PROTECTION OF SECURITY AND PRIVACY FOR MEDICAL DATA IN WIRELESS MEDICAL SENSOR NETWORKS
|
|
|
- Opal Arnold
- 10 years ago
- Views:
Transcription
1 PROTECTION OF SECURITY AND PRIVACY FOR MEDICAL DATA IN WIRELESS MEDICAL SENSOR NETWORKS C.Gayathri 1, D.Sathya 2 1 Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, Tamil Nadu, (India) 2 Assistant Professor, Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, TamilNadu, (India) ABSTRACT Wireless Sensor Networks (WSN) is an emerging technology that has the potential to transform the way of human life. Healthcare applications are considered promising fields for Wireless Medical Sensor Network, where patient s health can be monitored using Medical Sensors. Wireless Medical Sensor Networks (WMSNs) are the key enabling technology in healthcare applications that allows the data of a patient s vital body parameters to be collected by wearable biosensors. Current WMSN healthcare research trends focus on patient reliable communication, patient mobility and energy-efficient routing. Security and Privacy protection of the collected data is a major unsolved issue. To overcome these issues, symmetric algorithms and attribute based encryptions techniques are adopted, which secures the data transmission and access control system for MSNs. Keywords- Access Control, Data Transmission, Medical Sensor Networks, Privacy, Security. I. INTRODUCTION Wireless Sensor Network (WSN) is a self-configure network of small sensor nodes, where the sensor nodes can communicate among themselves using radio signals, and these sensor nodes can sense, monitor and understand the physical environment. It consists of spatially distributed sensors to monitor physical or environmental conditions and to pass the data through the network to a destination location. The bi-directional modern networks enable to control the activity of the sensors. The development of the wireless sensor networks was motivated by military applications such as battlefield surveillance and is also used in many industrial and consumer applications like industrial process monitoring and control, machine health monitoring, etc [3]. The WSN is built of "nodes", where one or more sensor is connected to each node. Each sensor node consist of several parts, like radio transceiver with an internal antenna to an external antenna, microcontroller, electronic circuit for interfacing with the sensors and an energy source like a battery. II. WIRELESS MEDICAL SENSOR NETWORKS WSNs deployed at a large scale in a distributed manner, and their data rates differs based on their applications, where the Wireless Medical Sensor Networks have direct human involvement are deployed on a small scale 372 P a g e
2 must support mobility (a patient can carry the devices), and WMSNs requires high data rates with reliable communication. Physiological conditions of patients are closely monitored by deploying Wireless medical sensor motes. These medical sensors are used to sense the patient s vital body parameters and transmit the sensed data in a timely fashion to some remote location without human involvement. Using these medical sensor readings the doctor can get the details of a patient s health status. The patient s vital body parameters include heart beats, body temperature, blood pressure, sugar level, pulse rate [3]. WMSNs carry the quality of care across wide variety of healthcare applications. In addition, other applications that also benefit from WMSNs include sports-person health status monitoring and patients self-care. Several research groups and projects have started to develop health monitoring using wireless sensor networks. Wireless Medical healthcare application offers a number of challenges, like, reliable transmission of data, secured data transmission, nodes mobility, detection of event delivery of data in time, power management, etc. Deploying new technologies in healthcare applications without considering security often makes patient privacy vulnerable. For instance, the patient s physiological vital signals are very sensitive so the leakage of the patient s diseased data could makes the patient embarrassed. Sometimes revealing disease information can make it impossible for them to obtain insurance protection and also result in a person losing their job [6]. Further, wireless medical sensor networks cover a broad range of healthcare applications, such as physiological data monitoring, activity monitoring in health-clubs, location tracking for athlete are the broad range of healthcare applications. WMSNs share individual data with physicians and insurance companies. Thus unauthorized collection and use of patient data by adversaries can cause life-threatening risks to the patient and make the patient s private matters publically available. For example, In[16] a simple scenario, a patient s body sensors transmit the body data to a nurse, the patient s privacy is breached when some attacker is eaves dropping. Later that attacker can post the patient data on social site and pose risks to the patient s privacy. Indeed wireless healthcare can offer many advantages to patient monitoring, but the medical health data of an individual are highly vulnerable to various threats, so security and privacy become some of the big concerns for healthcare applications, when it comes to adopting wireless technology. A healthcare provider is subjected to strict civil and criminal penalties if Health Insurance Portability and Accountability Act (HIPAA) rules are not followed properly [4]. Thus the security and privacy of the sensed data is the major concern in healthcare applications. III. LITERATURE SURVEY Cryptographic algorithms are either symmetric algorithms which uses symmetric keys (secret keys), or asymmetric algorithms which uses asymmetric keys (public and private keys). In [12], both the algorithms have the following advantages and disadvantages. 3.1 Symmetric Algorithm ADVANTAGE More secured Requires less space Same key for both encryption and decryption 373 P a g e
