scispace - formally typeset
Open AccessJournal ArticleDOI

An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks.

Reads0
Chats0
TLDR
The results show that the anonymization algorithm guarantees safety features for the considered IoT system applied in context of the healthcare communication systems and includes a secure encryption process that enables health data anonymity.
Abstract
In the age of the Internet of Things, connected devices are changing the delivery system in the healthcare communication environment. With the integration of IoT in healthcare, there is a huge potential for improvement of the quality, safety, and efficiency of health care in addition to promising technological, economical, and social prospects. Nevertheless, this integration comes with security risks such as data breach that might be caused by credential-stealing malware. In addition, the patient valuable data can be disclosed when the perspective devices are compromised since they are connected to the internet. Hence, security has become an essential part of today’s computing world regarding the ubiquitous nature of the IoT entities in general and IoT-based healthcare in particular. In this paper, research on the algorithm for anonymizing sensitive information about health data set exchanged in the IoT environment using a wireless communication system has been presented. To preserve the security and privacy, during the data session from the users interacting online, the algorithm defines records that cannot be revealed by providing protection to user’s privacy. Moreover, the proposed algorithm includes a secure encryption process that enables health data anonymity. Furthermore, we have provided an analysis using mathematical functions to valid the algorithm’s anonymity function. The results show that the anonymization algorithm guarantees safety features for the considered IoT system applied in context of the healthcare communication systems.

read more

Citations
More filters
Journal ArticleDOI

Machine Learning and Deep Learning Approaches for Brain Disease Diagnosis: Principles and Recent Advances

TL;DR: This study aims at finding the most accurate technique for detecting different brain diseases which can be employed for future betterment through a review on recent machine learning and deep learning approaches in detecting four brain diseases such as Alzheimer's disease, brain tumor, epilepsy, and Parkinson's disease.
Journal ArticleDOI

Blockchain With IoT and AI: A Review of Agriculture and Healthcare

TL;DR: The role of blockchain with IoT and AI in agriculture and healthcare systems in light of the literature review is studied to study the contribution of blockchain application, particularly targeting AI and IoT in Agriculture and healthcare sectors.
Journal ArticleDOI

Enabling Medicine Reuse Using a Digital Time Temperature Humidity Sensor in an Internet of Pharmaceutical Things Concept

TL;DR: The design of a novel digital time temperature and humidity indicator based on an Internet of Pharmaceutical Things concept is proposed to facilitate the validation, and a prototype is presented using smart sensors with cloud connectivity acting as the key technology for verifying and enabling the reuse of returned medicines.
Journal ArticleDOI

An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications.

TL;DR: In this article, a new deep learning model (CNN-DMA) is proposed to detect malware attacks based on a classifier-Convolution Neural Network (CNN), which uses three layers, i.e., Dense, Dropout, and Flatten.
Journal ArticleDOI

Current Research Trends in IoT Security: A Systematic Mapping Study

TL;DR: In this paper, the authors conducted a systematic mapping study of the literature to identify evolving trends in IoT security and determine research subjects, and additionally performed structural topic modeling to identify current research topics and the most promising ones via topic trend estimation.
References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

TL;DR: A novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers are proposed and a high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE.
Journal ArticleDOI

Big data analytics in logistics and supply chain management: Certain investigations for research and applications

TL;DR: In this article, the authors classify the literature on the application of big data business analytics (BDBA) on logistics and supply chain management (LSCM) based on the nature of analytics (descriptive, predictive, prescriptive) and the focus of the LSCM (strategy and operations).
Proceedings ArticleDOI

Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems

TL;DR: Six principles for guiding system design are developed, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and locality, anonymity and pseudonymity, security, and access and recourse.
Journal ArticleDOI

A Decentralized Privacy-Preserving Healthcare Blockchain for IoT

TL;DR: This work proposes a novel framework of modified blockchain models suitable for IoT devices that rely on their distributed nature and other additional privacy and security properties of the network that make IoT application data and transactions more secure and anonymous over a blockchain-based network.
Trending Questions (1)
What are the key security threats to medical IoT sensor networks?

The paper does not explicitly mention the key security threats to medical IoT sensor networks.