0% found this document useful (0 votes)
0 views

Data Security in Healthcare Using Iot

The document discusses a proposed IoT-based security solution for healthcare data transmission, focusing on encrypting patient health information at the sensor device level to mitigate vulnerabilities during data transfer. The system employs a cryptographic algorithm to ensure secure communication from IoT sensors to healthcare providers, addressing existing security gaps in current monitoring systems. Test results indicate promising outcomes for end-to-end security in healthcare data transmission, with potential for further research in IoT sensor-driven security measures.

Uploaded by

lonelysb4mi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Data Security in Healthcare Using Iot

The document discusses a proposed IoT-based security solution for healthcare data transmission, focusing on encrypting patient health information at the sensor device level to mitigate vulnerabilities during data transfer. The system employs a cryptographic algorithm to ensure secure communication from IoT sensors to healthcare providers, addressing existing security gaps in current monitoring systems. Test results indicate promising outcomes for end-to-end security in healthcare data transmission, with potential for further research in IoT sensor-driven security measures.

Uploaded by

lonelysb4mi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Engineering Applied Sciences and Technology, 2022

Vol. 7, Issue 3, ISSN No. 2455-2143, Pages 79-82


Published Online Ju ly 2022 in IJEAST (http://www.ijeast.com)

DATA SECURITY IN HEALTHCARE USING IOT


Krithick J G, Nivedh T S, Siva Bharath S
(B.E Students, Department of ECE)
Amrita College of engineering & technology, nagercoil

Dr. Radhamani.A. S,
M.E, Ph. D, Assistant Professor, Department of ECE,
Amrita College of engineering & technology, nagercoil

Mr.V.Ramanathan,
M.E, Assistant Professor, Department of ECE,
Amrita College of engineering & technology, nagercoil

Abstract: While the Internet of Things (IoT) has been With the rapid advancement of technology, the Internet of
instrumental in healthcare data transmission, it also Things (IoT) has become a common and efficient method to
presents vulnerabilities and security risks to patients’ store information securely in recent times. IoT is the
personalized health information for remote medical practice of connecting devices via the Internet, ranging from
treatment. Currently most published security solutions cell phones, electronic devices, wearable devices, etc. An
available for healthcare data don't seem to be focused on IoT network system consists of the following components:
data flow all the way from IoT sensor devices placed on sensor devices, connectivity, data processing, and user
a patient’s body through network routers to doctor’s interface. First, healthcare data e.g. heart rate, blood sugar,
offices. In this project, the IoT network facilitates etc. is collected through sensor devices. It is then
healthcare data transmission for remote medical transmitted by using radio access points to the cloud
treatment, explored security risks related to unsecured network and then processed as designed for specific
data transmission, especially between IoT sensor devices application. Lastly, the user interface plays its part to make
and network routers, then proposed an encrypted the information useful to the end user.
security solution initiated at IoT sensor devices. Our The increasing benefits of data transmission using IoT has
proposed solution provides a cryptography algorithm prompted the healthcare sector to adapt to cloud networking
embedded into the sensor device such that packets and utilize it to make the process of healthcare more
generated with patient’s health data are encrypted right accessible and efficient. To design a smart healthcare
at the sensor device before being transmitted. The proof system in IoT environment that can monitor a patient’s
of concept has been verified employing a lab setup with basic health signs in secure manner. In this system, two
two level encryption at the IoT sensor level and two level sensors are used to capture the data from hospital
decryption at the receiving end at the doctor’s office. environment named heart beat sensor and body temperature
Test results are promising for an end to-end security sensor. The condition of the patients is conveyed via a
solution of healthcare data transmission in IoT. This portal to medical staff, where they can process and analyze
project also provides further research avenues on IoT the current situation of the patients.
sensor driven security.
II. EXISTING SYSTEM
Keywords: IoT, Sensor, Data Security and Network The present patient monitor systems in hospitals allow
Routers. continuous monitoring of patient vital signs, which require
the sensors to be hardwired to nearby, bedside monitors or
I. INTRODUCTION PCs, and essentially confine the patient to his hospital bed.
Health is characterized as a full state of physical, mental, Even after connecting these systems to a particular patient, a
and social well-being and not merely a lack of illness. paramedical assistant is needed to continuously monitor and
Health is a fundamental element of people’s need for a note down all the vital parameters of a given patient by
better life. Unfortunately, the global health problem has keeping track of all of his/her records manually. Adopting
created a dilemma because of certain factors, such as poor such a method is error prone and may lead to disaster in the
health services, the presence of large gaps between rural and case of a human error. In the existing system the patient
urban areas, physicians, and nurses unavailability during the health is continuously monitored by the Mobile multi
hardest time. patient monitoring system and the acquired data is

79
International Journal of Engineering Applied Sciences and Technology, 2022
Vol. 7, Issue 3, ISSN No. 2455-2143, Pages 79-82
Published Online Ju ly 2022 in IJEAST (http://www.ijeast.com)

transmitted to a centralized ARM server using Wireless IV. SYSTEM ARCHITECTURE


Sensor Networks. A ZigBee node is connected to every
patient monitor system that consumes very low power and is
extremely small in size. These are specifically designed for
low power consumption, with minimal circuit components
intended for small packet, long distance range applications
and typically consist of a low power processor with minimal
resources and interface capabilities. They also have a
conservative transceiver that is capable of transmitting 8
bytes of data at a time and has a moderate transmitting
range of about 130 m. Therefore, WPANs seem to be a
perfect fit for remote patient monitoring.