3 DISADVANTAGE Key distribution problem 3.2 Asymmetric Algorithm ADVANTAGE Solves key distribution problem Securely exchange message DISADVANTAGE High computation time is required Requires more space In [2], a lightweight and secure system for MSNs is proposed to provide a safe transmission of sensed data, the system employs hash-chain based mechanism and proxy-protected signature technique to achieve secure transmission of the sensed data and access control. The basic idea is as follows, the user registers to the network server, and the registered user is allowed to issue commands to access the collected PHI or control the biosensors according to their access privilege. To achieve this proxy-protected signature by warrant (PSW) is introduced into the system. An original signer and proxy signer are the two important participants. The original signer gives the proxy signer a warrant, and the proxy signer generates a proxy signature using the proxy key given by the original signer. The verifier validate proxy signatures with the public key of the original signer and also verifies the proxy key of the original signer. This prevents the unauthorized access and limits power consumption of sensor nodes. In [1], in order to evaluate the behaviour of each node a secured multicast strategy is proposed; in this only trustworthy nodes are allowed to participate in communications so that the misbehaviour of malicious nodes is prevented. Trust is defined as during the interaction with other node, how a node is trustworthy, secure, or reliable. The criterion for choosing nodes for multicast technique is based on the trust value. By evaluating the node s trust enables the trust system to track the behaviour of all the nodes, security evaluations feedback of other nodes are recorded, and corresponding reactions are made to the tracked behaviour. By this correct nodes can be chosen to participate in the communication and malicious nodes can be avoided. In [9], the focus is on three secure sharing use cases; proof of ownership, where the data owner must prove the ownership of the data tracking, where the data owner must trace unauthorized sharing of the bio signal data and content authentication, and the data owner must prove whether the bio-signal data has been maliciously altered. To address these use cases, a robust watermarking technique is developed to embed security information into bio-signal data in order to protect the semantic fidelity of the data, the bio-signal waveforms are imperceptibly altered, and the watermark is not easily recovered, corrupted or spoofed by malicious attackers. Thus the integrity of the bio-signal is preserved by Water Marking and the data owners can easily track the usage of their data. In [6], a secure and privacy-preserving opportunistic computing framework, called SPOC, is proposed for medical Healthcare emergency. Using SPOC smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive personal health information (PHI) during m- Healthcare emergency with minimal privacy disclosure. To leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-healthcare emergency, an efficient user-centric privacy access 374 P a g e
4 control in SPOC, which is based on an attribute-based access control and privacy-preserving scalar product computation (PPSPC) technique, allows a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. In [10], a novel key agreement scheme that allows neighbouring nodes in BANs to share a common key generated by electrocardiogram (ECG) signals. The improved Jules Sudan (IJS) algorithm is proposed to set up the key agreement for the message authentication. The ECG-IJS key agreement secures data communications over BANs without any key distribution overheads. In this the simulation and experimental results are presented, which demonstrate that the ECG-IJS scheme can achieve better security performance in terms of performance metrics such as false acceptance rate (FAR) and false rejection rate (FRR) than other existing approaches. Based on the IJS algorithm described earlier, propose an ECG-IJS key agreement to secure data communication in BANs. Thus privacy and authentication are preserved in energy efficient way. In [4], stochastic data traffic models for medical wireless sensor networks (WSN s) are presented that represent the traffic generated by a single WSN node monitoring body temperature and electrocardiogram (ECG) data. The models are based on public domain medical signal databases. For energy conservation, it is likely that