, P., Vishwa, A.: Experimental study of Diffie-Hellman key exchange algorithm on embedded devices. In: International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai (2017)
Majumder, P., Sinha, K.: A novel key generation algorithm from twitter data stream for secure communication in IoT (2017)
Tao, H., Bhuiyan, M.Z.A., Abdalla, A.N., Hassan, M.M., Zain, J.M., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 6, 410–420 (2018)
Philip, M.A., Vaithiyanathan: A survey on lightweight ciphers for IoT devices. In: International Conference on Technological Advancements in Power and Energy (TAP Energy), Kollam (2017)
Kumar, M., Kumar, S., Budhiraja, R., Das, M.K., Singh, S.: Lightweight data security model for IoT applications: a dynamic key approach. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), Chengdu (2016)
Henriques, M.S., Vernekar, N.K.: Using symmetric and asymmetric cryptography to secure communication between devices in IoT. In: International Conference on IoT and Application (ICIOT), Nagapattinam (2017)
Rakesh, N.: Performance analysis of anomaly detection of different IoT datasets using cloud micro services. In: International Conference on InventiveComputationTechnologies (ICICT), Coimbatore, pp. 1–5 (2016)
Ashwini, M., Rakesh, N.: Enhancement and performance analysis of LEACH algorithm in IOT. In: International Conference on Inventive Systems and Control (ICISC), Coimbatore, pp. 1–5 (2017)
Reddy, B.D., Kumari, V.V., Raju, K.: A new symmetric probabilistic encryption scheme based on random numbers. In: First International Conference on Networks Soft Computing (ICNSC 2014), Guntur, pp. 267–272 (2014)
Sathya, K., Premalatha, J., Rajasekar, V.: Random number generation based on sensor with decimation method. In: IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions (WCI), Kanpur, pp. 1–5 (2015)
Mulaosmanovic, H., Mikolajick, T., Slesazeck, S.: Random number generation based on ferroelectric switching. IEEE Electron Device Lett. 39(1), 135–138 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Venkat Tejas, R., Rakesh, N. (2020). A Novel Method to Safeguard Patients Details in IoT Healthcare Sector Using Encryption Techniques. In: Balaji, S., Rocha, Á., Chung, YN. (eds) Intelligent Communication Technologies and Virtual Mobile Networks. ICICV 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 33. Springer, Cham. https://doi.org/10.1007/978-3-030-28364-3_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-28364-3_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-28363-6
Online ISBN: 978-3-030-28364-3
eBook Packages: EngineeringEngineering (R0)