An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications
The Internet of Things (IoT) is a network that connects a large number of items. Each thing uses sensors to create and gather data from its surroundings and then sends to other objects or a central database through a channel. Keeping and transforming this created data is one of the most difficult ta...
Gespeichert in:
Veröffentlicht in: | Mathematical problems in engineering 2022-09, Vol.2022, p.1-11 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 11 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Mathematical problems in engineering |
container_volume | 2022 |
creator | Al Shahrani, Ali M. Rizwan, Ali Sánchez-Chero, Manuel Rosas-Prado, Carmen Elvira Salazar, Elmer Bagner Awad, Nancy Awadallah |
description | The Internet of Things (IoT) is a network that connects a large number of items. Each thing uses sensors to create and gather data from its surroundings and then sends to other objects or a central database through a channel. Keeping and transforming this created data is one of the most difficult tasks in IoT today, and it is one of the top worries of all enterprises that deploy IoT technology. Sensing equipment together with communication, storing, and display devices get benefit from technological advancements in the healthcare sector. Moreover, medical parameters and postoperative days require close observation. Therefore, the most cutting-edge approach to healthcare communication is adopted, which makes use of the Internet of Things (IoT). We can use the Internet of Things to speed changes in the healthcare environment, such as enhancing patient involvement and outcomes and shifting healthcare from reactive to proactive accessibility. Nonetheless, the growth of IoT exposes healthcare practitioners and their patients to new vulnerabilities, risks, and security concerns. However, there is currently a scarcity of research on how to improve IoT security in healthcare. Existing studies tend to concentrate only on the installation of IoT peripherals in a healthcare setting and to include a secure application solution. Because healthcare data and information are extremely sensitive, it is critical to have a secure health IoT application in place. As the IoT gets more widely used in healthcare, there will inevitably be more instances of sensitive patient information being made public. This paper proposes an optimized hashing algorithm with digital certificates to enhance the security. Initially, the health data are collected and preprocessed using normalization. The data are then stored in the IoT device. Here, the digital certificates are used for authentication purpose. The proposed discrete decision tree hashing algorithm (DDTHA) with ant colony optimization (ACO) hashes the unsigned digital certificates. The blowfish algorithm is used for encryption, and the signed digital certificate is obtained which is used for authentication purpose. The performance of the proposed system is evaluated and compared with conventional methodologies to prove the efficiency of the system. |
doi_str_mv | 10.1155/2022/6802967 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2722971989</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2722971989</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-2ef6cfd0eb20c2eead412264e717dab6b299e644c821a6b7acd8661f34e81fa3</originalsourceid><addsrcrecordid>eNp90EFLwzAUwPEgCs7pzQ8Q8KJoXfLaJu1xjukGgx3swYuUNH11GVtakwyZn97Oefb03uHHe_An5JqzR87TdAQMYCQyBrmQJ2TAUxFHKU_kab8zSCIO8ds5ufB-zRjwlGcD8j62dG4DOouBtg0tVsZ-eHo7b4u76El5rOmyC2ZrvlUwraWhpVO7UlYjfUW9cybsqbF0hmoTVlo5pOOu2xj9q_0lOWvUxuPV3xyS4nlaTGbRYvkyn4wXkY5jGSLARuimZlgB04Co6oQDiAQll7WqRAV5jiJJdAZciUoqXWdC8CZOMOONiofk5ni2c-3nDn0o1-3O2f5jCRIglzzP8l49HJV2rfcOm7JzZqvcvuSsPPQrD_3Kv349vz_yvkitvsz_-gdeSG9t</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2722971989</pqid></control><display><type>article</type><title>An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications</title><source>Wiley Online Library Open Access</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Al Shahrani, Ali M. ; Rizwan, Ali ; Sánchez-Chero, Manuel ; Rosas-Prado, Carmen Elvira ; Salazar, Elmer Bagner ; Awad, Nancy Awadallah</creator><contributor>Kaur, Amandeep</contributor><creatorcontrib>Al Shahrani, Ali M. ; Rizwan, Ali ; Sánchez-Chero, Manuel ; Rosas-Prado, Carmen Elvira ; Salazar, Elmer Bagner ; Awad, Nancy Awadallah ; Kaur, Amandeep</creatorcontrib><description>The Internet of Things (IoT) is a network that connects a large number of items. Each thing uses sensors to create and gather data from its surroundings and then sends to other objects or a central database