IoT-based Efficient Tamper Detection Mechanism for Healthcare Application

نویسنده

  • Ahmed A. Elngar
چکیده

Security of networks is the most important challenge of the Internet of Things (IoT) that need smarter security mechanisms. Therefore, a tamper detection (TD) is an efficient security mechanism based on networks of IoT for healthcare applications, which used to deal with security violations. In this paper, a new TD mechanism based IoT for real data of healthcare application called (IOTTD) model has been proposed. This paper effectively proposed (ANN-GA) tamper detection mechanism. Where, Genetic Algorithm (GA) is used to optimize weight and bias values of artificial neural networks (ANN) which lead to maximize the ANN detection accuracy, minimize the timing detection and efficiency energy saving. The experimental results showed that the tamper detection performance of (ANN-GA) is 98.51%. In addition, the proposed model showed that the (ANN-GA) enhances the timing to 0.03 sec which is important for real time of (IOT-TD) model healthcare application and the efficiency energy saving transmission is 1980 times better than full transmission. Also, the proposed Model relies on the certificate-based DTLS handshake protocol as it is the main security for (IoT-TD) model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Internet of Things: A Survey for the Individuals' E-Health Applications

In today's world, the Internet of Things (IoT), which is a fairly new technology, has become a popular topic for discussion. Meanwhile, the increasing demand for personalized healthcare with the assistance of new technologies has created new applications called e-health IoT applications; however, researchers are still attempting to find its applications, therefore they have not been able to foc...

متن کامل

IOT: Using Channel State Information for Tamper Detection in the Internet of Things

The Internet of Things (IoT) is increasingly used for critical applications and securing the IoT has become a major concern. Among other issues it is important to ensure that tampering with IoT devices is detected. Many IoT devices use WiFi for communication and Channel State Information (CSI) based tamper detection is a valid option. Each 802.11n WiFi frame contains a preamble which allows a r...

متن کامل

A Review on Internet of Things (IoT) in Healthcare

Internet of Things (IoT) rises as a powerful domain where embedded devices and sensors can connect and exchange information over the Internet. The importance of IoT devices and data can be critical, so security constraints are required to keep IoT data safe from intruders; authentication is one of basic and important means to confirm data privacy and security. The nature of IoT devices as a res...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

Internet of Things for Smart Crime Detection

The rapid economic development in South Korea has resulted in increase of crimes. Timely detection and reduction of crimes are primary focus of police officers. Internet of Things (IoT) and increasingly cheap and wearable sensors can be used to facilitate this task. Generally, the application of IoT technologies to the fields of smart cities, smart logistics and healthcare can be seen more ofte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2018