Loading…

Securing IoT healthcare platform with lightweight encryption

The inception of this study was driven by the imperative need for enhanced security mechanisms within the Internet of Things (IoT) framework, particularly in the sensitive domain of healthcare. As the IoT paradigm continues to entrench itself in healthcare, patient data confidentiality and integrity...

Full description

Saved in:
Bibliographic Details
Main Authors: Ismael, Saja Kareem, Shujaa, Mohamed Ibrahim, Alwahhab, Ahmed Bahaaulddin A.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The inception of this study was driven by the imperative need for enhanced security mechanisms within the Internet of Things (IoT) framework, particularly in the sensitive domain of healthcare. As the IoT paradigm continues to entrench itself in healthcare, patient data confidentiality and integrity command heightened priority, given the vulnerability of this data to unauthorized access and cyber threats. In response to these challenges, this paper elucidates the design and implementation of an innovative blockchain-based security model that harmonizes a dynamic Bee Swarm Key Generator with the lightweight Speck cipher to fortify the encryption capabilities of IoT devices. Delving into the background, the escalating deployment of IoT in healthcare has exposed critical gaps in data security, thus catalyzing the exploration of blockchain technology as a bulwark against these deficiencies. The interest in the adoption of blockchain in this field is derived from the fact that its decentralization approach is resistant to fail the way the centralized system does. After integrating the robust encryption from the Bee Swarm Key Generator and the efficiency present in the Speck Cipher, the model is designed to guarantee the confidentiality and integrity of healthcare data against other outrageous cyber-attacks. The methodological frame comprises an extensive security analysis, an operating analysis, and on-field plotting. A thorough security analysis consisting of NIST randomness tests and cyber-attack attempts is used to verify the reliability of the author’s encryption framework. The author further supports the use of the model through its integration with the Firebase platform for the immediate transactional activity of data concerning healthcare. The outcome of this empirical analysis demonstrates the strength of the described blockchain network, mainly when resistance to cyber-attacks is enhanced with the length of the network. The NIST randomness tests prove the workability of the character security framework and use one financed cyber-attack to support the concept of blockchain attack and counterattack. The conclusion adequately quantifies the immense improvement in healthcare’s security components and is exemplary of an applicable secure real-time patient data warehousing system. Therefore, this kind of research is quite beneficial for future studies. The comprehensive nature of the research contributes a substantial foundation upon which scalable and secur
ISSN:0094-243X
1551-7616
DOI:10.1063/5.0236651