through a channel. Keeping and transforming this created data is one of the most difficult tasks in IoT today, and it is one of the top worries of all enterprises that deploy IoT technology. Sensing equipment together with communication, storing, and display devices get benefit from technological advancements in the healthcare sector. Moreover, medical parameters and postoperative days require close observation. Therefore, the most cutting-edge approach to healthcare communication is adopted, which makes use of the Internet of Things (IoT). We can use the Internet of Things to speed changes in the healthcare environment, such as enhancing patient involvement and outcomes and shifting healthcare from reactive to proactive accessibility. Nonetheless, the growth of IoT exposes healthcare practitioners and their patients to new vulnerabilities, risks, and security concerns. However, there is currently a scarcity of research on how to improve IoT security in healthcare. Existing studies tend to concentrate only on the installation of IoT peripherals in a healthcare setting and to include a secure application solution. Because healthcare data and information are extremely sensitive, it is critical to have a secure health IoT application in place. As the IoT gets more widely used in healthcare, there will inevitably be more instances of sensitive patient information being made public. This paper proposes an optimized hashing algorithm with digital certificates to enhance the security. Initially, the health data are collected and preprocessed using normalization. The data are then stored in the IoT device. Here, the digital certificates are used for authentication purpose. The proposed discrete decision tree hashing algorithm (DDTHA) with ant colony optimization (ACO) hashes the unsigned digital certificates. The blowfish algorithm is used for encryption, and the signed digital certificate is obtained which is used for authentication purpose. The performance of the proposed system is evaluated and compared with conventional methodologies to prove the efficiency of the system.</description><identifier>ISSN: 1024-123X</identifier><identifier>EISSN: 1563-5147</identifier><identifier>DOI: 10.1155/2022/6802967</identifier><language>eng</language><publisher>New York: Hindawi</publisher><subject>Access control ; Algorithms ; Ant colony optimization ; Authentication ; Blockchain ; Certificates ; Communications equipment ; Decision trees ; Digital certificates ; Display devices ; Electronic health records ; Encryption ; Hash based algorithms ; Health care ; Health care industry ; Information systems ; Internet of medical things ; Internet of Things ; Mathematical problems ; Privacy ; Public Key Infrastructure ; Security ; Sensors</subject><ispartof>Mathematical problems in engineering, 2022-09, Vol.2022, p.1-11</ispartof><rights>Copyright © 2022 Ali M. Al Shahrani et al.</rights><rights>Copyright © 2022 Ali M. Al Shahrani et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-2ef6cfd0eb20c2eead412264e717dab6b299e644c821a6b7acd8661f34e81fa3</citedby><cites>FETCH-LOGICAL-c337t-2ef6cfd0eb20c2eead412264e717dab6b299e644c821a6b7acd8661f34e81fa3</cites><orcidid>0000-0002-2348-8577 ; 0000-0003-1646-3037</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Kaur, Amandeep</contributor><creatorcontrib>Al Shahrani, Ali M.</creatorcontrib><creatorcontrib>Rizwan, Ali</creatorcontrib><creatorcontrib>Sánchez-Chero, Manuel</creatorcontrib><creatorcontrib>Rosas-Prado, Carmen Elvira</creatorcontrib><creatorcontrib>Salazar, Elmer Bagner</creatorcontrib><creatorcontrib>Awad, Nancy Awadallah</creatorcontrib><title>An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications</title><title>Mathematical problems in engineering</title><description>The Internet of Things (IoT) is a network that connects a large number of items. Each thing uses sensors to create and gather data from its surroundings and then sends to other objects or a central database through a channel. Keeping and transforming this created data is one of the most difficult tasks in IoT today, and it is one of the top worries of all enterprises that deploy IoT technology. Sensing equipment together with communication, storing, and display devices get benefit from technological advancements in the healthcare sector. Moreover, medical parameters and postoperative days require close observation. Therefore, the most cutting-edge approach to healthcare communication is adopted, which makes use of the Internet of Things (IoT). We can use the Internet of Things to speed changes in the healthcare environment, such as enhancing patient involvement and outcomes and shifting healthcare