Skip to main content
Log in

RETRACTED ARTICLE: An hybrid security framework using internet of things for healthcare system

  • Original Article
  • Published:
Network Modeling Analysis in Health Informatics and Bioinformatics Aims and scope Submit manuscript

This article was retracted on 07 November 2022

This article has been updated

Abstract

In recent decades, broad range of Internet of Things (IoT) technologies are deployed such as machine to machine communication, Internet Technologies (IT), robots, smart devices, and wireless sensor networks. IoT is a spectacular technology in the modern world of IT in which the objects can do data transmission and connect using the intranet or internet networks. Data security and privacy is one of the top most challenging issue where several researchers are showing interest that to especially in healthcare domain. For this reason, a hybrid combination of Elliptic Curve Digital Signature Algorithm (ECDSA), Rivest Cipher 4 (RC4), and Secure Hash Algorithm (SHA-256) is proposed for protecting the reliable data which is transmitted from the IoT based healthcare systems. In the proposed model, the ECDSA is used for improving the RC4 in which the encryption of key is processed by ECDSA for performing the XOR operation in RC4. Furthermore, the security is ensured by transforming the incoming data using the SHA-256 technique. Experimental results show that the proposed model outperforms for 10 MB of data in terms of encryption time that obtained as 631 ms, decryption time is 616 ms, and throughput obtained by the proposed models is 11.71 MB/ms when compared with other existing techniques such as ECC+3DES+SHA-256, RC4+AES+SHA-256, and ECC+RC2+SHA-256.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability Statement

This article has no data associated with it.

Change history

References

  • Abinaya E, Aishwarva K, Lordwin CP, Kamatchi G, Malarvizhi I (2018) A performance Aware security framework to avoid software attacks on Internet of Things (IoT) BASED patient monitoring system. In: Proceedings of the 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT). https://doi.org/10.1109/icctct.2018.8550955

  • Aerabi E, Bohlouli M, Livany MHA, Fazeli M, Papadimitriou A, Hely D (2020) Design space exploration for ultra-low-energy and secure iot mcus. ACM Trans Embedded Comput Syst 19(3):1–34

    Article  Google Scholar 

  • Bai X, Wang Z, Sheng L, Wang Z (2018) Reliable data fusion of hierarchical wireless sensor networks with asynchronous measurement for greenhouse monitoring. IEEE Trans Control Syst Technol 27(3):1036–1046

    Article  Google Scholar 

  • Bao SD, Chen M, Yang GZ (2017) A method of signal scrambling to secure data storage for healthcare applications. IEEE J Biomed Health Inf 21(6):1487–1494

    Article  Google Scholar 

  • Cao C, Liu F, Tan H, Song D, Shu W, Li W, Zhou Y, Bo X, Xie Z (2018) Deep learning and its applications in biomedicine. Genom Proteom Bioinform 16(1):17–32

    Article  Google Scholar 

  • Chandu Y, Kumar KS, Prabhukhanolkar NV, Anish AN, Rawal S (2017) Design and implementation of hybrid encryption for security of IOT data. In: Proceedings of the 2017 international conference on smart technologies for smart nation (SmartTechCon). https://doi.org/10.1109/smarttechcon.2017.8358562

  • Durairaj M, Muthuramalingam K (2019) A lightweight multi-level encryption model for iot applications. Adv Sci Technol Secur Appl 17–29. https://doi.org/10.1007/978-3-030-16837-7_2

  • Geetha R, Suntheya A, Srikanth GU (2020) Cloud integrated iot enabled sensor network security: research issues and solutions. Wireless Person. Commun. 113(2):747–771

    Article  Google Scholar 

  • Hammood MM, Yoshigoe K, Sagheer AM (2013) RC4-2S: RC4 stream cipher with two state tables. Lecture Notes in Electrical Engineering, pp 13–20. https://doi.org/10.1007/978-94-007-6996-0_2

  • Hou J, Qu L, Shi W (2019) A survey on internet of things security from data perspectives. Comput. Netw. 148:295–306

    Article  Google Scholar 

  • Hu C, Li W, Cheng X, Yu J, Wang S, Bie R (2017) A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data 4(3):341–355

    Article  Google Scholar 

  • Huang Q, Yang Y, Wang L (2017) Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things. IEEE Access 5:12941–12950

    Article  Google Scholar 

  • Jindal P, Singh B (2017) Optimization of the security-performance tradeoff in rc4 encryption algorithm. Wireless Person. Commun. 92(3):1221–1250

