Skip to main content
Erschienen in: Cluster Computing 6/2019

28.02.2018

A novel medical internet of things perception system based on visual image encryption and intrusion detection

verfasst von: Aiying Guo, Meihua Xu, Feng Ran, Haiyong Wang

Erschienen in: Cluster Computing | Sonderheft 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Smart cities are the emerging topics in the recent decade with advancements in science and technology especially in the areas of communication technologies. Concept of smart cities depicts the inteconnectivity of physical objects to provide transparency in communication between the physical components or objects. However, implementation of a smart city using Internet of Things (IoT) which is the backbone architecture is affected by several attacks in the wireless communication domain during communication of information between the components as well as cyber-attacks which necessiate the need for the intrusion detection mechanism to prevent any illegeal loss data. This research paper addresses these security issues by implementing the IoT architecture and systematically analysing the demands in security aspects as well as justifying the results with experimentations conducted in a simulated smart city environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cirani, S., Ferrari, G., Veltri, L.: Enforcing security mechanisms in the IP based internet of things: an algorithmic overview. Int. J. Sens. 6, 197–226 (2013)MATH Cirani, S., Ferrari, G., Veltri, L.: Enforcing security mechanisms in the IP based internet of things: an algorithmic overview. Int. J. Sens. 6, 197–226 (2013)MATH
3.
Zurück zum Zitat Yue, L.H., Guo, L., Li, R., Asaeda, H., Fang, Y.: From data clouds: enabling community-based data-centric services over the internet of things. IEEE Int. Things J. 1(5), 472–482 (2014)CrossRef Yue, L.H., Guo, L., Li, R., Asaeda, H., Fang, Y.: From data clouds: enabling community-based data-centric services over the internet of things. IEEE Int. Things J. 1(5), 472–482 (2014)CrossRef
4.
Zurück zum Zitat Mandal, P.C.: Superiority of blowfish algorithm. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(9), 196–201 (2012) Mandal, P.C.: Superiority of blowfish algorithm. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(9), 196–201 (2012)
5.
Zurück zum Zitat Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9(4), 289–306 (2015) Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9(4), 289–306 (2015)
6.
Zurück zum Zitat Muthukumar, G., Raj, G.D.P.: A comparative analysis on symmetric key encryption algorithms. Int. J. Adv. Res. Comput. Eng. Technol. 3(2), 1087–1097 (2014) Muthukumar, G., Raj, G.D.P.: A comparative analysis on symmetric key encryption algorithms. Int. J. Adv. Res. Comput. Eng. Technol. 3(2), 1087–1097 (2014)
7.
Zurück zum Zitat Can, O., Sahingoz, OK.: “A survey of intrusion detection systems in wireless sensor networks”. In: 6th international conference on modeling, simulation, and applied optimization, 2015 Can, O., Sahingoz, OK.: “A survey of intrusion detection systems in wireless sensor networks”. In: 6th international conference on modeling, simulation, and applied optimization, 2015
8.
Zurück zum Zitat Welbourne, E., et al.: Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Comput. 13(3), 48–55 (2009)CrossRef Welbourne, E., et al.: Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Comput. 13(3), 48–55 (2009)CrossRef
9.
Zurück zum Zitat Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the Internet of Things: a survey. IEEE Commun. Surv 16(1), 414–454 (2013)CrossRef Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the Internet of Things: a survey. IEEE Commun. Surv 16(1), 414–454 (2013)CrossRef
10.
Zurück zum Zitat Atzori, L., Iera, A., Morabito, G.: From `smart objects’ to `social objects’: the next evolutionary step of the internet of things. IEEE Commun. Mag. 52(1), 97–105 (2014)CrossRef Atzori, L., Iera, A., Morabito, G.: From `smart objects’ to `social objects’: the next evolutionary step of the internet of things. IEEE Commun. Mag. 52(1), 97–105 (2014)CrossRef
11.
Zurück zum Zitat Ortiz, A.M., Hussein, D., Park, S., Han, S.N., Crespi, N.: The cluster between internet of things and social networks: review and research challenges. IEEE Internet Things J. 1(3), 206–215 (2014)CrossRef Ortiz, A.M., Hussein, D., Park, S., Han, S.N., Crespi, N.: The cluster between internet of things and social networks: review and research challenges. IEEE Internet Things J. 1(3), 206–215 (2014)CrossRef
12.