from reactive to proactive accessibility. Nonetheless, the growth of IoT exposes healthcare practitioners and their patients to new vulnerabilities, risks, and security concerns. However, there is currently a scarcity of research on how to improve IoT security in healthcare. Existing studies tend to concentrate only on the installation of IoT peripherals in a healthcare setting and to include a secure application solution. Because healthcare data and information are extremely sensitive, it is critical to have a secure health IoT application in place. As the IoT gets more widely used in healthcare, there will inevitably be more instances of sensitive patient information being made public. This paper proposes an optimized hashing algorithm with digital certificates to enhance the security. Initially, the health data are collected and preprocessed using normalization. The data are then stored in the IoT device. Here, the digital certificates are used for authentication purpose. The proposed discrete decision tree hashing algorithm (DDTHA) with ant colony optimization (ACO) hashes the unsigned digital certificates. The blowfish algorithm is used for encryption, and the signed digital certificate is obtained which is used for authentication purpose. The performance of the proposed system is evaluated and compared with conventional methodologies to prove the efficiency of the system.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Ant colony optimization</subject><subject>Authentication</subject><subject>Blockchain</subject><subject>Certificates</subject><subject>Communications equipment</subject><subject>Decision trees</subject><subject>Digital certificates</subject><subject>Display devices</subject><subject>Electronic health records</subject><subject>Encryption</subject><subject>Hash based algorithms</subject><subject>Health care</subject><subject>Health care industry</subject><subject>Information systems</subject><subject>Internet of medical things</subject><subject>Internet of Things</subject><subject>Mathematical problems</subject><subject>Privacy</subject><subject>Public Key Infrastructure</subject><subject>Security</subject><subject>Sensors</subject><issn>1024-123X</issn><issn>1563-5147</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp90EFLwzAUwPEgCs7pzQ8Q8KJoXfLaJu1xjukGgx3swYuUNH11GVtakwyZn97Oefb03uHHe_An5JqzR87TdAQMYCQyBrmQJ2TAUxFHKU_kab8zSCIO8ds5ufB-zRjwlGcD8j62dG4DOouBtg0tVsZ-eHo7b4u76El5rOmyC2ZrvlUwraWhpVO7UlYjfUW9cybsqbF0hmoTVlo5pOOu2xj9q_0lOWvUxuPV3xyS4nlaTGbRYvkyn4wXkY5jGSLARuimZlgB04Co6oQDiAQll7WqRAV5jiJJdAZciUoqXWdC8CZOMOONiofk5ni2c-3nDn0o1-3O2f5jCRIglzzP8l49HJV2rfcOm7JzZqvcvuSsPPQrD_3Kv349vz_yvkitvsz_-gdeSG9t</recordid><startdate>20220930</startdate><enddate>20220930</enddate><creator>Al Shahrani, Ali M.</creator><creator>Rizwan, Ali</creator><creator>Sánchez-Chero, Manuel</creator><creator>Rosas-Prado, Carmen Elvira</creator><creator>Salazar, Elmer Bagner</creator><creator>Awad, Nancy Awadallah</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>COVID</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PIMPY</scope><scope>PKEHL</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><orcidid>https://orcid.org/0000-0002-2348-8577</orcidid><orcidid>https://orcid.org/0000-0003-1646-3037</orcidid></search><sort><creationdate>20220930</creationdate><title>An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications</title><author>Al Shahrani, Ali M. ; Rizwan, Ali ; Sánchez-Chero, Manuel ; Rosas-Prado, Carmen Elvira ; Salazar, Elmer Bagner ; Awad, Nancy Awadallah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-2ef6cfd0eb20c2eead412264e717dab6b299e644c821a6b7acd8661f34e81fa3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Ant colony optimization</topic><topic>Authentication</topic><topic>Blockchain</topic><topic>Certificates</topic><topic>Communications equipment</topic><topic>Decision trees</topic><topic>Digital certificates</topic><topic>Display devices</topic><topic>Electronic health records</topic><topic>Encryption</topic><topic>Hash based algorithms</topic><topic>Health care</topic><topic>Health care industry</topic><topic>Information systems</topic><topic>Internet of medical things</topic><topic>Internet of Things</topic><topic>Mathematical problems</topic><topic>Privacy</topic><topic>Public Key Infrastructure</topic><topic>Security</topic><topic>Sensors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al Shahrani, Ali M.