Blockchain and IoT based Smart Healthcare Systems

Author(s): Vidhya E. * .

DOI: 10.2174/9789815196290124010011

IOT-Based Smart Healthcare System with Hybrid Key Generation and DNA Cryptography

Pp: 137-149 (13)

Buy Chapters

* (Excluding Mailing and Handling)

  • * (Excluding Mailing and Handling)

Abstract

SHS investigation development is considered from the geographical and historical viewpoint. 3 stages are described. Within Stage 1 the work was carried out in the Department of the Institute of Chemical Physics in Chernogolovka where the scientific discovery had been made. At Stage 2 the interest to SHS arose in different cities and towns of the former USSR. Within Stage 3 SHS entered the international scene. Now SHS processes and products are being studied in more than 50 countries.

Abstract

Many applications, such as smart health care, smart cities, smart homes, self-driving cars, IoT retail shops, tele-health, traffic management, and so on, will use IoT devices to generate information. In these tenders, smart health care is single of the most imperative because it generates sensitive information like disease managing, drug managing, secluded patient checking, defensive care, and so on. This large amount of information is acquired and recorded from a variety of sources (mobile phones, software, sensors, e-mail, applications and so on). These sources contain a basic encryption process, so hackers can easily hack the information and misuse it. These issues are taken by researchers, and they find solutions, but they do not fulfill the needs of encryption. Key generation is critical for encryption and decryption because a strong key increases the encryption and decryption level. In this chapter, the proposed system is designed and implemented with a strong key generation (KG) to encrypt (encr) and decrypt (decp) the information that is compatible with the limited processing capabilities of IoT devices. In this system, the mathematical key generation algorithm is created with the hybrid of prime numbers and pseudo random numbers using the Exclusive OR function. Besides, the DNA Cryptography algorithm is used to encrypt and decrypt the information. The above system makes it hard for hackers to break into. When paralleled with illustrious cryptographic schemes, the tentative outcomes of the proposed system show the best effects for every IoT scheme in terms of encryption time and key entropy. When equal to other surviving encryption schemes, the proposed system has a restored avalanche effect and key entropy value for achieving the security goals. The above security goals illustrate that such a scheme is able to protect IoT documents from present attacks.

We recommend

Favorable 70-S: Investigation Branching Arrow

Authors:Bentham Science Books