1887
Volume 2023, Issue 1
  • EISSN: 2220-2749

Abstract

This paper presents a proposed system for cloud-based and Internet o Things (IoT)-based electronic health records (EHRs) that utilize wearable body biosensors to collect biometric data in real time and analyze it to provide personalized therapy recommendations. The study aims to ensure the confidentiality and integrity of patient data through security authorizations, device authentication, and encrypted communication channels. The research method involves describing the proposed system’s communication environment and trust boundary and illustrating the communication mechanisms, including the “starting” and “authentication” procedures. The proposed communication protocols are also explained in detail, and a complete illustration of the symbols and abbreviations used throughout the work is provided. The initialization process involves contacting a body sensor network (BSN) server to register, generating a secret key, and assigning a track sequence number. The proposed systematic verification involves a dependable authentication solution to maintain secure communication between the biosensors, local processing unit (LPU), and BSN server. The verification process involves figuring out the values and generating a random integer, establishing communication with the receiver, and validating the data by searching for a corresponding tuple in the required database. The study emphasizes the importance of a robust IoT communication architecture to ensure secure data transfer between devices, networks, and individuals.

Loading

Article metrics loading...

/content/journals/10.5339/avi.2023.4
2023-05-02
2024-11-09
Loading full text...

Full text loading...

/deliver/fulltext/avi/2023/1/avi.2023.4.html?itemId=/content/journals/10.5339/avi.2023.4&mimeType=html&fmt=ahah

