[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

RETRACTED ARTICLE: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

This article was retracted on 27 May 2023

This article has been updated

Abstract

The ever-growing advancement in communication innovation of modern smart objects carries with it a new era of improvement for the Internet of Things (IoT) based networks. The health care system is the best approach to store the patient’s health data online with high privacy. Ensuring the privacy and confidentiality of patient information in the cloud is of utmost importance; here, the enhanced security model of healthcare data gives rise to trust. For the secure communication, the healthcare data sensed by the IoT sensor network is encrypted by Lightweight SIMON block cipher. For improving the privacy of healthcare data among individuals, we implemented the share generation model. Then, share creation model, i.e., Chinese Remainder Theorem (CRT) is developed to generate the copy of every ciphertext based on the selected number of users and the data is shared among the optimal number of users. The selection of the users in IoHT is made by the metaheuristic algorithm called Hybrid Teaching and Learning Based Optimization (HTLBO). Then, we present healthcare service providers for giving the full scope of medical services to people enrolled in IoHT. The performance of Secure Data is approved through simulations in terms of energy cost, computation time, etc., of the proposed algorithms and the outcomes demonstrate that Secure Data can be efficient while applying for ensuring security chances in IoT-based healthcare systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Change history

References

  1. Alagar V, Alsaig A, Ormandjiva O, Wan K (2018) Context-based security and privacy for healthcare IoT. In: 2018 IEEE international conference on smart internet of things (SmartIoT). IEEE, pp 122–128

  2. Ammar M, Russello G, andCrispo B (2018) Internet of things: a survey on the security of IoT frameworks. Journal of Information Security and Applications 38:8–27

    Article  Google Scholar 

  3. Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):208

    Article  Google Scholar 

  4. Banerjee M, Lee J, Choo KKR (2018) A blockchain future for internet of things security: a position paper. Digital Communications and Networks 4(3):149–160

    Article  Google Scholar 

  5. Beaulieu R, Treatman-Clark S, Shors D, Weeks B, Smith J, Wingers L (2015) The SIMON and SPECK lightweight block ciphers. In: 2015 52nd ACM/EDAC/IEEE design automation conference (DAC). IEEE, pp 1–6

  6. Bhoyar P, Dhok SB, Deshmukh RB (2018) Hardware implementation of secure and lightweight Simeck32/64 cipher for IEEE 802.15. 4 transceiver. AEU Int J Electron Commun 90:147–154

    Article  Google Scholar 

  7. Bi S, Gross WJ (2008) The mixed-radix Chinese remainder theorem and its applications to residue comparison. IEEE Trans Comput 57(12):1624–1632

    Article  MathSciNet  MATH  Google Scholar 

  8. Chaudhury S, Paul D, Mukherjee R, Haldar S (2017) Internet of thing based healthcare monitoring system. In: Industrial automation and electromechanical engineering conference (IEMECON), 2017 8th annual. IEEE, pp 346–349

  9. Das AK, Zeadally S, He D (2018) Taxonomy and analysis of security protocols for internet of things. Futur Gener Comput Syst 89:110–125

    Article  Google Scholar 

  10. El-hajj M, Chamoun M, Fadlallah A, Serhrouchni A (2017) Analysis of authentication techniques in internet of things (IoT). In: Cyber security in networking conference (CSNet), 2017 1st. IEEE, pp 1–3

  11. Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput & Applic:1–15

  12. Haqaf H, Koyuncu M (2018) Understanding key skills for information security managers. Int J Inf Manag 43:165–172

    Article  Google Scholar 

  13. Hossain M, Islam SR, Ali F, Kwak KS, Hasan R (2018) An internet of things-based health prescription assistant and its security system design. Futur Gener Comput Syst 82:422–439

    Article  Google Scholar 

  14. Huang CD, Behara RS, Goo J (2014) Optimal information security investment in a healthcare information exchange: an economic analysis. Decis Support Syst 61:1–11

    Article  Google Scholar 

  15. Jagdeo SM, Umbarkar AJ, Sheth PD (2018) Teaching–learning-based optimization on Hadoop. In: Soft computing: theories and applications (pp. 251–263). Springer, Singapore, pp 1–13

  16. Leloglu E (2017) A review of security concerns in internet of things. Journal of Communications and Computer Engineering 5(1):121–137

    Google Scholar 

  17. Martínez-Caro E, Cegarra-Navarro JG, García-Pérez A, Fait M (2018) Healthcare service evolution towards the internet of things: an end-user perspective. Technol Forecast Soc Chang:1–9

  18. Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, Isoaho J (2016) End-to-end security scheme for mobility enabled healthcare internet of things. Futur Gener Comput Syst 64:108–124

    Article  Google Scholar 

  19. Risqi YS, Yohanes S, Windarta S (2015) Fixed point attack in PGV-5 scheme using SIMON algorithm. Procedia Computer Science 72:292–299

    Article  Google Scholar 

  20. Rizk-Allah RM, Hassanien AE, Bhattacharyya S (2018) Chaotic crow search algorithm for fractional optimization problems. Appl Soft Comput:1–39

  21. Sfar AR, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digital Communications and Networks 4(2):118–137

    Article  Google Scholar 

  22. Sha K, Wei W, Yang TA, Wang Z, Shi W (2018) On security challenges and open issues in internet of things. Futur Gener Comput Syst 83:326–337

    Article  Google Scholar 

  23. Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humaniz Comput:1–13

  24. Sharma P, Sundaram S, Sharma M, Sharma A, Gupta D (2018) Diagnosis of Parkinson’s disease using modified grey wolf optimization. Cogn Syst Res:1–24

  25. Steinbart PJ, Raschke RL, Gal G, Dilla WN (2018) The influence of a good relationship between the internal audit and information security functions on information security outcomes. Acc Organ Soc:1–15

  26. Tao H, Bhuiyan MZA, Abdalla AN, Hassan MM, Zain JM, Hayajneh T (2018) Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J:1–10

  27. Ullah A, Sehr I, Akbar M, Ning H (2018) FoG assisted secure De-duplicated data dissemination in smart healthcare IoT. In: 2018 IEEE international conference on smart internet of things (SmartIoT). IEEE, pp 166–171

  28. Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) Sit: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688

  29. Williams PA, McCauley V (2016) Always connected: the security challenges of the healthcare internet of things. In: Internet of things (WF-IoT), 2016 IEEE 3rd world forum on. IEEE, pp 30–35

  30. Yehia L, Khedr A, Darwish A (2015) Hybrid security techniques for internet of things healthcare applications. Advances in Internet of Things 5(03):21

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jafar A. Alzubi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11042-023-15841-9"

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rani, S.S., Alzubi, J.A., Lakshmanaprabu, S.K. et al. RETRACTED ARTICLE: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers. Multimed Tools Appl 79, 35405–35424 (2020). https://doi.org/10.1007/s11042-019-07760-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07760-5

Keywords

Navigation