An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications

The Internet of Things (IoT) is a network that connects a large number of items. Each thing uses sensors to create and gather data from its surroundings and then sends to other objects or a central database through a channel. Keeping and transforming this created data is one of the most difficult ta...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Mathematical problems in engineering 2022-09, Vol.2022, p.1-11
Hauptverfasser: Al Shahrani, Ali M., Rizwan, Ali, Sánchez-Chero, Manuel, Rosas-Prado, Carmen Elvira, Salazar, Elmer Bagner, Awad, Nancy Awadallah
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 11
container_issue
container_start_page 1
container_title Mathematical problems in engineering
container_volume 2022
creator Al Shahrani, Ali M.
Rizwan, Ali
Sánchez-Chero, Manuel
Rosas-Prado, Carmen Elvira
Salazar, Elmer Bagner
Awad, Nancy Awadallah
description The Internet of Things (IoT) is a network that connects a large number of items. Each thing uses sensors to create and gather data from its surroundings and then sends to other objects or a central database through a channel. Keeping and transforming this created data is one of the most difficult tasks in IoT today, and it is one of the top worries of all enterprises that deploy IoT technology. Sensing equipment together with communication, storing, and display devices get benefit from technological advancements in the healthcare sector. Moreover, medical parameters and postoperative days require close observation. Therefore, the most cutting-edge approach to healthcare communication is adopted, which makes use of the Internet of Things (IoT). We can use the Internet of Things to speed changes in the healthcare environment, such as enhancing patient involvement and outcomes and shifting healthcare from reactive to proactive accessibility. Nonetheless, the growth of IoT exposes healthcare practitioners and their patients to new vulnerabilities, risks, and security concerns. However, there is currently a scarcity of research on how to improve IoT security in healthcare. Existing studies tend to concentrate only on the installation of IoT peripherals in a healthcare setting and to include a secure application solution. Because healthcare data and information are extremely sensitive, it is critical to have a secure health IoT application in place. As the IoT gets more widely used in healthcare, there will inevitably be more instances of sensitive patient information being made public. This paper proposes an optimized hashing algorithm with digital certificates to enhance the security. Initially, the health data are collected and preprocessed using normalization. The data are then stored in the IoT device. Here, the digital certificates are used for authentication purpose. The proposed discrete decision tree hashing algorithm (DDTHA) with ant colony optimization (ACO) hashes the unsigned digital certificates. The blowfish algorithm is used for encryption, and the signed digital certificate is obtained which is used for authentication purpose. The performance of the proposed system is evaluated and compared with conventional methodologies to prove the efficiency of the system.
doi_str_mv 10.1155/2022/6802967
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2722971989</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2722971989</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-2ef6cfd0eb20c2eead412264e717dab6b299e644c821a6b7acd8661f34e81fa3</originalsourceid><addsrcrecordid>eNp90EFLwzAUwPEgCs7pzQ8Q8KJoXfLaJu1xjukGgx3swYuUNH11GVtakwyZn97Oefb03uHHe_An5JqzR87TdAQMYCQyBrmQJ2TAUxFHKU_kab8zSCIO8ds5ufB-zRjwlGcD8j62dG4DOouBtg0tVsZ-eHo7b4u76El5rOmyC2ZrvlUwraWhpVO7UlYjfUW9cybsqbF0hmoTVlo5pOOu2xj9q_0lOWvUxuPV3xyS4nlaTGbRYvkyn4wXkY5jGSLARuimZlgB04Co6oQDiAQll7WqRAV5jiJJdAZciUoqXWdC8CZOMOONiofk5ni2c-3nDn0o1-3O2f5jCRIglzzP8l49HJV2rfcOm7JzZqvcvuSsPPQrD_3Kv349vz_yvkitvsz_-gdeSG9t</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2722971989</pqid></control><display><type>article</type><title>An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications</title><source>Wiley Online Library Open Access</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Al Shahrani, Ali M. ; Rizwan, Ali ; Sánchez-Chero, Manuel ; Rosas-Prado, Carmen Elvira ; Salazar, Elmer Bagner ; Awad, Nancy Awadallah</creator><contributor>Kaur, Amandeep</contributor><creatorcontrib>Al Shahrani, Ali M. ; Rizwan, Ali ; Sánchez-Chero, Manuel ; Rosas-Prado, Carmen Elvira ; Salazar, Elmer Bagner ; Awad, Nancy Awadallah ; Kaur, Amandeep</creatorcontrib><description>The Internet of Things (IoT) is a network that connects a large number of items. Each