1887
Volume 2022 Number 1
  • ISSN: 1999-7086
  • EISSN: 1999-7094

Abstract

Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One of the main issues that arise in IOMT is how securely the data can be transmitted to the clinical team. In this project, biometric Identity-based encryption was utilized using the Fuzzy-IBE (Identity-based encryption) scheme that uses face features of the clinicians to create the public key. Figure 1 shows the testbed setup designed to improve the privacy and security of the patients’ healthcare data. The testbed comprises an ESP32 platform sensing and encrypting data, the Nvidia Jetson Nano for data collection and decryption, and the Thingsboard online platform for vital information visualization. Fuzzy Identity-Based Encryption (FIBE)1–3 uses legitimate users’ facial features. The encrypted vital information is transmitted to the Edge-device (Jetson Nano) through BLE/Wi-Fi. On the edge-device of the healthcare system, the face authentication mechanism verifies the user's (clinician) legitimacy to assess the data. Upon user authentication, their facial features will be used to generate a private decryption key that can decrypt the received encrypted data. The data is further sent to the core cloud (Thingsboard) for storage and visualization. To secure the data on the cloud, we deployed an Intrusion Detection System (IDS) model using deep learning to identify the inter-domain stream of malicious traffic. The face authentication testing using Fuzzy Identity-based Cryptography relied on a public data set. The execution time was calculated for Encryption (time to encrypt the patient's vital data using a public key of health physician's facial features) and decryption (time to match at least d components of the ciphertext and perform message decryption). The experimental results are reported in Table 1. In today's age of advanced telecommunication technology, cyber security is a very important factor. The designed testbed setup in this work showcases how healthcare data can be secured against malicious attacks.

Loading

Article metrics loading...

/content/journals/10.5339/jemtac.2022.qhc.72
2021-12-01
2024-11-13
Loading full text...

Full text loading...

/deliver/fulltext/jemtac/2022/1/jemtac.2022.qhc.72.html?itemId=/content/journals/10.5339/jemtac.2022.qhc.72&mimeType=html&fmt=ahah

References

  1. Zubair M, Unal D, Al-Ali A, Reimann T, Alinier G. Cybersecurity for next generation healthcare in Qatar, Journal of Emergency Medicine, Trauma & Acute Care 2021: (2):41. http://dx.doi.org/jemtac.2021.qhc.41 .
    [Google Scholar]
  2. Okano H, Emura K, Ishibashi T, Ohigashi T, Suzuki T. Implementation of a strongly robust identity-based encryption scheme over type-3 pairings. International Journal of Networking and Computing, 2020;10:174–188.
    [Google Scholar]
  3. Sahai A, Waters B. Fuzzy identity-based encryption. In Annual international conference on the theory and applications of cryptographic techniques, 457–473. Springer, 2005.
    [Google Scholar]
/content/journals/10.5339/jemtac.2022.qhc.72
Loading
/content/journals/10.5339/jemtac.2022.qhc.72
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error