</creatorcontrib><creatorcontrib>Rizwan, Ali</creatorcontrib><creatorcontrib>Sánchez-Chero, Manuel</creatorcontrib><creatorcontrib>Rosas-Prado, Carmen Elvira</creatorcontrib><creatorcontrib>Salazar, Elmer Bagner</creatorcontrib><creatorcontrib>Awad, Nancy Awadallah</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Coronavirus Research Database</collection><collection>Middle East & Africa Database</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied & Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>Mathematical problems in engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al Shahrani, Ali M.</au><au>Rizwan, Ali</au><au>Sánchez-Chero, Manuel</au><au>Rosas-Prado, Carmen Elvira</au><au>Salazar, Elmer Bagner</au><au>Awad, Nancy Awadallah</au><au>Kaur, Amandeep</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications</atitle><jtitle>Mathematical problems in engineering</jtitle><date>2022-09-30</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>11</epage><pages>1-11</pages><issn>1024-123X</issn><eissn>1563-5147</eissn><abstract>The Internet of Things (IoT) is a network that connects a large number of items. Each thing uses sensors to create and gather data from its surroundings and then sends to other objects or a central database through a channel. Keeping and transforming this created data is one of the most difficult tasks in IoT today, and it is one of the top worries of all enterprises that deploy IoT technology. Sensing equipment together with communication, storing, and display devices get benefit from technological advancements in the healthcare sector. Moreover, medical parameters and postoperative days require close observation. Therefore, the most cutting-edge approach to healthcare communication is adopted, which makes use of the Internet of Things (IoT). We can use the Internet of Things to speed changes in the healthcare environment, such as enhancing patient involvement and outcomes and shifting healthcare from reactive to proactive accessibility. Nonetheless, the growth of IoT exposes healthcare practitioners and their patients to new vulnerabilities, risks, and security concerns. However, there is currently a scarcity of research on how to improve IoT security in healthcare. Existing studies tend to concentrate only on the installation of IoT peripherals in a healthcare setting and to include a secure application solution. Because healthcare data and information are extremely sensitive, it is critical to have a secure health IoT application in place. As the IoT gets more widely used in healthcare, there will inevitably be more instances of sensitive patient information being made public. This paper proposes an optimized hashing algorithm with digital certificates to enhance the security. Initially, the health data are collected and preprocessed using normalization. The data are then stored in the IoT device. Here, the digital certificates are used for authentication purpose. The proposed discrete decision tree hashing algorithm (DDTHA) with ant colony optimization (ACO) hashes the unsigned digital certificates. The blowfish algorithm is used for encryption, and the signed digital certificate is obtained which is used for authentication purpose. The performance of the proposed system is evaluated and compared with conventional methodologies to prove the efficiency of the system.</abstract><cop>New York</cop><pub>Hindawi</pub><doi>10.1155/2022/6802967</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-2348-8577</orcidid><orcidid>https://orcid.org/0000-0003-1646-3037</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1024-123X |
ispartof | Mathematical problems in engineering, 2022-09, Vol.2022, p.1-11 |
issn | 1024-123X 1563-5147 |
language | eng |
recordid | cdi_proquest_journals_2722971989 |
source | Wiley Online Library Open Access; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection |
subjects | Access control Algorithms Ant colony optimization Authentication Blockchain Certificates Communications equipment Decision trees Digital certificates Display devices Electronic health records Encryption Hash based algorithms Health care Health care industry Information systems Internet of medical things Internet of Things Mathematical problems Privacy Public Key Infrastructure Security Sensors |
title | An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T19%3A26%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Internet%20of%20Things%20(IoT)-Based%20Optimization%20to%20Enhance%20Security%20in%20Healthcare%20Applications&rft.jtitle=Mathematical%20problems%20in%20engineering&rft.au=Al%20Shahrani,%20Ali%20M.&rft.date=2022-09-30&rft.volume=2022&rft.spage=1&rft.epage=11&rft.pages=1-11&rft.issn=1024-123X&rft.eissn=1563-5147&rft_id=info:doi/10.1155/2022/6802967&rft_dat=%3Cproquest_cross%3E2722971989%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2722971989&rft_id=info:pmid/&rfr_iscdi=true |