some medical WSN nodes will employ source coding to reduce the amount of data that must be transmitted. The first scenario to consider is the straightforward case where the node simply transmits the raw 11 bit ECG data at the 360 Hz sampling rate. The second scenario is the more complex case where the node employs source coding. The work considers lossy compression due to the very high compression ratios possible with lossy techniques. IV. EXISTING SYSTEM A lightweight and secure system, for MSNs employs hash-chain based key updating mechanism and proxyprotected signature technique to achieve efficient secure transmission and access control. The basic idea of the existing system is given as follows. After a user registers to the network server, the user is allowed to issue commands to access the collected PHI or control the biosensors according to their privilege. To achieve this proxy-protected signature by warrant (PSW) is introduced into the system. There are two kinds of participants, i.e., an original signer and proxy signers. The proxy signer registers in the network server, which is the original signer generates the proxy keys before the proxy server enters the MSN. Now after obtaining the keys the proxy user becomes the authorized user and can generate commands using those keys to get access to the data [2]. The validity of the key is verified by the network server so that it can prevent unauthorized users. The system involves four phases. The system initialization phase is performed by the network server to set up an MSN. User joining phase is involved before a user can issue commands to the MSN. During the regular use phase, the data from each biosensor node are securely transmitted to the network server via the controller. 375 P a g e
5 Figure 4.1 Flow of Security Information In the user command phase, if a network user has a new command, he/she will need to construct the command and the proxy signature and then send them to the network server (or the controller of a target PAN). If the command verification passes, the network server (or the controller of a target PAN) responds to the user s command. The controller and node side programs are executed on the resource limited sensor nodes, and the network server programs are executed on the PC. Here AES encryption algorithm is used to encrypt the sensed data before transmission. Usually data block of 128 bits is encrypted using three different keys such as 128-bits, 192-bits and 256-bits of key length. MD5 is a one way hash function, where the hash value should match the received data correctly and is used to compress the data size in order to minimize the energy consumption. V. PROPOSED SYSTEM Even though AES is used for encrypting the data is less secured and requires more computation time. In [2], the sensed data is transmitted individually and it requires more energy and data fusion is not done. The enhancement of security and privacy of the sensed data can be achieved in the proposed system by implementing various symmetric encryption algorithms which are very efficient at processing large amounts of information and computationally less intensive than asymmetric encryption algorithms. In Fig. 5.1, consist of various symmetric key algorithms such as mentioned in the below. 376 P a g e
6 Symmetric algorithms like DES, 3DES, AES, Blowfish can be implemented to compare the different computation time take by various algorithms. The above Figure 5.2 is the architecture of the proposed system. Since medical data is of a great privacy concern proper security mechanisms should be adopted while transmitting the data. In the proposed work, the system is initialized by deploying the bio-sensors, and these sensors collect the vital body parameters like heartbeat, sugar level, blood pressure, etc. Various algorithms like DES, 3DES and Blowfish can be implemented and the best is chosen based upon their computation time. The collected data is encrypted using the best symmetric key encryption algorithm, In [11] blowfish algorithm which uses variable number of bits ranging from 32 to 448 bits encrypts the data 16 times than the other encryption algorithms and is said to be the fastest encryption algorithm, and is transmitted to the diagnostic center through controller via internet. Table a, provides the comparative study of different symmetric algorithms used for encryption. Table a: Comparison of Symmetric Key Algorithms The comparitive study shows that blowfish is the best among the implemeted algorithms as it is not exposed to any attack. The type of communication between the sensor node and the controller is called as Intra Body Communication (IBC). Then data fusion will be done in the diagnostic center where several data is fused into one single packet in order to reduce the network traffic and transmission time. Omnibus data fusion model can be adopted where the sensed data is fused using either soft or hard data fusion and the sensor manager is used to manage the fusion. The fused data sent from controller to the diagnostic center and access control policies are adopted with the use of Attribute-based Encryption Signature. The Attribute-based Encryption algorithm consist of four steps: 1. Setup (λ, U) (PK, MK) The setup algorithm takes as input a security parameter λ and a universe description U. PK which is the public parameters and the master secret key MK is the output. 2. Encrypt (PK, M, S) CT The public parameters PK is given as input to the encryption algorithm, a message M and a set of attributes S and outputs a ciphertext CT associated with the attribute set. 3. KeyGen (MK, A) SK The key generation algorithm takes as input the master secret key MK and an access structure A and outputs a private key SK associated with the attributes. 4. Decrypt (SK, CT) M 377 P a g e
