Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 1/2020

28.03.2019

Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN

verfasst von: Ata Ullah, Ghawar Said, Muhammad Sher, Huansheng Ning

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid increase in number of sensing devices for healthcare, researchers are getting growing interest due to wide application support and new challenging scenarios. Internet of Things (IoT) comprises of huge number of connected devices with a variety of sensing support especially in medical health parameters sensing. In these scenarios, secure data collection and transmission to centralized servers is quite challenging to protect against several attacks for illegal data access. Existing solutions suffer from storage, communication and energy overheads. To resolve these issues, this paper presents a FoG assisted scheme for healthcare data aggregation in a secure and efficient manner.. We have involved the peer-to-peer communication between healthcare sensing devices and wearables to share secret data with an aggregating node that can share data with FoG server. In this scenario, an aggregator may be away from FoG server and cannot transmit data directly. However, it can share the encrypted data with the neighboring aggregator to transmit data to FoG server by appending in its current aggregated data. FoG server can extract the required values from the data and can save in the local repository that can be further updated later in cloud repositories. For these functionalities, we have presented two algorithms for message receiving at aggregator and message extraction at FoG server. Moreover, compression mechanism is also presented to further reduce the communication costs. We have performed simulations using TCL and C files in NS2.35 to generate trace files and then executed AWK scripts to extract results. Results prove the supremacy of proposed scheme over existing schemes in terms of storage, communication, transmission ratio, energy consumption and resilience.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) Internet of things: a survey. Comput Netw 54:2787–2805CrossRef Atzori L, Iera A, Morabito G (2010) Internet of things: a survey. Comput Netw 54:2787–2805CrossRef
2.
Zurück zum Zitat Ning H (2013) Unit and ubiquitous internet of things. CRC Press Ning H (2013) Unit and ubiquitous internet of things. CRC Press
3.
Zurück zum Zitat Akyildiz IF, Kasimoglu IH (2004) Wireless sensor and actor networks: research challenges. Ad Hoc Netw 2(4):351–367CrossRef Akyildiz IF, Kasimoglu IH (2004) Wireless sensor and actor networks: research challenges. Ad Hoc Netw 2(4):351–367CrossRef
4.
Zurück zum Zitat Kulkarni A, Sathe S (2014) Healthcare applications of the internet of things: a review. International Journal of Computer Science and Information Technologies 5(5):6229–6232 Kulkarni A, Sathe S (2014) Healthcare applications of the internet of things: a review. International Journal of Computer Science and Information Technologies 5(5):6229–6232
5.
Zurück zum Zitat Bhasker L (2014) Genetically derived secure cluster-based data aggregation in wireless sensor networks. IET Information Security 8(1):1–7CrossRef Bhasker L (2014) Genetically derived secure cluster-based data aggregation in wireless sensor networks. IET Information Security 8(1):1–7CrossRef
6.
Zurück zum Zitat Suhardi AR (2016) A survey of security aspects for internet of things in healthcare. In: Kim K, Joukov N (eds) Information science and applications (ICISA), lecture notes in electrical engineering, vol 376. Springer, Singapore, pp 1237–1247 Suhardi AR (2016) A survey of security aspects for internet of things in healthcare. In: Kim K, Joukov N (eds) Information science and applications (ICISA), lecture notes in electrical engineering, vol 376. Springer, Singapore, pp 1237–1247
7.
Zurück zum Zitat Kupwade Patil H, Seshadri R (2014) Big data security and privacy issues in healthcare. In: IEEE International Congress on Big Data, Anchorage, pp 762–765 Kupwade Patil H, Seshadri R (2014) Big data security and privacy issues in healthcare. In: IEEE International Congress on Big Data, Anchorage, pp 762–765
8.
Zurück zum Zitat Luo X, Zhang D, Yang LT, Liu J, Chang X, Ning H (2016) A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems. Futur Gener Comput Syst 61:85–96CrossRef Luo X, Zhang D, Yang LT, Liu J, Chang X, Ning H (2016) A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems. Futur Gener Comput Syst 61:85–96CrossRef