III. PROPOSED SYSTEM


Proposed system provides a cryptographic algorithm
embedded into the sensor device such that the packets
generated with patient’s health data are encrypted right at Fig.1. System Architecture
the sensor device before being transmitted. To explain the
cryptographic mechanism used in mathematical terms, we V. RESULT AND DISCUSSION
multiply the sensor-collected data in the form of an m by n The developed system was tested with various subjects of
matrix with a cryptographic key-code matrix to encode the different ages in different conditions. In the test cases, for
message in encrypted data. This encrypted information heartbeat and body temperature we manually calculated the
transmits securely from IoT sensor to the access point, from actual value and observed value from the developed system.
the access point to cloud, and then from cloud all the way to The sensors are wired which are used to collect data from
doctor’s office. At the doctor’s end terminal, the data gets the patient’s body and the environment by gathering
decrypted by multiplying with the inverse of the original physiological signs. The collected data are then processed
cryptographic key-code to decode patient data. The unique via an ESP32 module and send to the gateway server. For
advantage of our solution, as emphasized previously, is the web user interface, ASP is used for the graphical
ensuring an encrypted data flow all the way from IoT sensor interpretation, and display of collected results. ASP shows
devices placed on the patient’s body through network the current status and process of transactions. The HTTP
routers to doctor’s offices. Another notable advantage is the protocol provides easy connectivity for the correspondence
method of data encryption being used. Most existing between a Wi-Fi module and the web server. The HTML
solutions, as shown in Figure 2 below, encrypt the data by user interface is updated every 15 s, allowing patients to be
adding the message and the key that while being sent on air tracked in real-time. The main advantage of our proposed
makes it easy for hackers to manipulate and access the end-to-end IoT security control scheme is that its
secured data without investing a lot of time or knowledge. implementation is at the source and destination node level,
Our proposed solution, on the other hand, encodes the making it easy for implementation and has the advantage of
information by multiplying the message and key in such a avoiding extra delay at the middle hop nodes
manner that it is not easily identifiable by an outsider to the
system. As shown below, the output message is completely
different from the original input and key, making the
protocol very secure and safe from intruders. While our
solution takes care of security-related issues directly from
IoT sensor device level to doctor’s access routers, priority
routing of healthcare data packet is another key area under
investigation. It has been published as part of our separate
research and focuses on sensor driven solution to prioritize
healthcare data routing in congested IoT networks by adding
an identifier at the sensor level and prioritizing the data Fig.2. Prototype
based on the identifier.
After concluding the set-up of the system, the process is
initiated to ensure that the encryption-decryption algorithm
works as per stated. It has been tested with different

80
International Journal of Engineering Applied Sciences and Technology, 2022
Vol. 7, Issue 3, ISSN No. 2455-2143, Pages 79-82
Published Online Ju ly 2022 in IJEAST (http://www.ijeast.com)

examples to show how it successfully encrypts and decrypts VI. CONCLUSION


the data on the sender and receiver end, respectively. Security is a vital component in healthcare data transmission
in the IoT network due to the sensitivity and confidentiality
of patient’s information. However, certain parts of the data
transmission network such as IoT sensor devices on
patients’ bodies to routers are still unsecured, leaving room
for intruders to interfere and misuse the sensitive
information. We proposed a security solution with an
encryption mechanism embedded into the IoT sensor device
such that a patient’s health data packet will be encrypted
Fig.3. Encrypted Data right at the packet transmission initiation point. Our solution
attempts to tackle the security issues from the very base so
Generally, we evaluated our algorithm in terms of memory as to not leave any room for third parties preying on the
usage, processing time, key size, vulnerability to known data. By securing data from the sensor device to the cloud
attacks, communication overhead, energy consumption, using encryption. IoT network, it eliminates any chances of
flexibility of application to different IoT types, and cost. the data being deciphered before reaching the cloud.
Compared to existing security methods, our algorithm has Similarly, assuming the cloud is already secured with an
less consumption in energy, processing time and memory. existing security solution, the data is secured all the way
Here, we have tested the system with two different sets of until it reaches its destination such as the doctor’s office or
inputs to show how it is encrypted and transmitted over air. medical database and can only be decrypted if the receiver
end is aware of the key that was used to encrypt it initially.
Our test results are promising for an end-to-end security
solution of healthcare data transmission in IoT. This paper
also contributes by opening up further research avenues on
IoT sensor driven security.

