Abstract
The ever-growing advancement in communication innovation of modern smart objects carries with it a new era of improvement for the Internet of Things (IoT) based networks. The health care system is the best approach to store the patient’s health data online with high privacy. Ensuring the privacy and confidentiality of patient information in the cloud is of utmost importance; here, the enhanced security model of healthcare data gives rise to trust. For the secure communication, the healthcare data sensed by the IoT sensor network is encrypted by Lightweight SIMON block cipher. For improving the privacy of healthcare data among individuals, we implemented the share generation model. Then, share creation model, i.e., Chinese Remainder Theorem (CRT) is developed to generate the copy of every ciphertext based on the selected number of users and the data is shared among the optimal number of users. The selection of the users in IoHT is made by the metaheuristic algorithm called Hybrid Teaching and Learning Based Optimization (HTLBO). Then, we present healthcare service providers for giving the full scope of medical services to people enrolled in IoHT. The performance of Secure Data is approved through simulations in terms of energy cost, computation time, etc., of the proposed algorithms and the outcomes demonstrate that Secure Data can be efficient while applying for ensuring security chances in IoT-based healthcare systems.
Similar content being viewed by others
Change history
27 May 2023
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11042-023-15841-9
References
Alagar V, Alsaig A, Ormandjiva O, Wan K (2018) Context-based security and privacy for healthcare IoT. In: 2018 IEEE international conference on smart internet of things (SmartIoT). IEEE, pp 122–128
Ammar M, Russello G, andCrispo B (2018) Internet of things: a survey on the security of IoT frameworks. Journal of Information Security and Applications 38:8–27
Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):208
Banerjee M, Lee J, Choo KKR (2018) A blockchain future for internet of things security: a position paper. Digital Communications and Networks 4(3):149–160
Beaulieu R, Treatman-Clark S, Shors D, Weeks B, Smith J, Wingers L (2015) The SIMON and SPECK lightweight block ciphers. In: 2015 52nd ACM/EDAC/IEEE design automation conference (DAC). IEEE, pp 1–6
Bhoyar P, Dhok SB, Deshmukh RB (2018) Hardware implementation of secure and lightweight Simeck32/64 cipher for IEEE 802.15. 4 transceiver. AEU Int J Electron Commun 90:147–154
Bi S, Gross WJ (2008) The mixed-radix Chinese remainder theorem and its applications to residue comparison. IEEE Trans Comput 57(12):1624–1632
Chaudhury S, Paul D, Mukherjee R, Haldar S (2017) Internet of thing based healthcare monitoring system. In: Industrial automation and electromechanical engineering conference (IEMECON), 2017 8th annual. IEEE, pp 346–349
Das AK, Zeadally S, He D (2018) Taxonomy and analysis of security protocols for internet of things. Futur Gener Comput Syst 89:110–125
El-hajj M, Chamoun M, Fadlallah A, Serhrouchni A (2017) Analysis of authentication techniques in internet of things (IoT). In: Cyber security in networking conference (CSNet), 2017 1st. IEEE, pp 1–3
Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput & Applic:1–15
Haqaf H, Koyuncu M (2018) Understanding key skills for information security managers. Int J Inf Manag 43:165–172
Hossain M, Islam SR, Ali F, Kwak KS, Hasan R (2018) An internet of things-based health prescription assistant and its security system design. Futur Gener Comput Syst 82:422–439
Huang CD, Behara RS, Goo J (2014) Optimal information security investment in a healthcare information exchange: an economic analysis. Decis Support Syst 61:1–11
Jagdeo SM, Umbarkar AJ, Sheth PD (2018) Teaching–learning-based optimization on Hadoop. In: Soft computing: theories and applications (pp. 251–263). Springer, Singapore, pp 1–13
Leloglu E (2017) A review of security concerns in internet of things. Journal of Communications and Computer Engineering 5(1):121–137
Martínez-Caro E, Cegarra-Navarro JG, García-Pérez A, Fait M (2018) Healthcare service evolution towards the internet of things: an end-user perspective. Technol Forecast Soc Chang:1–9
Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, Isoaho J (2016) End-to-end security scheme for mobility enabled healthcare internet of things. Futur Gener Comput Syst 64:108–124
Risqi YS, Yohanes S, Windarta S (2015) Fixed point attack in PGV-5 scheme using SIMON algorithm. Procedia Computer Science 72:292–299
Rizk-Allah RM, Hassanien AE, Bhattacharyya S (2018) Chaotic crow search algorithm for fractional optimization problems. Appl Soft Comput:1–39
Sfar AR, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digital Communications and Networks 4(2):118–137
Sha K, Wei W, Yang TA, Wang Z, Shi W (2018) On security challenges and open issues in internet of things. Futur Gener Comput Syst 83:326–337
Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humaniz Comput:1–13
Sharma P, Sundaram S, Sharma M, Sharma A, Gupta D (2018) Diagnosis of Parkinson’s disease using modified grey wolf optimization. Cogn Syst Res:1–24
Steinbart PJ, Raschke RL, Gal G, Dilla WN (2018) The influence of a good relationship between the internal audit and information security functions on information security outcomes. Acc Organ Soc:1–15
Tao H, Bhuiyan MZA, Abdalla AN, Hassan MM, Zain JM, Hayajneh T (2018) Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J:1–10
Ullah A, Sehr I, Akbar M, Ning H (2018) FoG assisted secure De-duplicated data dissemination in smart healthcare IoT. In: 2018 IEEE international conference on smart internet of things (SmartIoT). IEEE, pp 166–171
Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) Sit: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688
Williams PA, McCauley V (2016) Always connected: the security challenges of the healthcare internet of things. In: Internet of things (WF-IoT), 2016 IEEE 3rd world forum on. IEEE, pp 30–35
Yehia L, Khedr A, Darwish A (2015) Hybrid security techniques for internet of things healthcare applications. Advances in Internet of Things 5(03):21
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11042-023-15841-9"
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rani, S.S., Alzubi, J.A., Lakshmanaprabu, S.K. et al. RETRACTED ARTICLE: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers. Multimed Tools Appl 79, 35405–35424 (2020). https://doi.org/10.1007/s11042-019-07760-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-07760-5