Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare

Hai Tao,Md Zakirul Alam Bhuiyan,Ahmed N. Abdalla,Mohammad Mehedi Hassan,Jasni Mohamad Zain,Thaier Hayajneh
DOI: https://doi.org/10.1109/JIOT.2018.2854714
IF: 10.6
2019-01-01
IEEE Internet of Things Journal
Abstract:There are tremendous security concerns with patient health monitoring sensors in Internet of Things (IoT). The concerns are also realized by recent sophisticated security and privacy attacks, including data breaching, data integrity, and data collusion. Conventional solutions often offer security to patients’ health monitoring data during the communication. However, they often fail to deal with complicated attacks at the time of data conversion into cipher and after the cipher transmission. In this paper, we first study privacy and security concerns with healthcare data acquisition and then transmission. Then, we propose a secure data collection scheme for IoT-based healthcare system named <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">SecureData</monospace> with the aim to tackle security concerns similar to the above. <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">SecureData</monospace> scheme is composed of four layers: 1) IoT network sensors/devices; 2) Fog layers; 3) cloud computing layer; and 4) healthcare provider layer. We mainly contribute to the first three layers. For the first two layers, <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">SecureData</monospace> includes two techniques: 1) light-weight field programmable gate array (FPGA) hardware-based cipher algorithm and 2) secret cipher share algorithm. We study KATAN algorithm and we implement and optimize it on the FPGA hardware platform, while we use the idea of secret cipher sharing technique to protect patients’ data privacy. At the cloud computing layer, we apply a distributed database technique that includes a number of cloud data servers to guarantee patients’ personal data privacy at the cloud computing layer. The performance of <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">SecureData</monospace> is validated through simulations with FPGA in terms of hardware frequency rate, energy cost, and computation time of all the algorithms and the results show that <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">SecureData</monospace> can be efficient when applying for protecting security risks in IoT-based healthcare.
What problem does this paper attempt to address?