Zurück zum Zitat Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the internet of things: a standardization perspective. IEEE Internet Things J. 1(3), 265–275 (2014)CrossRef Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the internet of things: a standardization perspective. IEEE Internet Things J. 1(3), 265–275 (2014)CrossRef
13.
Zurück zum Zitat Chen, M., Wan, J., Li, F.: Machine-to-machine communications: architecture, standards and applications. KSII Trans. Internet Inf. Syst. 6(2), 480–497 (2012) Chen, M., Wan, J., Li, F.: Machine-to-machine communications: architecture, standards and applications. KSII Trans. Internet Inf. Syst. 6(2), 480–497 (2012)
14.
Zurück zum Zitat Kavitha, T., Sridharan, D.: Security vulnerabilities in wireless sensor networks: a survey. J. inf. assur. secur. 5, 31–44 (2010) Kavitha, T., Sridharan, D.: Security vulnerabilities in wireless sensor networks: a survey. J. inf. assur. secur. 5, 31–44 (2010)
15.
Zurück zum Zitat Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEEE Wirel. Commun. 11(6), 6–28 (2004)CrossRef Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEEE Wirel. Commun. 11(6), 6–28 (2004)CrossRef
16.
Zurück zum Zitat Jerbi, M., et al.: Towards efficient geographic routing in urban vehicular networks. IEEE Trans Veh. Technol 58(9), 5048–5059 (2009)CrossRef Jerbi, M., et al.: Towards efficient geographic routing in urban vehicular networks. IEEE Trans Veh. Technol 58(9), 5048–5059 (2009)CrossRef
17.
Zurück zum Zitat Sun, Y.L., Han, Z., Liu, K.J.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(2), 112–119 (2008)CrossRef Sun, Y.L., Han, Z., Liu, K.J.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(2), 112–119 (2008)CrossRef
18.
Zurück zum Zitat Raymond, D.R., Midkiff, S.F.: Denial of service in wireless sensor network: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)CrossRef Raymond, D.R., Midkiff, S.F.: Denial of service in wireless sensor network: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)CrossRef
19.
Zurück zum Zitat Qian, Y., Lu, K., Tipper, D.: A design for secure and survivable wireless sensor networks. IEEE Wirel. Commun. 14(5), 30–37 (2007)CrossRef Qian, Y., Lu, K., Tipper, D.: A design for secure and survivable wireless sensor networks. IEEE Wirel. Commun. 14(5), 30–37 (2007)CrossRef
20.
Zurück zum Zitat Mohammad, A.R., Rjoub, A., Baset, A.: A low-energy security algorithm for exchanging information in wireless sensor networks. J. Inf. Assur. Secur. 4(1), 48–59 (2009) Mohammad, A.R., Rjoub, A., Baset, A.: A low-energy security algorithm for exchanging information in wireless sensor networks. J. Inf. Assur. Secur. 4(1), 48–59 (2009)
21.
Zurück zum Zitat Gendreau, A.A., Moorman, M.: “Survey of intrusion detection systems towards an end to end secure internet of things” In: proceedings of international conference on future internet of things and cloud, (2016) Gendreau, A.A., Moorman, M.: “Survey of intrusion detection systems towards an end to end secure internet of things” In: proceedings of international conference on future internet of things and cloud, (2016)
22.
Zurück zum Zitat Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99–105 (2008)CrossRef Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99–105 (2008)CrossRef
23.
Zurück zum Zitat Batalla, J.M., Krawiec, P.: Conception of ID layer performance at the network level for internet of things. Pers. Ubiquit. Comput. 18(2), 465–480 (2014)CrossRef Batalla, J.M., Krawiec, P.: Conception of ID layer performance at the network level for internet of things. Pers. Ubiquit. Comput. 18(2), 465–480 (2014)CrossRef
24.
Zurück zum Zitat Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)CrossRef Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)CrossRef
25.
Zurück zum Zitat El_Deen, A., El-Sayed, A., El-Badawy, E., Gobarn, N.: Digital image encryption based on RSA algorithm. Int. J. Electro. Commun. Eng. 9(1), 69–73 (2014) El_Deen, A., El-Sayed, A., El-Badawy, E., Gobarn, N.: Digital image encryption based on RSA algorithm. Int. J. Electro. Commun. Eng. 9(1), 69–73 (2014)
26.
Zurück zum Zitat Deshmukh, S., Deshmukh, S., Patil, R.: Hybrid cryptography technique using modified diffiehellman and RSA”. Int. Comput. Sci. Inf. Technol. 5(6), 7302–7304 (2014) Deshmukh, S., Deshmukh, S., Patil, R.: Hybrid cryptography technique using modified diffiehellman and RSA”. Int. Comput. Sci. Inf. Technol. 5(6), 7302–7304 (2014)
Metadaten
Titel
A novel medical internet of things perception system based on visual image encryption and intrusion detection
verfasst von
Aiying Guo
Meihua Xu
Feng Ran
Haiyong Wang
Publikationsdatum
28.02.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 6/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1944-2

Weitere Artikel der Sonderheft 6/2019

Cluster Computing 6/2019 Zur Ausgabe