9.
Zurück zum Zitat Kodali RK, Swamy G, Lakshmi B (2015) An implementation of IoT for healthcare. In: IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, pp 411–416 Kodali RK, Swamy G, Lakshmi B (2015) An implementation of IoT for healthcare. In: IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, pp 411–416
10.
Zurück zum Zitat Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42CrossRef Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42CrossRef
11.
Zurück zum Zitat Marjani M et al (2017) Big IoT data analytics: Architecture,opportunities and open research challenges. IEEE Access 5:5247–5261CrossRef Marjani M et al (2017) Big IoT data analytics: Architecture,opportunities and open research challenges. IEEE Access 5:5247–5261CrossRef
12.
Zurück zum Zitat Islam SMR, Kwak D, Kabir MH, Hossain M, Kwak K (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708CrossRef Islam SMR, Kwak D, Kabir MH, Hossain M, Kwak K (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708CrossRef
13.
Zurück zum Zitat Mahmood Z, Ning H, Ullah A, Yao X (2017) Secure authentication and prescription safety protocol for telecare health services using ubiquitous IoT. Appl Sci 7(10):1069CrossRef Mahmood Z, Ning H, Ullah A, Yao X (2017) Secure authentication and prescription safety protocol for telecare health services using ubiquitous IoT. Appl Sci 7(10):1069CrossRef
14.
Zurück zum Zitat Patel PD, Pranav B, Ravindra V (2012) Data aggregation in wireless sensor network. International Journal of Management, IT and Engineering (IJMIE) 2(7):457–472 Patel PD, Pranav B, Ravindra V (2012) Data aggregation in wireless sensor network. International Journal of Management, IT and Engineering (IJMIE) 2(7):457–472
15.
Zurück zum Zitat Akkaya K, Ari I (2008) In-network data aggregation in wireless sensor networks. In: Bidgoli H (ed) Handbook of computer networks, vol 2. John Wiley & Sons, Hoboken, pp 1131–1146 Akkaya K, Ari I (2008) In-network data aggregation in wireless sensor networks. In: Bidgoli H (ed) Handbook of computer networks, vol 2. John Wiley & Sons, Hoboken, pp 1131–1146
16.
Zurück zum Zitat Fasolo E, Rossi M, Widmer J, Zorzi M (2007) In-network aggregation techniques for wireless sensor networks: a survey. IEEE Wirel Commun 14:70–87CrossRef Fasolo E, Rossi M, Widmer J, Zorzi M (2007) In-network aggregation techniques for wireless sensor networks: a survey. IEEE Wirel Commun 14:70–87CrossRef
17.
Zurück zum Zitat Gelogo YE, Kim H (2015) A design of secure e-health data management system. Journal of Security Engineering 12(2):181–190CrossRef Gelogo YE, Kim H (2015) A design of secure e-health data management system. Journal of Security Engineering 12(2):181–190CrossRef
18.
Zurück zum Zitat Othman SB, Trad A, Youssef H (2013) Secure data aggregation with MAC authentication in wireless sensor networks. In Proc. 12th IEEE international conference on trust, security and privacy in computing and communications, pp-188–195 Othman SB, Trad A, Youssef H (2013) Secure data aggregation with MAC authentication in wireless sensor networks. In Proc. 12th IEEE international conference on trust, security and privacy in computing and communications, pp-188–195
19.
Zurück zum Zitat Mantri D, Prasad NR, Prasad R. (2012) Grouping of clusters for efficient data aggregation (GCEDA) in wireless sensor network. In Proc. IEEE international advance computing conference (IACC), pp-132–137 Mantri D, Prasad NR, Prasad R. (2012) Grouping of clusters for efficient data aggregation (GCEDA) in wireless sensor network. In Proc. IEEE international advance computing conference (IACC), pp-132–137
20.
Zurück zum Zitat Barak A, Gulia P (2012) Data compression in wireless sensor network. In: International journal of Computer Science & Management Studies (IJCSMS), vol. no12, pp-93-96 Barak A, Gulia P (2012) Data compression in wireless sensor network. In: International journal of Computer Science & Management Studies (IJCSMS), vol. no12, pp-93-96
21.
Zurück zum Zitat Jose J, Kumar SM, Jose J (2013) Energy efficient recoverable concealed data aggregation in wireless sensor networks. In Proc IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), pp-332-329, 2013 Jose J, Kumar SM, Jose J (2013) Energy efficient recoverable concealed data aggregation in wireless sensor networks. In Proc IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), pp-332-329, 2013
22.