thing uses sensors to create and gather data from its surroundings and then sends to other objects or a central database through a channel. Keeping and transforming this created data is one of the most difficult tasks in IoT today, and it is one of the top worries of all enterprises that deploy IoT technology. Sensing equipment together with communication, storing, and display devices get benefit from technological advancements in the healthcare sector. Moreover, medical parameters and postoperative days require close observation. Therefore, the most cutting-edge approach to healthcare communication is adopted, which makes use of the Internet of Things (IoT). We can use the Internet of Things to speed changes in the healthcare environment, such as enhancing patient involvement and outcomes and shifting healthcare from reactive to proactive accessibility. Nonetheless, the growth of IoT exposes healthcare practitioners and their patients to new vulnerabilities, risks, and security concerns. However, there is currently a scarcity of research on how to improve IoT security in healthcare. Existing studies tend to concentrate only on the installation of IoT peripherals in a healthcare setting and to include a secure application solution. Because healthcare data and information are extremely sensitive, it is critical to have a secure health IoT application in place. As the IoT gets more widely used in healthcare, there will inevitably be more instances of sensitive patient information being made public. This paper proposes an optimized hashing algorithm with digital certificates to enhance the security. Initially, the health data are collected and preprocessed using normalization. The data are then stored in the IoT device. Here, the digital certificates are used for authentication purpose. The proposed discrete decision tree hashing algorithm (DDTHA) with ant colony optimization (ACO) hashes the unsigned digital certificates. The blowfish algorithm is used for encryption, and the signed digital certificate is obtained which is used for authentication purpose. The performance of the proposed system is evaluated and compared with conventional methodologies to prove the efficiency of the system.</description><identifier>ISSN: 1024-123X</identifier><identifier>EISSN: 1563-5147</identifier><identifier>DOI: 10.1155/2022/6802967</identifier><language>eng</language><publisher>New York: Hindawi</publisher><subject>Access control ; Algorithms ; Ant colony optimization ; Authentication ; Blockchain ; Certificates ; Communications equipment ; Decision trees ; Digital certificates ; Display devices ; Electronic health records ; Encryption ; Hash based algorithms ; Health care ; Health care industry ; Information systems ; Internet of medical things ; Internet of Things ; Mathematical problems ; Privacy ; Public Key Infrastructure ; Security ; Sensors</subject><ispartof>Mathematical problems in engineering, 2022-09, Vol.2022, p.1-11</ispartof><rights>Copyright © 2022 Ali M. Al Shahrani et al.</rights><rights>Copyright © 2022 Ali M. Al Shahrani et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-2ef6cfd0eb20c2eead412264e717dab6b299e644c821a6b7acd8661f34e81fa3</citedby><cites>FETCH-LOGICAL-c337t-2ef6cfd0eb20c2eead412264e717dab6b299e644c821a6b7acd8661f34e81fa3</cites><orcidid>0000-0002-2348-8577 ; 0000-0003-1646-3037</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Kaur, Amandeep</contributor><creatorcontrib>Al Shahrani, Ali M.</creatorcontrib><creatorcontrib>Rizwan, Ali</creatorcontrib><creatorcontrib>Sánchez-Chero, Manuel</creatorcontrib><creatorcontrib>Rosas-Prado, Carmen Elvira</creatorcontrib><creatorcontrib>Salazar, Elmer Bagner</creatorcontrib><creatorcontrib>Awad, Nancy Awadallah</creatorcontrib><title>An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications</title><title>Mathematical problems in engineering</title><description>The Internet of Things (IoT) is a network that connects a large number of items. Each thing uses sensors to create and gather data from its surroundings and then sends to other objects or a central database through a channel. Keeping and transforming this created data is one of the most difficult tasks in IoT today, and it is one of the top worries of all enterprises that deploy IoT technology. Sensing equipment together with communication, storing, and display devices get benefit from technological advancements in the healthcare sector. Moreover, medical parameters and postoperative days require close observation. Therefore, the most cutting-edge approach to healthcare communication is adopted, which makes use of the Internet of Things (IoT). We can use the Internet of Things to speed changes in the healthcare