2022
DOI: 10.1155/2022/8457116
|View full text |Cite
|
Sign up to set email alerts
|

Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism

Abstract: Providing security to the healthcare data stored in an IoT-cloud environment is one of the most challenging and demanding tasks in recent days. Because the IoT-cloud framework is constructed with an enormous number of sensors that are used to generate a massive amount of data, however, it is more susceptible to vulnerabilities and attacks, which degrades the security level of the network by performing malicious activities. Hence, Artificial Intelligence (AI) technology is the most suitable option for healthcar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 37 publications
0
14
0
1
Order By: Relevance
“…SHA-1 is a relatively ambivalent algorithm that generates a 160-bit hash, while SHA-2 is more secure and generates a 256-bit hash. The most up-to-date member of the family, SHA-3, generates a hash value of 512 bits [186].…”
Section: Hashing (Integrity)mentioning
confidence: 99%
“…SHA-1 is a relatively ambivalent algorithm that generates a 160-bit hash, while SHA-2 is more secure and generates a 256-bit hash. The most up-to-date member of the family, SHA-3, generates a hash value of 512 bits [186].…”
Section: Hashing (Integrity)mentioning
confidence: 99%
“…IoT had already been implemented in various fields like industrial automation, agriculture, transportation, construction, supply chain, retail, smart home applications, smart cities, smart grids, and smart parking. Apart from all these fields, it can even be applied to healthcare to perform different tasks ranging from patient data collection to monitoring patients' health [ 56 , 57 ]. The survey done demonstrates that the existing IoT models work well for data gathering and object controlling/monitoring [ 32 , 58 , 59 ] and, therefore, IoT models can be implemented for health monitoring and reporting the patient condition to appropriate persons like doctors, guardians, medical centers, and to emergency crews [ 60 ].…”
Section: Background Studymentioning
confidence: 99%
“…However, there may be various security problems in the IoMT environment when dealing with sensitive medical information [ 4 , 5 ], such as the following: First, if malicious cyberattacks can take control of healthcare sensors attached to a patient’s body, this might not only result in inaccurate data collection but also put the patient’s health at risk. Second, malicious cyberattacks can expose sensitive patient data and medical information.…”
Section: Introductionmentioning
confidence: 99%