Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Healthcare Data Encryption Technique Using Hybrid Cellular Automata in IoT Networks

Published: 01 October 2022 Publication History

Abstract

In this article, we secure the healthcare data using low complexity hybrid cellular automata (CA) algorithm while enabling remote monitoring of patients using IoT (Internet of Things) network. Since IoT devices are limited to power and memory space, the traditional encryption and decryption algorithms, called as ciphers, cannot be executed owing to the inherent implementation complexities and power requirements. The results show that the encrypted data sequence passes the randomness tests as prescribed by the National Institute of Standards and Technology (NIST) and is suitable for cryptography. Comparison with the state-of-the-art methods proves the superiority of our proposed method in terms of run-time complexity. Using the proposed hybrid CA algorithm, we achieve an average execution time of 0.3892 seconds per kilobit (kb) of data.

References

[1]
Kumar, R., Khan, P., Kumar, S. (2019). A cellular automata-based healthcare data encryption technique for iot networks. In 2019 IEEE 16th India Council International Conference (INDICON) (pp. 1–4).
[2]
Al Ameen M, Liu J, and Kwak K Security and privacy issues in wireless sensor networks for healthcare applications Journal of Medical Systems 2012 36 1 93-101
[3]
Islam SR, Kwak D, Kabir MH, Hossain M, and Kwak K-S The internet of things for health care: A comprehensive survey IEEE Access 2015 3 678-708
[4]
Sharma PK, Chen M-Y, and Park JH A software defined fog node based distributed blockchain cloud architecture for IoT IEEE Access 2017 6 115-124
[5]
Meingast, M., Roosta, T., Sastry, S. (2006). Security and privacy issues with health care information technology. In 2006 International Conference of the IEEE Engineering in Medicine and Biology Society (pp. 5453–5458). IEEE.
[6]
Fuster-Sabater A and Caballero-Gil P On the use of cellular automata in symmetric cryptography Acta Applicandae Mathematica 2006 93 1–3 215-236
[7]
Díaz Len, R., Hernández Encinas, A., Hernández Encinas, L., Martín del Rey, Á., Rodríguez Sánchez, G., Visus Ruiz, I. (2003). Wolfram cellular auto mata and their cryptographic use as pseudorandom bit generators.
[8]
Roy S, Karjee J, Rawat U, Dey N, et al. Symmetric key encryption technique: A cellular automata based approach in wireless sensor networks Procedia Computer Science 2016 78 408-414
[9]
Roy, S., Nandi, S., Dansana, J., Pattnaik, P. K. (2014). Application of cellular automata in symmetric key cryptography. In 2014 International Conference on Communication and Signal Processing (pp. 572–576). IEEE.
[10]
Roy S, Rawat U, and Karjee J A lightweight cellular automata based encryption technique for IoT applications IEEE Access 2019 7 39782-39793
[11]
Fensli, R., Gunnarson, E., Hejlesen, O. (2004). A wireless ecg system for continuous event recording and communication to a clinical alarm station. In The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, vol. 1 (pp. 2208–2211). IEEE.
[12]
Ng H, Sim M, and Tan C Security issues of wireless sensor networks in healthcare applications BT Technology Journal 2006 24 2 138-144
[13]
Hodge JG Jr Health information privacy and public health The Journal of Law, Medicine & Ethics 2003 31 4 663-671
[14]
Shah, K. T. (2019). Privacy and security issues of wearables in healthcare. PhD thesis, Flinders University, College of Science and Engineering.
[15]
Alagar, V., Alsaig, A., Ormandjiva, O., Wan, K. (2018). Context-based security and privacy for healthcare IoT. In 2018 IEEE International Conference on Smart Internet of Things (SmartIoT) (pp. 122–128). IEEE.
[16]
Jangra, P., Gupta, M. (2018). A design of real-time multilayered smart healthcare monitoring framework using IoT. In 2018 International Conference on Intelligent and Advanced System (ICIAS) (pp. 1–5). IEEE.
[17]
Alaba FA, Othman M, Hashem IAT, and Alotaibi F Internet of things security: A survey Journal of Network and Computer Applications 2017 88 10-28
[18]
Conti, M., Dehghantanha, A., Franke, K., Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Elsevier.
[19]
Nandi S, Kar BK, and Chaudhuri PP Theory and applications of cellular automata in cryptography IEEE Transactions on Computers 1994 43 12 1346-1357
[20]
Sarkar P A brief history of cellular automata Acm Computing Surveys (csur) 2000 32 1 80-107
[21]
Wolfram, S. (1986). Theory and applications of cellular automata. World Scientific.
[22]
Das AK, Sanyal A, and Palchaudhuri P On characterization of cellular automata with matrix algebra Information Sciences 1992 61 3 251-277
[23]
Martin O, Odlyzko AM, and Wolfram S Algebraic properties of cellular automata Communications in Mathematical Physics 1984 93 2 219-258
[24]
Pries W, Thanailakis A, and Card HC Group properties of cellular automata and VLSI applications IEEE Transactions on Computers 1986 12 1013-1024
[25]
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., & Barker, E. (2001). A statistical test suite for random and pseudorandom number generators for cryptographic applications. Booz-allen and hamilton inc mclean va: Technical report.
[26]
Smid, E.B., Leigh, S., Levenson, M., Vangel, M., DavidBanks, A., JamesDray, S. (2001). A statistical test suite for random and pseudorandom number generators for cryptographic applications.
[27]
Das, D., Misra, R. (2011). Programmable cellular automata based efficient parallel AES encryption algorithm. arXiv preprint arXiv:1112.2021
[28]
Singh S, Maakar SK, and Kumar S A performance analysis of DES and RSA cryptography International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2013 2 3 418-423
[29]
Singh A, Marwaha M, Singh B, and Singh S Comparative study of DES, 3DES, AES and RSA International Journal of Computers & Technology 2013 9 3 1164-1170

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal  Volume 126, Issue 4
Oct 2022
869 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 October 2022
Accepted: 28 May 2022

Author Tags

  1. Cellular automata
  2. Encryption
  3. Healthcare
  4. IoT
  5. Security
  6. Privacy

Qualifiers

  • Research-article

Funding Sources

  • Science and Engineering Research Board (IN)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media