environment, such as enhancing patient involvement and outcomes and shifting healthcare from reactive to proactive accessibility. Nonetheless, the growth of IoT exposes healthcare practitioners and their patients to new vulnerabilities, risks, and security concerns. However, there is currently a scarcity of research on how to improve IoT security in healthcare. Existing studies tend to concentrate only on the installation of IoT peripherals in a healthcare setting and to include a secure application solution. Because healthcare data and information are extremely sensitive, it is critical to have a secure health IoT application in place. As the IoT gets more widely used in healthcare, there will inevitably be more instances of sensitive patient information being made public. This paper proposes an optimized hashing algorithm with digital certificates to enhance the security. Initially, the health data are collected and preprocessed using normalization. The data are then stored in the IoT device. Here, the digital certificates are used for authentication purpose. The proposed discrete decision tree hashing algorithm (DDTHA) with ant colony optimization (ACO) hashes the unsigned digital certificates. The blowfish algorithm is used for encryption, and the signed digital certificate is obtained which is used for authentication purpose. The performance of the proposed system is evaluated and compared with conventional methodologies to prove the efficiency of the system.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Ant colony optimization</subject><subject>Authentication</subject><subject>Blockchain</subject><subject>Certificates</subject><subject>Communications equipment</subject><subject>Decision trees</subject><subject>Digital certificates</subject><subject>Display devices</subject><subject>Electronic health records</subject><subject>Encryption</subject><subject>Hash based algorithms</subject><subject>Health care</subject><subject>Health care industry</subject><subject>Information systems</subject><subject>Internet of medical things</subject><subject>Internet of Things</subject><subject>Mathematical problems</subject><subject>Privacy</subject><subject>Public Key Infrastructure</subject><subject>Security</subject><subject>Sensors</subject><issn>1024-123X</issn><issn>1563-5147</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp90EFLwzAUwPEgCs7pzQ8Q8KJoXfLaJu1xjukGgx3swYuUNH11GVtakwyZn97Oefb03uHHe_An5JqzR87TdAQMYCQyBrmQJ2TAUxFHKU_kab8zSCIO8ds5ufB-zRjwlGcD8j62dG4DOouBtg0tVsZ-eHo7b4u76El5rOmyC2ZrvlUwraWhpVO7UlYjfUW9cybsqbF0hmoTVlo5pOOu2xj9q_0lOWvUxuPV3xyS4nlaTGbRYvkyn4wXkY5jGSLARuimZlgB04Co6oQDiAQll7WqRAV5jiJJdAZciUoqXWdC8CZOMOONiofk5ni2c-3nDn0o1-3O2f5jCRIglzzP8l49HJV2rfcOm7JzZqvcvuSsPPQrD_3Kv349vz_yvkitvsz_-gdeSG9t</recordid><startdate>20220930</startdate><enddate>20220930</enddate><creator>Al Shahrani, Ali M.</creator><creator>Rizwan, Ali</creator><creator>Sánchez-Chero, Manuel</creator><creator>Rosas-Prado, Carmen Elvira</creator><creator>Salazar, Elmer Bagner</creator><creator>Awad, Nancy Awadallah</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>COVID</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PIMPY</scope><scope>PKEHL</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><orcidid>https://orcid.org/0000-0002-2348-8577</orcidid><orcidid>https://orcid.org/0000-0003-1646-3037</orcidid></search><sort><creationdate>20220930</creationdate><title>An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications</title><author>Al Shahrani, Ali M. ; Rizwan, Ali ; Sánchez-Chero, Manuel ; Rosas-Prado, Carmen Elvira ; Salazar, Elmer Bagner ; Awad, Nancy Awadallah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-2ef6cfd0eb20c2eead412264e717dab6b299e644c821a6b7acd8661f34e81fa3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Ant colony optimization</topic><topic>Authentication</topic><topic>Blockchain</topic><topic>Certificates</topic><topic>Communications equipment</topic><topic>Decision trees</topic><topic>Digital certificates</topic><topic>Display devices</topic><topic>Electronic health records</topic><topic>Encryption</topic><topic>Hash based algorithms</topic><topic>Health care</topic><topic>Health care industry</topic><topic>Information systems</topic><topic>Internet of medical things</topic><topic>Internet of Things</topic><topic>Mathematical problems</topic><topic>Privacy</topic><topic>Public Key Infrastructure</topic><topic>Security</topic><topic>Sensors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al Shahrani, Ali M.