Abstract
In recent decades, broad range of Internet of Things (IoT) technologies are deployed such as machine to machine communication, Internet Technologies (IT), robots, smart devices, and wireless sensor networks. IoT is a spectacular technology in the modern world of IT in which the objects can do data transmission and connect using the intranet or internet networks. Data security and privacy is one of the top most challenging issue where several researchers are showing interest that to especially in healthcare domain. For this reason, a hybrid combination of Elliptic Curve Digital Signature Algorithm (ECDSA), Rivest Cipher 4 (RC4), and Secure Hash Algorithm (SHA-256) is proposed for protecting the reliable data which is transmitted from the IoT based healthcare systems. In the proposed model, the ECDSA is used for improving the RC4 in which the encryption of key is processed by ECDSA for performing the XOR operation in RC4. Furthermore, the security is ensured by transforming the incoming data using the SHA-256 technique. Experimental results show that the proposed model outperforms for 10 MB of data in terms of encryption time that obtained as 631 ms, decryption time is 616 ms, and throughput obtained by the proposed models is 11.71 MB/ms when compared with other existing techniques such as ECC+3DES+SHA-256, RC4+AES+SHA-256, and ECC+RC2+SHA-256.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13721-021-00329-z/MediaObjects/13721_2021_329_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13721-021-00329-z/MediaObjects/13721_2021_329_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13721-021-00329-z/MediaObjects/13721_2021_329_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13721-021-00329-z/MediaObjects/13721_2021_329_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13721-021-00329-z/MediaObjects/13721_2021_329_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13721-021-00329-z/MediaObjects/13721_2021_329_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13721-021-00329-z/MediaObjects/13721_2021_329_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13721-021-00329-z/MediaObjects/13721_2021_329_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13721-021-00329-z/MediaObjects/13721_2021_329_Fig9_HTML.png)
Similar content being viewed by others
Data Availability Statement
This article has no data associated with it.
Change history
07 November 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s13721-022-00393-z
References
Abinaya E, Aishwarva K, Lordwin CP, Kamatchi G, Malarvizhi I (2018) A performance Aware security framework to avoid software attacks on Internet of Things (IoT) BASED patient monitoring system. In: Proceedings of the 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT). https://doi.org/10.1109/icctct.2018.8550955
Aerabi E, Bohlouli M, Livany MHA, Fazeli M, Papadimitriou A, Hely D (2020) Design space exploration for ultra-low-energy and secure iot mcus. ACM Trans Embedded Comput Syst 19(3):1–34
Bai X, Wang Z, Sheng L, Wang Z (2018) Reliable data fusion of hierarchical wireless sensor networks with asynchronous measurement for greenhouse monitoring. IEEE Trans Control Syst Technol 27(3):1036–1046
Bao SD, Chen M, Yang GZ (2017) A method of signal scrambling to secure data storage for healthcare applications. IEEE J Biomed Health Inf 21(6):1487–1494
Cao C, Liu F, Tan H, Song D, Shu W, Li W, Zhou Y, Bo X, Xie Z (2018) Deep learning and its applications in biomedicine. Genom Proteom Bioinform 16(1):17–32
Chandu Y, Kumar KS, Prabhukhanolkar NV, Anish AN, Rawal S (2017) Design and implementation of hybrid encryption for security of IOT data. In: Proceedings of the 2017 international conference on smart technologies for smart nation (SmartTechCon). https://doi.org/10.1109/smarttechcon.2017.8358562
Durairaj M, Muthuramalingam K (2019) A lightweight multi-level encryption model for iot applications. Adv Sci Technol Secur Appl 17–29. https://doi.org/10.1007/978-3-030-16837-7_2
Geetha R, Suntheya A, Srikanth GU (2020) Cloud integrated iot enabled sensor network security: research issues and solutions. Wireless Person. Commun. 113(2):747–771
Hammood MM, Yoshigoe K, Sagheer AM (2013) RC4-2S: RC4 stream cipher with two state tables. Lecture Notes in Electrical Engineering, pp 13–20. https://doi.org/10.1007/978-94-007-6996-0_2
Hou J, Qu L, Shi W (2019) A survey on internet of things security from data perspectives. Comput. Netw. 148:295–306
Hu C, Li W, Cheng X, Yu J, Wang S, Bie R (2017) A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data 4(3):341–355
Huang Q, Yang Y, Wang L (2017) Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things. IEEE Access 5:12941–12950
Jindal P, Singh B (2017) Optimization of the security-performance tradeoff in rc4 encryption algorithm. Wireless Person. Commun. 92(3):1221–1250
Kang JJ, Dibaei M, Luo G, Yang W, Haskell-Dowland P, Zheng X (2021) An energy-efficient and secure data inference framework for internet of health things: a pilot study. Sensors 21(1):312
Li R, Sturtivant C, Yu J, Cheng X (2018) A novel secure and efficient data aggregation scheme for iot. IEEE Internet Things J 6(2):1551–1560
Lyu Y, Yin P (2020) Internet of things transmission and network reliability in complex environment. Comput Commun 150:757–763
Maitra S, Paul G (2008) Analysis of rc4 and proposal of additional layers for better security margin. Progress in Cryptology - INDOCRYPT 2008, pp 27–39. https://doi.org/10.1007/978-3-540-89754-5_3
Manogaran G, Alazab M, Saravanan V, Rawal BS, Shakeel PM, Sundarasekar R, Nagarajan SM, Kadry SN, Montenegro-Marin CE (2020) Machine learning assisted information management scheme in service concentrated iot. IEEE Trans Ind Inf 17(4):2871–2879
Memos VA, Psannis KE, Goudos SK, Kyriazakos S (2019) An enhanced and secure cloud infrastructure for e-health data transmission. Wireless Person Commun 117:1–19
Nagarajan SM, Deverajan GG, Chatterjee P, Alnumay W, Ghosh U (2021a) Effective task scheduling algorithm with deep learning for internet of health things (ioht) in sustainable smart cities. Sustain Cities Soc 71:102945
Nagarajan SM, Muthukumaran V, Murugesan R, Joseph RB, Munirathanam M (2021) Feature selection model for healthcare analysis and classification using classifier ensemble technique. Int J Syst Assur Eng Manag. https://doi.org/10.1007/s13198-021-01126-7
Ni L, Zhang J, Jiang C, Yan C, Yu K (2017) Resource allocation strategy in fog computing based on priced timed petri nets. IEEE Internet Things J 4(5):1216–1228
Nikravan M, Reza A (2020) A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things. Wireless Person Commun 111(1):463–494
Nord JH, Koohang A, Paliszkiewicz J (2019) The internet of things: review and theoretical framework. Expert Syst Appl 133:97–108
Patel MA, Zala NK, Shah PA, Murugan NS (2019) Mind machine interface using internet of things. Int J Res Eng Sci Manage 2:12
Petrvalsky M, Drutarovsky M (2016) Constant-weight coding based software implementation of dpa countermeasure in embedded microcontroller. Microprocess Microsyst 47:82–89
Rahman SMM, Masud M, Noman AN, Alamri A, Hassan MM (2014) Towards secure data exchange in peer-to-peer data management systems. Appl Math Inf Sci 8(6):2775
Ullah A, Azeem M, Ashraf H, Alaboudi AA, Humayun M, Jhanjhi N (2021) Secure healthcare data aggregation and transmission in iot—a survey. IEEE Access 9:16849–16865
Ullah H, Nair NG, Moore A, Nugent C, Muschamp P, Cuevas M (2019) 5g communication: an overview of vehicle-to-everything, drones, and healthcare use-cases. IEEE Access 7:37251–37268
Weerasinghe T (2012) Analysis of a modified rc4 algorithm. Int J Comput Appl 51(22):13–17
Weerasinghe TD (2013) An effective rc4 stream cipher. In: Proceedings of the 2013 IEEE 8th International Conference on Industrial and Information Systems. https://doi.org/10.1109/iciinfs.2013.6731957
Xu G (2020) Iot-assisted ecg monitoring framework with secure data transmission for health care applications. IEEE Access 8:74586–74594
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s13721-022-00393-z"
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kumar, S.S., Koti, M.S. RETRACTED ARTICLE: An hybrid security framework using internet of things for healthcare system. Netw Model Anal Health Inform Bioinforma 10, 52 (2021). https://doi.org/10.1007/s13721-021-00329-z
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13721-021-00329-z