Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Secured remote health monitoring system

Wireless medical sensor network is used in healthcare applications that have the collections of biosensors connected to a human body or emergency care unit to monitor the patient's physiological vital status. The real-time medical data collected using wearable medical sensors are transmitted to a diagnostic centre. The data generated from the sensors are aggregated at this centre and transmitted further to the doctor's personal digital assistant for diagnosis. The unauthorised access of one's health data may lead to misuse and legal complications while unreliable data transmission or storage may lead to life threatening risk to patients. So, this Letter combines the symmetric algorithm and attribute-based encryption to secure the data transmission and access control system for medical sensor network. In this work, existing systems and their algorithm are compared for identifying the best performance. The work also shows the graphical comparison of encryption time, decryption time and total computation time of the existing and the proposed systems.

References

    1. 1)
    2. 2)
      • 17. Hohenberger, S., Waters, B.: ‘Attribute-based encryption with fast decryption’. Public-Key Cryptography – PKC, 2013 (LNCS, 7778), pp. 162179.
    3. 3)
      • 16. Qiao, Z., Liang, S., Davis, S., et al: ‘Survey of attribute based encryption’, IEEE Explore, 2014, 00, pp. 16, doi. 10.1109/SNPD.2014.6888687.
    4. 4)
      • 5. He, D., Chan, S., Tang, S.: ‘A novel and lightweight system to secure wireless medical sensor networks’, IEEE J. Biomed. Health Inf., 2014, 18, (1), pp. 2332.
    5. 5)
    6. 6)
    7. 7)
      • 13. Masram, R., Shahare, V., Abraham, J., et al: ‘Analysis and comparison of symmetric key cryptographic algorithms based on various file features’, Int. J. Netw. Secur. Appl. (IJNSA), 2014, 6, (4), pp. 4352.
    8. 8)
    9. 9)
      • 10. Hu, C., Li, H., Cheng, H., et al: ‘Secure and efficient data communication protocol for wireless body area networks’, IEEE Trans. Multi-Scale Comput. Syst., 2015, 11, (14), pp. 111.
    10. 10)
    11. 11)
      • 12. Aggarwal, K., Saini, J.K., Verma, H.K.: ‘Performance evaluation of RC6, blowfish, DES, IDEA, CAST-128 block ciphers’, Int. J. Comput. Appl., 2013, 68, (25), pp. 1016.
    12. 12)
    13. 13)
    14. 14)
    15. 15)
      • 15. Schneier, B.: ‘Applied cryptography’ (John Wiley & Sons, 1996, 2nd edn.).
    16. 16)
    17. 17)
      • 11. Feng, D.: ‘Biomedical information technology’ (Academic Press, 2007, 1st edn.).
http://iet.metastore.ingenta.com/content/journals/10.1049/htl.2017.0033
Loading

Related content

content/journals/10.1049/htl.2017.0033
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address