VII. FUTURE WORK


Future work proposes a smart healthcare system in IoT
Fig. 4. Decrypted Data environment that can monitor a patient’s basic health signs
as well as the room condition where the patients are now in
As shown, this method effectively takes the unsecured data real-time. In this system, five sensors are used to capture the
and changes it to an unrecognizable format to be transmitted data from hospital environment named heart beat sensor,
via the IoT network to the receiver and then finally body temperature sensor, room temperature sensor, CO
deciphers it on the other end by those who are aware of the sensor, and CO2 sensor. Some more measures which are
system’s keys. One major advantage of this algorithm is that very significant to determine a patient’s condition like the
it does not make use of built-in keys. Had we made use of level of diabetes, respiration monitoring, etc. can be
built in keys, the system would be understandable by addressed as future work.
anyone who knows the protocol and would make it easier
for hackers to decrypt. By using self-created keys unique to VIII. REFERENCES
each patient, we are securing our system further from those [1]. Z. Zhiao, Chnaowei, and z.
preying on the data. Additionally, another advantage is that Nakdahira,(2013)“Healthcare application based on
our algorithm implements character by character encryption, Internet of Things,” in Proc. IEEE Int. Confe. on.
making it difficult for a man in the middle to decrypt it. Technolgy. Application (pp. 661 662).
Overall, the algorithm does a good job of identifying the [2]. Kortoom, ,Y. Kaiseer, N. Fittop, and D.
weak security points from the very start and implementing ramamoorthy, “Canny matters as construction brickss
techniques that are simple and yet very difficult to break by for application of Internet of Things,”IEEE Interne
hackers who are not aware of its functionalities. Last but not Networks and Comput., vol. 17.
the least, priority is also heavily related to security and that [3]. Z. Achmed and G. Miguel,(2010) “Assimilating
has been researched as part of our separate research that can Wirel-ess Sensing Nets with Cloud& Computing,”
be combined to provide a much more secure and efficient 2010 SixtthInnt. Confe. Mobi. Ad-hocc Sense. Netks,
system. (pp. 263–266).
[4]. D. InfanZnta and Hemalattha, “Augmenting
Authorisation Construction of Safekeeping with ZIG-
BEE using RFID,” Vol5, No.4.

81
International Journal of Engineering Applied Sciences and Technology, 2022
Vol. 7, Issue 3, ISSN No. 2455-2143, Pages 79-82
Published Online Ju ly 2022 in IJEAST (http://www.ijeast.com)

[5]. S. M. Riazul Islam, Daehan Kwak, MD. [11]. Internet of Things - Architecture (IoT-A). FP7
HumaunKabir ,(2015) “The Internet of Things for European Project. Online at: http://www.iot-
Health Care: A Comprehensive Survey”, DOI a.eu/public.
10.1109/ACCESS.2015.2437951. [12]. M. Adnane, Z. Jiang, S. Choi, and H. Jang
[6]. Vandana Milind Rohokale, Neeli Rashmi Prasad, (2009)“Detecting specific health-related events using
Ramjee Prasad, “A Cooperative Internet of Things an integrated sensor system for vital sign
(IoT) for Rural Healthcare Monitoring and monitoringSensors”, 9(9):6897–6912.
Control”,978-1-4577-0787-2/11/ ©2011 IEEE. [13]. F. Alag¨oz, A. Calero Valdez, W. Wilkowska, M.
[7]. Alexandros Pantelopoulos, Nikolaos G. Bourbakis“A Ziefle, S. Dorner, and A. Holzinger. ,(2010)From
Survey on Wearable Sensor-Based Systems for cloud computing to mobile internet, from user focus
Health Monitoring and Prognosis”,Publisher: IEEE to culture and hedonism - the crucible of mobile
DOI: 10.1109/TSMCC.2009.2032660. health care and wellness applications. In ICPCA
[8]. A.K. Bourke, J.V. O’Brien, G.M. Lyons A.K. Bourke 2010 International Conference on Pervasive
et al.Gait& Posture, (2007)’’Evaluation of a Computer Applications, (pp. 1–9).
threshold-based tri-axial accelerometer fall detection [14]. J. Blum and E. Magill. M-psychiatry (2008): “Sensor
algorithm”, (pp.194–199). networks for psychiatric health monitoring”. In
[9]. Qiang Li, John A. Stankovic, Mark Hanson, Adam Proceedings of the 9th Annual Postgraduate
Barth, John Lach, (2009)“Accurate, Fast Fall Symposium on the Convergence of
Detection Using Gyroscopes and Accelerometer Telecommunications, Networking and Broadcasting,
Derived Posture Information”, DOI: 10.1109/ (pp. 33–37).
BSN.2009.46, Sixth International Workshop on [15]. N. Bressan, L. Bazzaco, N. Bui, P. Casari, L.
Wearable and Implantable Body Sensor Networks, Vangelista, and M. Zorzi (2010)“The Deployment of
BSN 2009, Berkeley, CA, USA, 3-5. a Smart Monitoring System Using Wireless Sensor
[10]. J. Chen, K. Kwong, D. Chang (2014)“Wearable and Actuator Networks”. In Proc. of IEEE
Sensors for Reliable Fall Detection”, Publisher: SmartGridComm, Gaithersburg, MD, USA.
IEEE, DOI: 10.1109/IEMBS.2005.1617246. 7. Li Da
Xu “A Survey Internet of Things in Industries”, IEEE
Transactions on Industrial Informatics, Vol. 10, No.4.

82

You might also like