Hybrid Attribute Based Symmetric Encryption Algorithm for Enhanced Access Polices in Medical Wireless Sensor Networks

Authors

  • B. Naresh Kumar Research scholar, Department of CSE, koneru lakshmaiah Educational Foundation, Vaddeswaram, AP, India
  • M. Srinivas Professor, Department of CSE, koneru lakshmaiah Educational Foundation, Vaddeswaram, AP, India

Keywords:

MWSN, Encryption, Data Confidentiality, Integrity

Abstract

Medical wireless sensor network (MWSN) is a vital component of the Internet of Things (IoT). It enables the transmission of health data between smart devices and sensor nodes. The integration of this technology has many advantages, but it is also important to ensure that the confidentiality of the information is maintained. The paper presents a framework that aims to establish a secure mechanism for managing the massive amount of medical data collected by sensor nodes in the MWSN. It aims to establish communication channels between patients and doctors during emergencies and in normal situations. The framework proposes a method that uses attribute-based and symmetric encryption techniques to enhance the confidentiality and integrity of the data collected by sensor nodes in the MWSN. The system's efficiency was demonstrated through simulations. The research conducted by the team provides a framework that can be used to establish a secure mechanism for managing the data collected by sensor nodes in the MWSN. This technology could help improve the quality of healthcare services.

Downloads

Download data is not yet available.

References

Muhajjar, Raad A., Nahla A. Flayh, and Mishall Al-Zubaidie. "A perfect security key management method for hierarchical wireless sensor networks in medical environments." Electronics 12, no. 4 (2023): 1011.

Ifzarne, Samir, Imad Hafidi, and Nadia Idrissi. "A Novel Secure Data Aggregation Scheme Based on Semi-Homomorphic Encryption in WSNs." J. Commun. 16, no. 8 (2021): 323-330.

Mehmood, Gulzar, Muhammad Sohail Khan, Abdul Waheed, Mahdi Zareei, Muhammad Fayaz, Tariq Sadad, Nazri Kama, and Azri Azmi. "An efficient and secure session key management scheme in wireless sensor network." Complexity 2021 (2021): 1-10.

Nidhya, R., Manish Kumar, R. Maheswar, and D. Pavithra. "Security and privacy issues in smart healthcare system using internet of things." IoT‐Enabled Smart Healthcare Systems, Services and Applications (2022): 63-85.

Al-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs." Applied Sciences 10, no. 6 (2020): 2007.

Chiuchisan I, Dimian M. Internet of Things for e-Health: An approach to medical applications[C]//Computational Intelligence for Multimedia Understanding (IWCIM), 2015 International Workshop on. IEEE, 2015: 1-5.

Zheng X, Chen N, Chen Z, Rong C, Chen G, Guo W, Mobile Cloud based Framework for Remote-Resident Multimedia Discovery and Access, Journal of Internet Technology, 2014, 15(6), 1043-1050.

Whitmore A, Agarwal A, Da Xu L. The Internet of Things: A survey of topics and trends [J]. Information Systems Frontiers, 2015, 17(2): 261-274.

Yang Y. Attribute-based data retrieval with semantic keyword search for e-health cloud [J]. Journal of Cloud Computing, 2015, 4(1): 1.

J. Yang, J. Li, Y. Niu, ”A hybrid solution for privacy preserving medical data sharing in the cloud environment,” Future Generation Computer Systems. 2015, vol. 43-44, pp. 74-86.

A. Abbas, S. Khan, ”A review on the state-of-the-art privacy preserving approaches in e-health clouds,” IEEE Journal of Biomedical Health Informatics, 2014, vol. 18, pp. 1431-1441.

D. Singh, G. Tripathi, and A. J. Jara, ”A survey of Internet-of- Things: Future vision, architecture, challenges and services,” in Proc. IEEE World Forum on Internet of Things, 2014, pp. 287-292.

Bernabe J B, Ramos J L H, Gomez A F S. TACIoT: multidimensional trust-aware access control system for the Internet of Things[J]. Soft Computing, 2016, 20(5): 1763-1779.

Kore, Ashwini, and Shailaja Patil. "Cross layered cryptography based secure routing for IoT-enabled smart healthcare system." Wireless Networks (2022): 1-15.

Sharma, Nikhil, Ila Kaushik, Bharat Bhushan, Siddharth Gautam, and Aditya Khamparia. "Applicability of WSN and biometric models in the field of healthcare." In Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks, pp. 304-329. IGI Global, 2020.

Bae G, Shin K. An Efficient Hardware Implementation of Lightweight Block Cipher Algorithm CLEFIA for IoT Security Applications[J]. Journal of the Korea Institute of Information and Communication Engineering, 2016, 20(2): 351-358.

Khemissa H, Tandjaoui D. A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things[C]. International Conference on Next Generation Mobile Applications, Services and Technologies. 2015.

Yao X, Chen Z, Tian Y. A lightweight attribute-based encryption scheme for the Internet of Things[J]. Future Generation Computer Systems, 2015, 49(C):104-112.

D.X. Song, D.Wagner, A. Perrig, ”Practical techniques for searches on encrypted data”, in: IEEE Symposium on Security and Privacy, 2000, pp. 44-55.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, K. Fu, Plutus: Scalable secure file sharing on untrusted storage, in: Proceedings of the 2nd USENIX Conference on File and Storage Technologies, USENIX Association, Berkeley, CA, USA, 2003, pp. 29–42.

E.-j. Goh, H. Shacham, N. Modadugu, D. Boneh, Sirius: Securing remote untrusted storage, Network and distributed systems security, NDSS’03 (2003) 131—145.

J. Bethencourt, A. Sahai, B. Waters, Ciphertext-Policy Attribute-Based encryption, in: Proceedings of the IEEE Symposium on Security and Privacy, SP ’07, Washington, DC, USA, 2007, pp. 321–334.

B. W. John Bethencourt, Amit Sahai, Cp-abe library, Online at http://acsc.cs.utexas.edu/cpabe/.

Mahajan, R. ., Patil, P. R. ., Potgantwar, A. ., & Bhaladhare, P. R. . (2023). Novel Load Balancing Optimization Algorithm to Improve Quality-of-Service in Cloud Environment. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2), 57–64. https://doi.org/10.17762/ijritcc.v11i2.6110

Pérez, C., Pérez, L., González, A., Gonzalez, L., & Ólafur, S. Personalized Learning Paths in Engineering Education: A Machine Learning Perspective. Kuwait Journal of Machine Learning, 1(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/107

Kathole, A. B., Katti, J., Dhabliya, D., Deshpande, V., Rajawat, A. S., Goyal, S. B., . . . Suciu, G. (2022). Energy-aware UAV based on blockchain model using IoE application in 6G network-driven cybertwin. Energies, 15(21) doi:10.3390/en15218304

Downloads

Published

16.07.2023

How to Cite

Kumar, B. N. ., & Srinivas, M. . (2023). Hybrid Attribute Based Symmetric Encryption Algorithm for Enhanced Access Polices in Medical Wireless Sensor Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 958–964. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3350

Issue

Section

Research Article