Blockchain and IoT based Smart Healthcare Systems

IOT-Based Smart Healthcare System with Hybrid Key Generation and DNA Cryptography

Author(s): Vidhya E. * .

Pp: 137-149 (13)

DOI: 10.2174/9789815196290124010011

* (Excluding Mailing and Handling)

Abstract

Many applications, such as smart health care, smart cities, smart homes, self-driving cars, IoT retail shops, tele-health, traffic management, and so on, will use IoT devices to generate information. In these tenders, smart health care is single of the most imperative because it generates sensitive information like disease managing, drug managing, secluded patient checking, defensive care, and so on. This large amount of information is acquired and recorded from a variety of sources (mobile phones, software, sensors, e-mail, applications and so on). These sources contain a basic encryption process, so hackers can easily hack the information and misuse it. These issues are taken by researchers, and they find solutions, but they do not fulfill the needs of encryption. Key generation is critical for encryption and decryption because a strong key increases the encryption and decryption level. In this chapter, the proposed system is designed and implemented with a strong key generation (KG) to encrypt (encr) and decrypt (decp) the information that is compatible with the limited processing capabilities of IoT devices. In this system, the mathematical key generation algorithm is created with the hybrid of prime numbers and pseudo random numbers using the Exclusive OR function. Besides, the DNA Cryptography algorithm is used to encrypt and decrypt the information. The above system makes it hard for hackers to break into. When paralleled with illustrious cryptographic schemes, the tentative outcomes of the proposed system show the best effects for every IoT scheme in terms of encryption time and key entropy. When equal to other surviving encryption schemes, the proposed system has a restored avalanche effect and key entropy value for achieving the security goals. The above security goals illustrate that such a scheme is able to protect IoT documents from present attacks.

© 2024 Bentham Science Publishers | Privacy Policy