</creatorcontrib><creatorcontrib>Rizwan, Ali</creatorcontrib><creatorcontrib>Sánchez-Chero, Manuel</creatorcontrib><creatorcontrib>Rosas-Prado, Carmen Elvira</creatorcontrib><creatorcontrib>Salazar, Elmer Bagner</creatorcontrib><creatorcontrib>Awad, Nancy Awadallah</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Coronavirus Research Database</collection><collection>Middle East &amp; Africa Database</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied &amp; Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>Mathematical problems in engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al Shahrani, Ali M.</au><au>Rizwan, Ali</au><au>Sánchez-Chero, Manuel</au><au>Rosas-Prado, Carmen Elvira</au><au>Salazar, Elmer Bagner</au><au>Awad, Nancy Awadallah</au><au>Kaur, Amandeep</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications</atitle><jtitle>Mathematical problems in engineering</jtitle><date>2022-09-30</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>11</epage><pages>1-11</pages><issn>1024-123X</issn><eissn>1563-5147</eissn><abstract>The Internet of Things (IoT) is a network that connects a large number of items. Each thing uses sensors to create and gather data from its surroundings and then sends to other objects or a central database through a channel. Keeping and transforming this created data is one of the most difficult tasks in IoT today, and it is one of the top worries of all enterprises that deploy IoT technology. Sensing equipment together with communication, storing, and display devices get benefit from technological advancements in the healthcare sector. Moreover, medical parameters and postoperative days require close observation. Therefore, the most cutting-edge approach to healthcare communication is adopted, which makes use of the Internet of Things (IoT). We can use the Internet of Things to speed changes in the healthcare environment, such as enhancing patient involvement and outcomes and shifting healthcare from reactive to proactive accessibility. Nonetheless, the growth of IoT exposes healthcare practitioners and their patients to new vulnerabilities, risks, and security concerns. However, there is currently a scarcity of research on how to improve IoT security in healthcare. Existing studies tend to concentrate only on the installation of IoT peripherals in a healthcare setting and to include a secure application solution. Because healthcare data and information are extremely sensitive, it is critical to have a secure health IoT application in place. As the IoT gets more widely used in healthcare, there will inevitably be more instances of sensitive patient information being made public. This paper proposes an optimized hashing algorithm with digital certificates to enhance the security. Initially, the health data are collected and preprocessed using normalization. The data are then stored in the IoT device. Here, the digital certificates are used for authentication purpose. The proposed discrete decision tree hashing algorithm (DDTHA) with ant colony optimization (ACO) hashes the unsigned digital certificates. The blowfish algorithm is used for encryption, and the signed digital certificate is obtained which is used for authentication purpose. The performance of the proposed system is evaluated and compared with conventional methodologies to prove the efficiency of the system.</abstract><cop>New York</cop><pub>Hindawi</pub><doi>10.1155/2022/6802967</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-2348-8577</orcidid><orcidid>https://orcid.org/0000-0003-1646-3037</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1024-123X
ispartof Mathematical problems in engineering, 2022-09, Vol.2022, p.1-11
issn 1024-123X
1563-5147
language eng
recordid cdi_proquest_journals_2722971989
source Wiley Online Library Open Access; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection
subjects Access control
Algorithms
Ant colony optimization
Authentication
Blockchain
Certificates
Communications equipment
Decision trees
Digital certificates
Display devices
Electronic health records
Encryption
Hash based algorithms
Health care
Health care industry
Information systems
Internet of medical things
Internet of Things
Mathematical problems
Privacy
Public Key Infrastructure
Security
Sensors
title An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T19%3A26%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Internet%20of%20Things%20(IoT)-Based%20Optimization%20to%20Enhance%20Security%20in%20Healthcare%20Applications&rft.jtitle=Mathematical%20problems%20in%20engineering&rft.au=Al%20Shahrani,%20Ali%20M.&rft.date=2022-09-30&rft.volume=2022&rft.spage=1&rft.epage=11&rft.pages=1-11&rft.issn=1024-123X&rft.eissn=1563-5147&rft_id=info:doi/10.1155/2022/6802967&rft_dat=%3Cproquest_cross%3E2722971989%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2722971989&rft_id=info:pmid/&rfr_iscdi=true