7 A private key SK associated with access structure A is given as input to the decryption algorithm and a cipher text CT associated with attribute set S and outputs a message M. The communication between the controller and diagnostic center is called Extra Body Communication (EBC). The authenticated users can participate in EBC. The authentication is achieved through the id, which is the Secret Key(SK) generated by the key generation algorithm. Strict access control policies can be adopted at the diagnostic center based on the user s attributes, i.e. doctors can gain access to the entire medical data, the technicians can access only few data of the patients, and the patients have very limited access to others data. The verification can be done via PDA at the center and the data is available only to the authorized user and unauthorized users cannot access the data. VI. CONCLUSION Healthcare applications are considered promising fields for WMSNs, where patients can be monitored. Transmission in wireless environment needs safety and privacy of medical data. The disadvantage of public-key algorithm is that they are more computationally intensive than symmetric algorithms, this is not significant for a short text message, hence Symmetric cryptographic algorithms can be used to provide security while transmitting the sensed data and access control policies are adopted by attribute based signature technique. Hence the privacy and integrity of data can be perceived during the transmission in wireless environment. REFERENCES [1] AzzedineBoukerche, and YonglinRen, A Secure Mobile Healthcare System using Trust-Based Multicast Scheme,IEEE Journal On Selected Areas In Communications, Vol. 27, No. 4, May 2009, [2] Daojing He, Sammy Chan, Member, IEEE, and Shaohua Tang, Member, IEEE, A Novel and Lightweight System to Secure Wireless Medical Sensor Networks, IEEE Journal Of Biomedical And Health Informatics, Vol. 18, No. 1, January 2014, [3] Denis Trcek And Andrej Brodnik, University Of Ljubljana, Hard And Soft Security Provisioning for Computationally Weak Pervasive Computing Systems In E-Health, IEEE Wireless Communications August 2013, [4] Geoffrey G. Messier and Ivars G. Finvers, Traffic Models for Medical Wireless Sensor Networks, IEEE Communications Letters, Vol. 11, No. 1, January 2007, [5] Oscar Garcia-Morchon, Thomas Falck, Tobias Heer, Klaus Wehrle, Security for Pervasive Medical Sensor Networks, Vol.12, No.2, June 5th 2009, [6] Rongxing Lu, Member, IEEE, Xiaodong Lin, Member, IEEE, and Xuemin (Sherman) Shen, Fellow, IEEE, SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency, IEEE Transactions On Parallel And Distributed Systems, Vol. 12, No. 2, May 2012, [7] Shu-Di Bao, Student Member, IEEE, Carmen C. Y. Poon, Student Member, IEEE, Yuan-Ting Zhang, Fellow, IEEE, and Lian-FengShen, Using the Timing Information of Heartbeats as an Entity Identifier to Secure Body Sensor Network, IEEE Transactions On Information Technology In Biomedicine, Vol. 12, No. 6, November 2008, P a g e
8 [8] S. Moller, T. Newea, S. Lochmannb," Prototype of a secure wireless patient monitoring system for the medical Community, 2011 Elsevier B.V. All rights reserved. [9] VishwaGoudar and MiodragPotkonjak, A Robust Watermarking Technique for Secure Sharing of BASN Generated Medical Data, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. [10] Zhaoyang Zhang, Honggang Wang, Athanasios V. Vasilakos, and Hua Fang, ECG- Cryptography and Authentication in Body Area Networks, IEEE Transactions On Information Technology In Biomedicine, Vol. 16, No. 6, November 2012, [11] E.surya,C.Divya, A Survey on Symmetri Key Encryption Algorithms, International Journal of Computer Science & Communication Networks,Vol 2(4), [12] Tingyuan Nie, and Teng Zhang, A Study of DES and Blowfish Encryption Algorithm, IEEE, [13] Singh, S preet, and Maini, Raman Comparison of Data Encryption Algorithms, International Journal of Computer science and Communication,vol.2,No.1,January-June 2011,pp A. 14] Behrouz A.Forouzan, Cryptography and Network Security, 2nd Ed, Tata Mcgraw hill. [15] Himani Agrawal and Monisha Sharma, Implementation and analysis of various Symmetric Cryptosystems, Indian Journal of science and Technology vol.3,no.12,december [16] Pardeep Kumar and Hoon-Jae Lee, Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey, Published: 22 December 2011, Sensors 2012, 12, P a g e
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Australian Journal of Basic and Applied Sciences. EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system
ISSN:1991-8178 Australian Journal of Basic and Applied Sciences Journal home page: www.ajbasweb.com EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system 1 Vidhya. A, 2 Dr.
Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Alternative Biometric as Method of Information Security of Healthcare Systems
Alternative Biometric as Method of Information Security of Healthcare Systems Ekaterina Andreeva Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia [email protected]
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Efficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Depiction of Body Area Network in Cloud Environment
I JMEIT Vol. 2 Issue 1 Jan 2014 Page No: 55-63 ISSN:2348-196x Depiction of Body Area Network in Cloud Environment P.Sankardayal 1, S.Grahalakshmi 2, P.Gopikannan 3, R.Vidhya Lakshmi 4, G.Sankareswari 5
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud K.S. Aswathy 1, G. Venifa Mini 2 1 M.E. Student, 2 Assistant Professor, Computer Science and Engineering, Noorul
Summer projects for Dept. of IT students in the summer 2015
Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks
IEEE ICC 23 - Wireless Networking Symposium SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman)
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Remote Patient Monitoring- An Implementation in ICU Ward
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Remote Patient Monitoring- An Implementation in ICU Ward Arun E 1+, Marimuthu V 2,
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
A Secure Information Forwarder for Mobile Healthcare System Using Sensors
A Secure Information Forwarder for Mobile Healthcare System Using Sensors A.Santhi, V.Senthilkumar Abstract A secure information forwarder for mobile healthcare system that combines mobile with sensor
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, [email protected] 2 Assistant Professor,
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
Scalable and secure sharing of data in cloud computing using attribute based encryption
Volume :2, Issue :4, 416-420 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Ghodake Shubhangi Joshi Priyanka Khobragade Pranjali Chandak Manjiri Scalable
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Ruchira. H. Titare 1, Prof. Pravin Kulurkar 2, 1 2nd year Mtech CSE, Vidarbha Institute of Technology, Nagpur, India,
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Security and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW
HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW Aejaz Ahmed 1, H C Sateesh Kumar 2 1 M.Tech student, Department of Telecommunication Engineering, DSCE, [email protected]
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
Secure Data Aggregation and Data Recovery in Wireless Sensor Networks
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 49 8958, Volume-, Issue-3, February 3 Secure Data Aggregation and Data Recovery in Wireless Sensor Networks John Major. J, Shajin
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
Security Solutions for Wireless Sensor Networks
Dirk WESTHOFF, Joao GIRAO, Amardeo SARMA Abstract This paper describes security solutions for collecting and processing data in Wireless Sensor Networks (WSNs). Adequate security capabilities for medium
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Author 1 Mr. Parag Jawarkar, Author 2 Mrs. Shweta Lambat Abstract Our paper studied Wireless Sensor Network Application
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS
BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS Samira Mesmoudi and Mohammed Feham STIC Laboratory, University of Tlemcen, Algeria {s_mesmoudi, m_feham}@mail.univ-tlemcen.dz
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS Dr.S.Gunasekaran, M.P.Lavanya Professor, CSE, Coimbatore Institute of Engineering and Tech, Coimbatore PG Scholar, Coimbatore
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING
WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING S. Janani Devi 1, G. S. Sreetha Devi 2, G. M. Tamil Selvan 3 SPG Scholar Bannari Amman Institute of Technology, Alathukombai,
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
How To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
Design and Development of a Wireless Remote POC Patient Monitoring System Using Zigbee
Design and Development of a Wireless Remote POC Patient Monitoring System Using Zigbee A. B. Tagad 1, P. N. Matte 2 1 G.H.Raisoni College of Engineering & Management, Chas, Ahmednagar, India. 2 Departments
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