References

  1. Kooli, C., and Al Muftah, H.: ‘Artificial intelligence in healthcare: a comprehensive review of its ethical concerns’, Technological Sustainability, 2022
    [Google Scholar]
  2. Yousefnezhad, N., Malhi, A., and Främling, K.: ‘Security in product lifecycle of IoT devices: A survey’, Journal of Network and Computer Applications, 2020, 171:, pp. 102779
    [Google Scholar]
  3. Vehko, T., Hyppönen, H., Puttonen, S., Kujala, S., Ketola, E., Tuukkanen, J., Aalto, A.-M., and Heponiemi, T.: ‘Experienced time pressure and stress: electronic health records usability and information technology competence play a role’, BMC medical informatics and decision making, 2019, 19:, pp. 1-9
    [Google Scholar]
  4. Wang, X., and Cai, S.: ‘Secure healthcare monitoring framework integrating NDN-based IoT with edge cloud’, Future Generation Computer Systems, 2020, 112:, pp. 320-329
    [Google Scholar]
  5. Kooli, C.: ‘Chatbots in Education and Research: A Critical Examination of Ethical Implications and Solutions’, Sustainability, 2023, 15:, (7), pp. 5614
    [Google Scholar]
  6. Xu, R., and Ren, Q.: ‘Cryptoanalysis on a Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System’, IEEE Access, 2022, 10:, pp. 23618-23624
    [Google Scholar]
  7. Thilakarathne, N.N., Kagita, M.K., and Gadekallu, T.R.: ‘The role of the internet of things in health care: a systematic and comprehensive study’, Available at SSRN 3690815, 2020
    [Google Scholar]
  8. Chenthara, S., Ahmed, K., Wang, H., and Whittaker, F.: ‘Security and privacy-preserving challenges of e-health solutions in cloud computing’, IEEE access, 2019, 7:, pp. 74361-74382
    [Google Scholar]
  9. Koutli, M., Theologou, N., Tryferidis, A., Tzovaras, D., Kagkini, A., Zandes, D., Karkaletsis, K., Kaggelides, K., Miralles, J.A., and Oravec, V.: ‘Secure IoT e-Health applications using VICINITY framework and GDPR guidelines’, in Editor (Ed.)^(Eds.): ‘Book Secure IoT e-Health applications using VICINITY framework and GDPR guidelines’ (IEEE, 2019, ed.), pp. 263-270
    [Google Scholar]
  10. Parashar, V., Kashyap, R., Rizwan, A., Karras, D.A., Altamirano, G.C., Dixit, E., and Ahmadi, F.: ‘Aggregation-based dynamic channel bonding to maximise the performance of wireless local area networks (WLAN)’, Wireless Communications and Mobile Computing, 2022, 2022
    [Google Scholar]
  11. Chattopadhyay, A.K., Nag, A., Ghosh, D., and Chanda, K.: ‘A secure framework for IoT-based healthcare system’, in Editor (Ed.)^(Eds.): ‘Book A secure framework for IoT-based healthcare system’ (Springer, 2019, ed.), pp. 383-393
    [Google Scholar]
  12. Quy, V.K., Hau, N.V., Anh, D.V., and Ngoc, L.A.: ‘Smart healthcare IoT applications based on fog computing: architecture, applications and challenges’, Complex & Intelligent Systems, 2022, 8:, (5), pp. 3805-3815
    [Google Scholar]
  13. Hameed, S.S., Selamat, A., Abdul Latiff, L., Razak, S.A., Krejcar, O., Fujita, H., Ahmad Sharif, M.N., and Omatu, S.: ‘A hybrid lightweight system for early attack detection in the IoMT fog’, Sensors, 2021, 21:, (24) pp. 8289
    [Google Scholar]
  14. Yeh, K.-H.: ‘A secure IoT-based healthcare system with body sensor networks, IEEE Access, 2016, 4:, pp. 10288-10299
    [Google Scholar]
  15. Kashyap, R.: ‘Security, reliability, and performance assessment for healthcare biometrics’: ‘Design and Implementation of Healthcare Biometric Systems’ (IGI Global, 2019), pp. 29-54
    [Google Scholar]
  16. Ding, L., Wang, Z., Wang, X., and Wu, D.: ‘Security information transmission algorithms for IoT based on cloud computing, Computer Communications, 2020, 155:, pp. 32-39
    [Google Scholar]
  17. Al-Haija, Q.A., Al Tarayrah, M., Al-Qadeeb, H., and Al-Lwaimi, A.: ‘A tiny RSA cryptosystem based on Arduino microcontroller useful for small scale networks’, Procedia Computer Science, 2014, 34:, pp. 639-646
    [Google Scholar]
  18. Stepień, K., Poniszewska-Marańda, A., and Marańda, W.: ‘Securing connection and data transfer between devices and IoT cloud service’, Integrating Research and Practice in Software Engineering, 2020, pp. 83-96
    [Google Scholar]
  19. Yu, Y., Hu, L., and Chu, J.: ‘A secure authentication and key agreement scheme for IoT-based cloud computing environment’, Symmetry, 2020, 12:, (1), pp. 150
    [Google Scholar]
  20. Kashyap, R.: ‘Machine learning, data mining for IoT-based systems’: ‘Research Anthology on Machine Learning Techniques, Methods, and Applications’ (IGI Global, 2022), pp. 447-471
    [Google Scholar]
  21. Kashyap, R.: ‘Machine learning for internet of things’: ‘Research Anthology on Artificial Intelligence Applications in Security’ (IGI Global, 2021), pp. 976-1002
    [Google Scholar]
  22. Nair, R., Alhudhaif, A., Koundal, D., Doewes, R.I., and Sharma, P.: ‘Deep learning-based COVID-19 detection system using pulmonary CT scans’, Turkish Journal of Electrical Engineering and Computer Sciences, 2021, 29:, (8), pp. 2716-2727
    [Google Scholar]
  23. Nair, R., Singh, D.K., Yadav, S., and Bakshi, S.: ‘Hand Gesture Recognition system for physically challenged people using IoT’, in Editor (Ed.)^(Eds.): ‘Book Hand Gesture Recognition system for physically challenged people using IoT’ (IEEE, 2020, edn.), pp. 671-675
    [Google Scholar]
/content/journals/10.5339/avi.2023.4
Loading
/content/journals/10.5339/avi.2023.4
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error