Zurück zum Zitat Hu L, Evans D (2003) Secure aggregation for wireless networks. In Proc. security and Assurance in ad hoc networks (SAAN), pp. 1–8 Hu L, Evans D (2003) Secure aggregation for wireless networks. In Proc. security and Assurance in ad hoc networks (SAAN), pp. 1–8
23.
Zurück zum Zitat Lin X, Lu R, Shen X (2010) MDPA: multidimensional privacy preserving aggregation scheme for wireless sensor networks. Wiley Journal of Wireless Communication and Mobile Computing 10(6):843–856 Lin X, Lu R, Shen X (2010) MDPA: multidimensional privacy preserving aggregation scheme for wireless sensor networks. Wiley Journal of Wireless Communication and Mobile Computing 10(6):843–856
24.
Zurück zum Zitat Han S, Zhao S, Li Q, Ju C, Zhou W (2016) PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance. IEEE Transactions on Information Forensics and Security 11(9):1940–1955CrossRef Han S, Zhao S, Li Q, Ju C, Zhou W (2016) PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance. IEEE Transactions on Information Forensics and Security 11(9):1940–1955CrossRef
25.
Zurück zum Zitat Zhang K, Liang X, Baura M, Lu R, Shen X (2014) PHDA: a priority based health data aggregation with privacy preservation for cloud assisted WBANs. Inf Sci 284:130–141MathSciNetCrossRef Zhang K, Liang X, Baura M, Lu R, Shen X (2014) PHDA: a priority based health data aggregation with privacy preservation for cloud assisted WBANs. Inf Sci 284:130–141MathSciNetCrossRef
26.
Zurück zum Zitat Zhang C, Li C, Zhang J (2015) A secure privacy-preserving data aggregation model in wearable wireless sensor networks. Journal of Electrical and Computer Engineering 2015(61):1–9MathSciNet Zhang C, Li C, Zhang J (2015) A secure privacy-preserving data aggregation model in wearable wireless sensor networks. Journal of Electrical and Computer Engineering 2015(61):1–9MathSciNet
27.
Zurück zum Zitat Huang S-I, Shieh S, Tygar JD (2010) Secure encrypted-data aggregation for wireless sensor networks. Journal of Wireless Networks 16(4):915–927CrossRef Huang S-I, Shieh S, Tygar JD (2010) Secure encrypted-data aggregation for wireless sensor networks. Journal of Wireless Networks 16(4):915–927CrossRef
28.
Zurück zum Zitat Gunasekaran P, Sivakumar B (2012) Encryption and signature scheme implementation for data integrity using recoverable concealed data aggregation. International Journal of Electronics and Computer Science Engineering 01(04):2417–2423 Gunasekaran P, Sivakumar B (2012) Encryption and signature scheme implementation for data integrity using recoverable concealed data aggregation. International Journal of Electronics and Computer Science Engineering 01(04):2417–2423
29.
Zurück zum Zitat Mekikis P, Antonopoulos A, Kartsakli E, Passas N, Alonso L, Verikoukis C (2017) Stochastic modeling of wireless charged wearables for reliable health monitoring in hospital environments. IEEE International Conference on Communications (ICC), Paris, France:1–6 Mekikis P, Antonopoulos A, Kartsakli E, Passas N, Alonso L, Verikoukis C (2017) Stochastic modeling of wireless charged wearables for reliable health monitoring in hospital environments. IEEE International Conference on Communications (ICC), Paris, France:1–6
30.
Zurück zum Zitat Sharma S, Chen K, Sheth A (2018) Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Comput 22(2):42–51CrossRef Sharma S, Chen K, Sheth A (2018) Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Comput 22(2):42–51CrossRef
31.
Zurück zum Zitat Yang Y, Liu X, Deng RH (2018) Lightweight break-glass access control system for healthcare internet-of-things. in IEEE Transactions on Industrial Informatics 14(8):3610–3617CrossRef Yang Y, Liu X, Deng RH (2018) Lightweight break-glass access control system for healthcare internet-of-things. in IEEE Transactions on Industrial Informatics 14(8):3610–3617CrossRef
32.
Zurück zum Zitat Lalos AS et al (2015) RLNC-aided cooperative compressed sensing for energy efficient vital signal Telemonitoring. IEEE Trans Wirel Commun 14(7):3685–3699CrossRef Lalos AS et al (2015) RLNC-aided cooperative compressed sensing for energy efficient vital signal Telemonitoring. IEEE Trans Wirel Commun 14(7):3685–3699CrossRef
Metadaten
Titel
Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
verfasst von
Ata Ullah
Ghawar Said
Muhammad Sher
Huansheng Ning
Publikationsdatum
28.03.2019
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 1/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00745-z

Weitere Artikel der Ausgabe 1/2020

Peer-to-Peer Networking and Applications 1/2020 Zur Ausgabe