    Article  Google Scholar 

  • Kang JJ, Dibaei M, Luo G, Yang W, Haskell-Dowland P, Zheng X (2021) An energy-efficient and secure data inference framework for internet of health things: a pilot study. Sensors 21(1):312

    Article  Google Scholar 

  • Li R, Sturtivant C, Yu J, Cheng X (2018) A novel secure and efficient data aggregation scheme for iot. IEEE Internet Things J 6(2):1551–1560

    Article  Google Scholar 

  • Lyu Y, Yin P (2020) Internet of things transmission and network reliability in complex environment. Comput Commun 150:757–763

    Article  Google Scholar 

  • Maitra S, Paul G (2008) Analysis of rc4 and proposal of additional layers for better security margin. Progress in Cryptology - INDOCRYPT 2008, pp 27–39. https://doi.org/10.1007/978-3-540-89754-5_3

  • Manogaran G, Alazab M, Saravanan V, Rawal BS, Shakeel PM, Sundarasekar R, Nagarajan SM, Kadry SN, Montenegro-Marin CE (2020) Machine learning assisted information management scheme in service concentrated iot. IEEE Trans Ind Inf 17(4):2871–2879

    Article  Google Scholar 

  • Memos VA, Psannis KE, Goudos SK, Kyriazakos S (2019) An enhanced and secure cloud infrastructure for e-health data transmission. Wireless Person Commun 117:1–19

    Google Scholar 

  • Nagarajan SM, Deverajan GG, Chatterjee P, Alnumay W, Ghosh U (2021a) Effective task scheduling algorithm with deep learning for internet of health things (ioht) in sustainable smart cities. Sustain Cities Soc 71:102945

    Article  Google Scholar 

  • Nagarajan SM, Muthukumaran V, Murugesan R, Joseph RB, Munirathanam M (2021) Feature selection model for healthcare analysis and classification using classifier ensemble technique. Int J Syst Assur Eng Manag. https://doi.org/10.1007/s13198-021-01126-7

  • Ni L, Zhang J, Jiang C, Yan C, Yu K (2017) Resource allocation strategy in fog computing based on priced timed petri nets. IEEE Internet Things J 4(5):1216–1228

    Article  Google Scholar 

  • Nikravan M, Reza A (2020) A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things. Wireless Person Commun 111(1):463–494

    Article  Google Scholar 

  • Nord JH, Koohang A, Paliszkiewicz J (2019) The internet of things: review and theoretical framework. Expert Syst Appl 133:97–108

    Article  Google Scholar 

  • Patel MA, Zala NK, Shah PA, Murugan NS (2019) Mind machine interface using internet of things. Int J Res Eng Sci Manage 2:12

    Google Scholar 

  • Petrvalsky M, Drutarovsky M (2016) Constant-weight coding based software implementation of dpa countermeasure in embedded microcontroller. Microprocess Microsyst 47:82–89

    Article  Google Scholar 

  • Rahman SMM, Masud M, Noman AN, Alamri A, Hassan MM (2014) Towards secure data exchange in peer-to-peer data management systems. Appl Math Inf Sci 8(6):2775

    Article  Google Scholar 

  • Ullah A, Azeem M, Ashraf H, Alaboudi AA, Humayun M, Jhanjhi N (2021) Secure healthcare data aggregation and transmission in iot—a survey. IEEE Access 9:16849–16865

    Article  Google Scholar 

  • Ullah H, Nair NG, Moore A, Nugent C, Muschamp P, Cuevas M (2019) 5g communication: an overview of vehicle-to-everything, drones, and healthcare use-cases. IEEE Access 7:37251–37268

    Article  Google Scholar 

  • Weerasinghe T (2012) Analysis of a modified rc4 algorithm. Int J Comput Appl 51(22):13–17

    Google Scholar 

  • Weerasinghe TD (2013) An effective rc4 stream cipher. In: Proceedings of the 2013 IEEE 8th International Conference on Industrial and Information Systems. https://doi.org/10.1109/iciinfs.2013.6731957

  • Xu G (2020) Iot-assisted ecg monitoring framework with secure data transmission for health care applications. IEEE Access 8:74586–74594

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manjula Sanjay Koti.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s13721-022-00393-z"

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, S.S., Koti, M.S. RETRACTED ARTICLE: An hybrid security framework using internet of things for healthcare system. Netw Model Anal Health Inform Bioinforma 10, 52 (2021). https://doi.org/10.1007/s13721-021-00329-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13721-021-00329-z

Keywords

Navigation