Smart City Gnosys

Smart city article details

Title Iot-Based Smart Healthcare System With Hybrid Key Generation And Dna Cryptography
ID_Doc 34009
Authors Vidhya E.
Year 2024
Published Blockchain and IoT based Smart Healthcare Systems
DOI http://dx.doi.org/10.2174/9789815196290124010011
Abstract Many applications, such as smart health care, smart cities, smart homes, self-driving cars, IoT retail shops, tele-health, traffic management, and so on, will use IoT devices to generate information. In these tenders, smart health care is single of the most imperative because it generates sensitive information like disease managing, drug managing, secluded patient checking, defensive care, and so on. This large amount of information is acquired and recorded from a variety of sources (mobile phones, software, sensors, e-mail, applications and so on). These sources contain a basic encryption process, so hackers can easily hack the information and misuse it. These issues are taken by researchers, and they find solutions, but they do not fulfill the needs of encryption. Key generation is critical for encryption and decryption because a strong key increases the encryption and decryption level. In this chapter, the proposed system is designed and implemented with a strong key generation (KG) to encrypt (encr) and decrypt (decp) the information that is compatible with the limited processing capabilities of IoT devices. In this system, the mathematical key generation algorithm is created with the hybrid of prime numbers and pseudo random numbers using the Exclusive OR function. Besides, the DNA Cryptography algorithm is used to encrypt and decrypt the information. The above system makes it hard for hackers to break into. When paralleled with illustrious cryptographic schemes, the tentative outcomes of the proposed system show the best effects for every IoT scheme in terms of encryption time and key entropy. When equal to other surviving encryption schemes, the proposed system has a restored avalanche effect and key entropy value for achieving the security goals. The above security goals illustrate that such a scheme is able to protect IoT documents from present attacks. © 2024 Bentham Science Publishers.
Author Keywords DNA Cryptography; IoT devices; Prime number; Pseudo random number


Similar Articles


Id Similarity Authors Title Published
2336 View0.854Boussada R.; Elhdhili M.E.; Saidane L.A.A Lightweight Privacy-Preserving Solution For Iot: The Case Of E-HealthProceedings - 20th International Conference on High Performance Computing and Communications, 16th International Conference on Smart City and 4th International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018 (2019)