Skip to main content

A Novel Method to Safeguard Patients Details in IoT Healthcare Sector Using Encryption Techniques

  • Conference paper
  • First Online:
Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2019)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 33))

Included in the following conference series:

  • 1096 Accesses

Abstract

Internet has become a part of our daily life. Most of the communications or the transfer of the data across the globe is happening over the internet. With Internet of Things [IoT], the devices can transmit data with each other over the internet. As the internet play a crucial role, the security of the data also becomes important. Confidentiality is important in the healthcare sector where encryption plays an important role. There are many effective encryption algorithms available, but through this work we are proposing a novel method that aims at adding the randomness to the encryption algorithm. The random number generation technique used in this paper is Web Scraping, here the data is scraped from the web page where the data gets constantly updated which adds to the randomness. The random number generation module is added to the existing encryption algorithm and the encryption algorithm is tested on different file sizes to test the level of encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jha, D., Shahi, B.: A proposed methodology for end to end encryption for communicating embedded systems. In: International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore (2017)

    Google Scholar 

  2. Deshpande, P., Santhanalakshmi, S., Lakshmi, P., Vishwa, A.: Experimental study of Diffie-Hellman key exchange algorithm on embedded devices. In: International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai (2017)

    Google Scholar 

  3. Majumder, P., Sinha, K.: A novel key generation algorithm from twitter data stream for secure communication in IoT (2017)

    Google Scholar 

  4. Tao, H., Bhuiyan, M.Z.A., Abdalla, A.N., Hassan, M.M., Zain, J.M., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 6, 410–420 (2018)

    Article  Google Scholar 

  5. Philip, M.A., Vaithiyanathan: A survey on lightweight ciphers for IoT devices. In: International Conference on Technological Advancements in Power and Energy (TAP Energy), Kollam (2017)

    Google Scholar 

  6. Kumar, M., Kumar, S., Budhiraja, R., Das, M.K., Singh, S.: Lightweight data security model for IoT applications: a dynamic key approach. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), Chengdu (2016)

    Google Scholar 

  7. Henriques, M.S., Vernekar, N.K.: Using symmetric and asymmetric cryptography to secure communication between devices in IoT. In: International Conference on IoT and Application (ICIOT), Nagapattinam (2017)

    Google Scholar 

  8. Rakesh, N.: Performance analysis of anomaly detection of different IoT datasets using cloud micro services. In: International Conference on InventiveComputationTechnologies (ICICT), Coimbatore, pp. 1–5 (2016)

    Google Scholar 

  9. Ashwini, M., Rakesh, N.: Enhancement and performance analysis of LEACH algorithm in IOT. In: International Conference on Inventive Systems and Control (ICISC), Coimbatore, pp. 1–5 (2017)

    Google Scholar 

  10. Reddy, B.D., Kumari, V.V., Raju, K.: A new symmetric probabilistic encryption scheme based on random numbers. In: First International Conference on Networks Soft Computing (ICNSC 2014), Guntur, pp. 267–272 (2014)

    Google Scholar 

  11. Sathya, K., Premalatha, J., Rajasekar, V.: Random number generation based on sensor with decimation method. In: IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions (WCI), Kanpur, pp. 1–5 (2015)

    Google Scholar 

  12. Mulaosmanovic, H., Mikolajick, T., Slesazeck, S.: Random number generation based on ferroelectric switching. IEEE Electron Device Lett. 39(1), 135–138 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Venkat Tejas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Venkat Tejas, R., Rakesh, N. (2020). A Novel Method to Safeguard Patients Details in IoT Healthcare Sector Using Encryption Techniques. In: Balaji, S., Rocha, Á., Chung, YN. (eds) Intelligent Communication Technologies and Virtual Mobile Networks. ICICV 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 33. Springer, Cham. https://doi.org/10.1007/978-3-030-28364-3_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-28364-3_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-28363-6

  • Online ISBN: 978-3-030-28364-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics