Abstract

The web of things, which is widely called the Internet of Things (IoT), aids as a part of our day-to-day life activities in today’s world. It has great potential to change the modern world. Although it benefits us in several ways, IoT possesses several issues, such as privacy, data confidentiality, and effective storage. The IoT community is extremely concerned about the quantum of information that may be leaked out. Hence, a secured atmosphere is mandatory for IoT devices to transmit data over public networks. In this article, a secure and optimized real-time system is proposed as an alternative methodology for data transmission from healthcare sensors to the cloud, either through local area or wide area networks. An effective optimization technique is also implemented to provide better storage.

References

1.
van der Meulen
,
R.
, “
Gartner Says 8.4 Billion Connected Things Will Be in Use in 2017, Up 31 Percent from 2016
,” Gartner,
2017
, https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016 (accessed 18 June 2018).
2.
Jara
,
A. J.
,
Zamora
,
M. A.
, and
Skarmeta
,
A. F. G.
, “
HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management
,” presented at the
International Conference on Computational Science and Engineering
, Vancouver, Canada, Aug. 29–31,
2009
,
Institute of Electrical and Electronics Engineers
,
Piscataway, NJ
, pp. 
879
884
.
3.
Bradley
,
T.
, “
Experts Pick the Top 5 Security Threats for 2015
,” PC World,
2016
, https://www.pcworld.com/article/2867566/experts-pick-the-top-5-security-threats-for-2015.html (accessed 18 June 2018).
4.
Lin
,
Y.-H.
,
Jan
,
I.-C.
,
Ko
,
P. C.-I.
,
Chen
,
Y.-Y.
,
Wong
,
J.-M.
, and
Jan
,
G.-J.
, “
A Wireless PDA-Based Physiological Monitoring System for Patient Transport
,”
IEEE Trans. Inf. Technol. Biomed.
, Vol. 
8
, No. 
4
,
2004
, pp. 
439
447
,
5.
Malan
,
D.
,
Fulford-Jones
,
T.
,
Welsh
,
M.
, and
Moulton
,
S.
, “
CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care
,” presented at the
International Workshop on Wearable and Implantable Body Sensor Networks
, London, UK, April 6–7,
2004
,
Imperial College
,
London, UK
.
6.
Van Halteren
,
A.
,
Bults
,
R.
,
Wac
,
K.
,
Konstantas
,
D.
,
Widya
,
I.
,
Dokovsky
,
N.
,
Koprinkov
,
G.
,
Jones
,
V.
, and
Herzog
,
R.
, “
Mobile Patient Monitoring: The MobiHealth System
,”
J. Inf. Technol. Healthcare
, Vol. 
2
, No. 
5
,
2004
, pp. 
365
373
.
7.
Ali
,
A.
and
Khan
,
F. A.
, “
An Improved EKG-Based Key Agreement Scheme for Body Area Networks
,” presented at the
International Conference on Information Security and Assurance
, Miyazaki, Japan, June 23–25,
2010
,
Science and Engineering Research Support Society
,
Daejeon, South Korea
, pp. 
298
308
.
8.
Mayrhofer
,
R.
, “
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
,” presented at the
Fourth European Conference on Security and Privacy in Ad-Hoc and Sensor Networks
, Cambridge, UK, July 2–3,
2007
,
Springer Publishing
,
New York, NY
, pp. 
1
15
.
9.
Mayrhofer
,
R.
and
Gellersen
,
H.
, “
Shake Well before Use: Authentication Based on Accelerometer Data
,” presented at the
Fifth International Conference on Pervasive Computing
, Toronto, Canada, May 13–16,
2007
,
Springer Publishing
,
New York, NY
, pp. 
144
161
.
10.
Ali
,
A.
,
Irum
,
S.
,
Kausar
,
F.
, and
Khan
,
F. A.
, “
A Cluster-Based Key Agreement Scheme Using Keyed Hashing for Body Area Networks
,”
Multimedia Tools Appl.
, Vol. 
66
, No. 
2
,
2013
, pp. 
201
214
,
11.
Ali
,
A.
and
Khan
,
F. A.
, “
Energy-Efficient Cluster-Based Security Mechanism for Intra-WBAN and Inter-WBAN Communications for Healthcare Applications
,”
EURASIP J. Wireless Commun. Networking
, Vol. 
2013
, No. 
1
,
2013
,
216
,
12.
Venkatasubramanian
,
K. K.
and
Gupta
,
S. K. S.
, “
Physiological Value-Based Efficient Usable Security Solutions for Body Sensor Networks
,”
ACM Trans. Sens. Netw.
, Vol. 
6
, No. 
4
,
2010
,
31
,
13.
Khan
,
F. A.
,
Ali
,
A.
,
Abbas
,
H.
, and
Haldar
,
N. A. H.
, “
A Cloud-Based Healthcare Framework for Security and Patients’ Data Privacy Using Wireless Body Area Networks
,”
Procedia Comput. Sci.
, Vol. 
34
,
2014
, pp. 
511
517
,
14.
Moosavi
,
S. R.
,
Gia
,
T. N.
,
Nigussie
,
E.
,
Rahmani
,
A. M.
,
Virtanen
,
S.
,
Tenhunen
,
H.
, and
Isoaho
,
J.
, “
End-to-End Security Scheme for Mobility Enabled Healthcare Internet of Things
,”
Future Gener. Comput. Syst.
, Vol. 
64
,
2016
, pp. 
108
124
,
15.
Simplicio
,
M. A.
, Jr.
,
Silva
,
M. V. M.
,
Alves
,
R. C. A.
, and
Shibata
,
T. K. C.
, “
Lightweight and Escrow-Less Authenticated Key Agreement for the Internet of Things
,”
Comput. Commun.
, Vol. 
98
,
2017
, pp. 
43
51
,
16.
Yang
,
Y.
,
Zheng
,
X.
, and
Tang
,
C.
, “
Lightweight Distributed Secure Data Management System for Health Internet of Things
,”
J. Netw. Comput. Appl.
, Vol. 
89
,
2017
, pp. 
26
37
,
17.
Ray
,
B. R.
,
Abawajy
,
J.
,
Chowdhury
,
M.
, and
Alelaiwi
,
A.
, “
Universal and Secure Object Ownership Transfer Protocol for the Internet of Things
,”
Future Gener. Comput. Syst.
, Vol. 
78
, Part 2,
2018
, pp. 
838
849
,
18.
He
,
D.
,
Chen
,
C.
,
Chan
,
S.
,
Bu
,
J.
, and
Zhang
,
P.
, “
Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks
,”
IEEE J. Biomed. Health Inf.
, Vol. 
17
, No. 
3
,
2013
, pp. 
664
674
,
19.
Deng
,
Y.-Y.
,
Chen
,
C.-L.
,
Tsaur
,
W.-J.
,
Tang
,
Y.-W.
, and
Chen
,
J.-H.
, “
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System
,”
Sensors
, Vol. 
17
, No. 
12
,
2017
,
2919
,
20.
Khan
,
J. S.
,
Aulakh
,
V.
, and
Bosworth
,
A.
, “
What It Takes: Characteristics of the Ideal Personal Health Record
,”
Health Affairs
, Vol. 
28
, No. 
2
,
2009
, pp. 
369
376
,
21.
Ranjani
,
J. J.
, “
Data Hiding Using Pseudo Magic Squares for Embedding High Payload in Digital Images
,”
Multimedia Tools Appl.
, Vol. 
76
, No. 
3
,
2017
, pp. 
3715
3729
,
22.
Zhou
,
Y.-L.
,
Fan
,
X.-P.
,
Liu
,
S.-Q.
, and
Xiong
,
Z.-Y.
, “
Improved LZW Algorithm of Lossless Data Compression for WSN
,” presented at the
Third International Conference on Computer Science and Information Technology
, Chengdu, China, July 9–11,
2010
,
Institute of Electrical and Electronics Engineers
,
Piscataway, NJ
, pp. 
523
527
.
23.
Arduino Products
, https://www.arduino.cc/en/Main/Products (accessed 19 June
2018
).
24.
Tecxtra Technologies
, “
ZigBee CC2500 Transceiver Module
,” https://www.indiamart.com/tecxtratechnologies/zigbee-rf-module.html (accessed 19 June
2018
).
25.
Dhagawkar
,
T.
, “
Wireless Communication with 2.4 GHz RF Transceiver CC2500
,”
Engineers Garage
, https://www.engineersgarage.com/contribution/wireless-communication-24-ghz-rf-transceiver-cc2500 (accessed 19 June
2018
).
26.
Wikipedia
, “
ThingSpeak
,”
2018
, https://en.wikipedia.org/wiki/ThingSpeak (accessed 19 June 2018).
You do not currently have access to this content.