4.6 Article

An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks

期刊

SENSORS
卷 19, 期 14, 页码 -

出版社

MDPI
DOI: 10.3390/s19143146

关键词

IoT; security; privacy; anonymous function; healthcare; wireless sensor networks

资金

  1. Scientific Fund Project of Facility Horticulture Laboratory of Universities in Shandong of China [2018YY016]
  2. Doctoral Scientific Fund Project of Weifang University of Science & Technology of China [2017BS17]
  3. Innovation Fund of Ministry of Education, Science and Technology Development Center of China [2018A02013]

向作者/读者索取更多资源

In the age of the Internet of Things, connected devices are changing the delivery system in the healthcare communication environment. With the integration of IoT in healthcare, there is a huge potential for improvement of the quality, safety, and efficiency of health care in addition to promising technological, economical, and social prospects. Nevertheless, this integration comes with security risks such as data breach that might be caused by credential-stealing malware. In addition, the patient valuable data can be disclosed when the perspective devices are compromised since they are connected to the internet. Hence, security has become an essential part of today's computing world regarding the ubiquitous nature of the IoT entities in general and IoT-based healthcare in particular. In this paper, research on the algorithm for anonymizing sensitive information about health data set exchanged in the IoT environment using a wireless communication system has been presented. To preserve the security and privacy, during the data session from the users interacting online, the algorithm defines records that cannot be revealed by providing protection to user's privacy. Moreover, the proposed algorithm includes a secure encryption process that enables health data anonymity. Furthermore, we have provided an analysis using mathematical functions to valid the algorithm's anonymity function. The results show that the anonymization algorithm guarantees safety features for the considered IoT system applied in context of the healthcare communication systems.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Theory & Methods

An intelligent healthcare monitoring framework using wearable sensors and social networking data

Farman Ali, Shaker El-Sappagh, S. M. Riazul Islam, Amjad Ali, Muhammad Attique, Muhammad Imran, Kyung-Sup Kwak

Summary: Wearable sensors and social networking platforms are crucial for healthcare monitoring, generating large volumes of unstructured data. A novel healthcare monitoring framework based on the cloud environment and a big data analytics engine is proposed to efficiently store and analyze healthcare data, improving classification accuracy. Data mining techniques, ontologies, and Bi-LSTM are utilized for efficient preprocessing and classification of healthcare data, leading to accurate health condition classification and drug side effect predictions.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Chemistry, Analytical

Joint Content Placement and Storage Allocation Based on Federated Learning in F-RANs

Tuo Xiao, Taiping Cui, S. M. Riazul Islam, Qianbin Chen

Summary: With the rapid growth of mobile communication and smart mobile devices, F-RAN is proposed to handle the increasing wireless data traffic by deploying content caching to reduce network traffic and latency. The framework based on federated learning aims to predict user demands and optimizes storage resource allocation and content placement through ILP formulation. Simulation results demonstrate the efficiency of the proposed algorithm in minimizing the total traffic cost of the network.

SENSORS (2021)

Editorial Material Computer Science, Information Systems

Internet of Things (IoT)-Based Wireless Health: Enabling Technologies and Applications

S. M. Riazul Islam, Jaime Lloret, Yousaf Bin Zikria

ELECTRONICS (2021)

Article Biology

SCNN: Scalogram-based convolutional neural network to detect obstructive sleep apnea using single-lead electrocardiogram signals

Fazla Rabbi Mashrur, Md. Saiful Islam, Dabasish Kumar Saha, S. M. Riazul Islam, Mohammad Ali Moni

Summary: This study proposes a novel SCNN for detecting sleep apnea, achieving high accuracy and performance in experiments.

COMPUTERS IN BIOLOGY AND MEDICINE (2021)

Article Computer Science, Theory & Methods

Secure crowd-sensing protocol for fog-based vehicular cloud

Lewis Nkenyereye, S. M. Riazul Islam, Muhammad Bilal, M. Abdullah-Al-Wadud, Atif Alamri, Anand Nayyar

Summary: The paper introduces a secure and privacy-preserving crowd-sensing scheme for fog-enabled vehicular computing, utilizing a double layer of fog nodes and ciphertext-policy attribute-based encryption. Data confidentiality and fine-grained access control are ensured in this proposed architecture.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Telecommunications

Simultaneous Cellular and D2D Communications Exploiting Cooperative Uplink NOMA

Md. Fazlul Kader, S. M. Riazul Islam, Octavia A. Dobre

Summary: The novel D2D-UNOMA scheme utilizes non-orthogonal multiple access to improve uplink transmission performance through collaboration between multiple users in two time slots. Numerical results demonstrate a significant enhancement in ergodic sum rate compared to conventional orthogonal multiple access methods.

IEEE COMMUNICATIONS LETTERS (2021)

Article Energy & Fuels

Environment Friendly Energy Cooperation in Neighboring Buildings: A Transformed Linearization Approach

Habib Ur Rehman, Sajjad Ali Haider, Syed Rameez Naqvi, Muhammad Naeem, Kyung-Sup Kwak, S. M. Riazul Islam

Summary: This paper proposes an energy cooperation mechanism among neighboring buildings, which adjusts renewable energy tariff and uses a mathematical model to minimize operational costs. Simulation results show that the proposed cooperation model can save over 20% of energy costs.

