Data Security in Healthcare Using Iot
Data Security in Healthcare Using Iot
Dr. Radhamani.A. S,
M.E, Ph. D, Assistant Professor, Department of ECE,
Amrita College of engineering & technology, nagercoil
Mr.V.Ramanathan,
M.E, Assistant Professor, Department of ECE,
Amrita College of engineering & technology, nagercoil
Abstract: While the Internet of Things (IoT) has been With the rapid advancement of technology, the Internet of
instrumental in healthcare data transmission, it also Things (IoT) has become a common and efficient method to
presents vulnerabilities and security risks to patients’ store information securely in recent times. IoT is the
personalized health information for remote medical practice of connecting devices via the Internet, ranging from
treatment. Currently most published security solutions cell phones, electronic devices, wearable devices, etc. An
available for healthcare data don't seem to be focused on IoT network system consists of the following components:
data flow all the way from IoT sensor devices placed on sensor devices, connectivity, data processing, and user
a patient’s body through network routers to doctor’s interface. First, healthcare data e.g. heart rate, blood sugar,
offices. In this project, the IoT network facilitates etc. is collected through sensor devices. It is then
healthcare data transmission for remote medical transmitted by using radio access points to the cloud
treatment, explored security risks related to unsecured network and then processed as designed for specific
data transmission, especially between IoT sensor devices application. Lastly, the user interface plays its part to make
and network routers, then proposed an encrypted the information useful to the end user.
security solution initiated at IoT sensor devices. Our The increasing benefits of data transmission using IoT has
proposed solution provides a cryptography algorithm prompted the healthcare sector to adapt to cloud networking
embedded into the sensor device such that packets and utilize it to make the process of healthcare more
generated with patient’s health data are encrypted right accessible and efficient. To design a smart healthcare
at the sensor device before being transmitted. The proof system in IoT environment that can monitor a patient’s
of concept has been verified employing a lab setup with basic health signs in secure manner. In this system, two
two level encryption at the IoT sensor level and two level sensors are used to capture the data from hospital
decryption at the receiving end at the doctor’s office. environment named heart beat sensor and body temperature
Test results are promising for an end to-end security sensor. The condition of the patients is conveyed via a
solution of healthcare data transmission in IoT. This portal to medical staff, where they can process and analyze
project also provides further research avenues on IoT the current situation of the patients.
sensor driven security.
II. EXISTING SYSTEM
Keywords: IoT, Sensor, Data Security and Network The present patient monitor systems in hospitals allow
Routers. continuous monitoring of patient vital signs, which require
the sensors to be hardwired to nearby, bedside monitors or
I. INTRODUCTION PCs, and essentially confine the patient to his hospital bed.
Health is characterized as a full state of physical, mental, Even after connecting these systems to a particular patient, a
and social well-being and not merely a lack of illness. paramedical assistant is needed to continuously monitor and
Health is a fundamental element of people’s need for a note down all the vital parameters of a given patient by
better life. Unfortunately, the global health problem has keeping track of all of his/her records manually. Adopting
created a dilemma because of certain factors, such as poor such a method is error prone and may lead to disaster in the
health services, the presence of large gaps between rural and case of a human error. In the existing system the patient
urban areas, physicians, and nurses unavailability during the health is continuously monitored by the Mobile multi
hardest time. patient monitoring system and the acquired data is
79
International Journal of Engineering Applied Sciences and Technology, 2022
Vol. 7, Issue 3, ISSN No. 2455-2143, Pages 79-82
Published Online Ju ly 2022 in IJEAST (http://www.ijeast.com)
80
International Journal of Engineering Applied Sciences and Technology, 2022
Vol. 7, Issue 3, ISSN No. 2455-2143, Pages 79-82
Published Online Ju ly 2022 in IJEAST (http://www.ijeast.com)
81
International Journal of Engineering Applied Sciences and Technology, 2022
Vol. 7, Issue 3, ISSN No. 2455-2143, Pages 79-82
Published Online Ju ly 2022 in IJEAST (http://www.ijeast.com)
[5]. S. M. Riazul Islam, Daehan Kwak, MD. [11]. Internet of Things - Architecture (IoT-A). FP7
HumaunKabir ,(2015) “The Internet of Things for European Project. Online at: http://www.iot-
Health Care: A Comprehensive Survey”, DOI a.eu/public.
10.1109/ACCESS.2015.2437951. [12]. M. Adnane, Z. Jiang, S. Choi, and H. Jang
[6]. Vandana Milind Rohokale, Neeli Rashmi Prasad, (2009)“Detecting specific health-related events using
Ramjee Prasad, “A Cooperative Internet of Things an integrated sensor system for vital sign
(IoT) for Rural Healthcare Monitoring and monitoringSensors”, 9(9):6897–6912.
Control”,978-1-4577-0787-2/11/ ©2011 IEEE. [13]. F. Alag¨oz, A. Calero Valdez, W. Wilkowska, M.
[7]. Alexandros Pantelopoulos, Nikolaos G. Bourbakis“A Ziefle, S. Dorner, and A. Holzinger. ,(2010)From
Survey on Wearable Sensor-Based Systems for cloud computing to mobile internet, from user focus
Health Monitoring and Prognosis”,Publisher: IEEE to culture and hedonism - the crucible of mobile
DOI: 10.1109/TSMCC.2009.2032660. health care and wellness applications. In ICPCA
[8]. A.K. Bourke, J.V. O’Brien, G.M. Lyons A.K. Bourke 2010 International Conference on Pervasive
et al.Gait& Posture, (2007)’’Evaluation of a Computer Applications, (pp. 1–9).
threshold-based tri-axial accelerometer fall detection [14]. J. Blum and E. Magill. M-psychiatry (2008): “Sensor
algorithm”, (pp.194–199). networks for psychiatric health monitoring”. In
[9]. Qiang Li, John A. Stankovic, Mark Hanson, Adam Proceedings of the 9th Annual Postgraduate
Barth, John Lach, (2009)“Accurate, Fast Fall Symposium on the Convergence of
Detection Using Gyroscopes and Accelerometer Telecommunications, Networking and Broadcasting,
Derived Posture Information”, DOI: 10.1109/ (pp. 33–37).
BSN.2009.46, Sixth International Workshop on [15]. N. Bressan, L. Bazzaco, N. Bui, P. Casari, L.
Wearable and Implantable Body Sensor Networks, Vangelista, and M. Zorzi (2010)“The Deployment of
BSN 2009, Berkeley, CA, USA, 3-5. a Smart Monitoring System Using Wireless Sensor
[10]. J. Chen, K. Kwong, D. Chang (2014)“Wearable and Actuator Networks”. In Proc. of IEEE
Sensors for Reliable Fall Detection”, Publisher: SmartGridComm, Gaithersburg, MD, USA.
IEEE, DOI: 10.1109/IEMBS.2005.1617246. 7. Li Da
Xu “A Survey Internet of Things in Industries”, IEEE
Transactions on Industrial Informatics, Vol. 10, No.4.
82