Evolution of IOT in health care by protecting and safeguarding private security in healthcare
Keywords:
IoT, dynamic encryption, two-way authentication approachAbstract
Machines are being linked together in order to lessen the burden of medics in the near future while also offering effective services to patients. Furthermore, these gadgets generate a large amount of data during transmission. A clinical IoT based network is a networked system that must be protected from beginning to finish in order to function and communicate. To avoid sensitive data leakage from such devices/systems, connection should be encrypted. We are proposing dynamic encryption model which works well on health records generated from IoT machines. Similarly, we ensure the security of the data through a two-way authentication system with the approval from agent/patient to access and share the data.
Downloads
References
Srilakshmi, P. Mohanapriya, D. Harini and K. Geetha, "IoT based Smart Health Care System to Prevent Security Attacks in SDN," 2019 Fifth International Conference on Electrical Energy Systems (ICEES), 2019, pp. 1-7, doi: 10.1109/ICEES.2019.8719236.
Alladi, Tejasvi & Naren, Naren & Chamola, Vinay. (2020). HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks. IEEE Journal on Selected Areas in Communications. 10.1109/JSAC.2020.3020605.
G. S, V. L, R. V. B, D. SS and A. N, "IoT Based Health Monitoring System," 2021 Innovations in Power and Advanced Computing Technologies (i-PACT), 2021, pp. 1-6, doi: 10.1109/i-PACT52855.2021.9696937.
Ibrahim Sadek, Shafiq Ul Rehman, Josué Codjo, and Bessam Abdulrazak. 2019. Privacy and Security of IoT Based Healthcare Systems: Concerns, Solutions, and Recommendations. In How AI Impacts Urban Living and Public Health: 17th International Conference, ICOST 2019, New York City, NY, USA, October 14-16, 2019, Proceedings. Springer-Verlag, Berlin, Heidelberg, 3–17. https://doi.org/10.1007/978-3-030-32785-9_1
Nasiri S, Sadoughi F, Tadayon MH, Dehnad A. Security Requirements of Internet of Things-Based Healthcare System: a Survey Study. Acta Inform Med. 2019 Dec;27(4):253-258. doi: 10.5455/aim.2019.27.253-258. PMID: 32055092; PMCID: PMC7004290.
Panchatcharam, Parthasarathy & Sundaram, Vivekanandan. (2019). Internet of Things (IOT) in Healthcare – Smart Health and Surveillance, Architectures, Security Analysis and Data Transfer: A Review. International Journal of Software Innovation. 7. 21-40. 10.4018/IJSI.2019040103.
R.Thiagarajan, R.Jothikumar,T.Rubeshkumar,P.Jayalakshmi,M.Baskar“Enhanced Resemblance Measures forIntegration in Image-Rich Information Networks”, Journal of Critical Reviews,ISSN- 2394-5125 Vol 7, Issue 16, July 2020
R.Thiagarajan,N.R .Rajalakshmi , M. Baskar ,P. Jayalakshmi “A Novel Solution for Economizing Water by a Mix of Technologies with a Low Cost Approach”, International Journal of Advanced Science and Technology Vol. 29, No. 7, April 2020, pp. 916 – 921.
S. A. Chaudhry, K. Yahya, F. Al-Turjman and M. -H. Yang, "A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems," in IEEE Access, vol. 8, pp. 139244-139254, 2020, doi: 10.1109/ACCESS.2020.3012121.
S. K. B V, S. Sharma, K. S. Swathi, K. R. Yamini, C. P. Kiran and K. Chandrika, "Review on IoT based Healthcare systems," 2022 International Conference on Advanced Computing Technologies and Applications (ICACTA), 2022, pp. 1-5, doi: 10.1109/ICACTA54488.2022.9753547.
S. Sonune, D. Kalbande, A. Yeole and S. Oak, "Issues in IoT healthcare platforms: A critical study and review," 2017 International Conference on Intelligent Computing and Control (I2C2), 2017, pp. 1-5, doi: 10.1109/I2C2.2017.8321898.
Sadek, Ibrahim & Rehman, Shafiq & Codjo, Josué & Abdulrazak, Bessam. (2019). Privacy and Security of IoT Based Healthcare Systems: Concerns, Solutions, and Recommendations. 10.1007/978-3-030-32785-9_1.
Suryasa, I. W., Rodríguez-Gámez, M., & Koldoris, T. (2022). Post-pandemic health and its sustainability: Educational situation. International Journal of Health Sciences, 6(1), i-v. https://doi.org/10.53730/ijhs.v6n1.5949
Susilo, C. B., Jayanto, I., & Kusumawaty, I. (2021). Understanding digital technology trends in healthcare and preventive strategy. International Journal of Health & Medical Sciences, 4(3), 347-354. https://doi.org/10.31295/ijhms.v4n3.1769
T. Shah and S. Venkatesan, "Authentication of IoT Device and IoT Server Using Secure Vaults," 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, pp. 819-824, doi: 10.1109/TrustCom/BigDataSE.2018.00117.
V. Vippalapalli and S. Ananthula, "Internet of things (IoT) based smart health care system," 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 2016, pp. 1229-1233, doi: 10.1109/SCOPES.2016.7955637.
Villalba, M. Teresa & Buenaga, Manuel & Gachet, Diego & Galisteo, Fernando. (2015). Security analysis of an IoT architecture for healthcare.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.