ENERGIES (2022)

Article Engineering, Electrical & Electronic

Device-to-Device Aided Cooperative NOMA Transmission Exploiting Overheard Signal

Md Fazlul Kader, S. M. Riazul Islam, Octavia A. Dobre

Summary: This paper proposes a novel device-to-device aided cooperative non-orthogonal multiple access (D2D-SG-NOMA) scheme, which improves the delay-tolerant capacity (DTC) by employing decode-and-forward relaying and reducing interference. The results show that D2D-SG-NOMA achieves higher DTC compared to the existing SR-NOMA scheme in different scenarios, although it may suffer from increased inter-symbol interference at high signal-to-noise ratios (SNR).

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2022)

Article Computer Science, Information Systems

CATComp: A Compression-Aware Authorization Protocol for Resource-Efficient Communications in IoT Networks

Mahmud Hossain, Golam Kayas, Yasser Karim, Ragib Hasan, Jamie Payton, S. M. Riazul Islam

Summary: This article introduces a compression-aware authorization protocol called CATComp, which enables IoT devices to exchange small-sized certificates and capability tokens over the IEEE 802.15.4 medium. By reducing the size of security materials, CATComp decreases communication latency and energy consumption, thereby improving device response speed and battery life.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Diagnosis of Malaria Using Double Hidden Layer Extreme Learning Machine Algorithm With CNN Feature Extraction and Parasite Inflator

Md. Omaer Faruq Goni, Md. Nazrul Islam Mondal, S. M. Riazul Islam, Md. Nahiduzzaman, Md. Robiul Islam, Md. Shamim Anower, Kyung-Sup Kwak

Summary: Malaria, a worldwide life-threatening disease, requires a reliable and fast early prognosis infrastructure. This paper proposes an unorthodox method based on an extreme learning machine (ELM) algorithm to detect malaria. The proposed CNN-DELM model achieves high accuracy and robustness in detecting malaria, outperforming traditional methods and producing comparable or better results.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

A Deep Learning Model for Remaining Useful Life Prediction of Aircraft Turbofan Engine on C-MAPSS Dataset

Owais Asif, Sajjad Ali Haider, Syed Rameez Naqvi, John F. W. Zaki, Kyung-Sup Kwak, S. M. Riazul Islam

Summary: This paper highlights the importance of accurately predicting the remaining useful life (RUL) of industrial machinery and proposes the use of deep learning-based LSTM networks to improve prediction accuracy. Additionally, an improved piecewise linear degradation model and pre-processing techniques are introduced to enhance predictive performance.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Introducing Cloud-Assisted Micro-Service-Based Software Development Framework for Healthcare Systems

John Zaki, S. M. Riazul Islam, Norah Saleh Alghamdi, M. Abdullah-Al-Wadud, Kyung-Sup Kwak

Summary: The development of healthcare applications is considered complex and time-consuming. Traditional approaches such as monolithic and service-oriented architecture (SOA) generate problems in service availability, remote access, provisioning, scalability, and integration with other healthcare systems. This paper proposes a microservices framework using cloud computing infrastructure to address these issues. The approach improves efficiency, scalability, and performance, and contributes to system design and analysis in healthcare application development.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Towards Prevention of Sportsmen Burnout: Formal Analysis of Sub-Optimal Tournament Scheduling

Syed Rameez Naqvi, Adnan Ahmad, S. M. Riazul Islam, Tallha Akram, M. Abdullah-Al-Wadud, Atif Alamri

Summary: This article discusses the complexity of scheduling sports tournaments, especially those with strict time constraints. It emphasizes the importance of ensuring fairness between teams in terms of rest days, travel time, and successive games. The article proposes competitive parameters and uses root mean squared error to measure the unfairness in rest day distribution.

CMC-COMPUTERS MATERIALS & CONTINUA (2022)

Article Computer Science, Information Systems

On the Intercept Probability and Secure Outage Analysis of Mixed (α - κ - μ)-Shadowed and Malaga Turbulent Models

Noor Ahmad Sarker, A. S. M. Badrudduza, S. M. Riazul Islam, Sheikh Habibul Islam, Milton Kumar Kundu, Imran Shafique Ansari, Kyung-Sup Kwak

Summary: This study investigates the secrecy performance of a dual-hop RF-FSO DF relaying network, deriving closed-form analytical expressions and conducting Monte-Carlo simulations for verification. The results demonstrate that fading, shadowing, detection techniques, atmospheric turbulence, and pointing error significantly impact secrecy performance, with better performance achieved using the HD technique compared to the IM/DD technique at the destination.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Exploiting Secrecy Performance of Uplink NOMA in Cellular Networks

Minh-Sang Van Nguyen, Dinh-Thuan Do, Fatemeh Afghah, S. M. Riazul Islam, Anh-Tu Le

Summary: The study focuses on secrecy transmission in uplink non-orthogonal multiple access (NOMA) with the presence of an eavesdropper, analyzing metrics such as secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). The proposed schemes are evaluated for system secure performance, showing that better secrecy performance can be achieved by improving channel conditions and signal-to-noise ratio (SNR) at the base station. Results indicate existence of secrecy performance gaps among users due to different power allocation factors assigned to them.

IEEE ACCESS (2021)

暂无数据