Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Secure Data Transmission with BLAKE2 Algorithm in E-Health care System

Author : K.Ilakkya 1 K.Ramya 2

Date of Publication :23rd March 2018

Abstract: The body sensor sort out (BSN) development is a champion among the most fundamental headways used as a piece of IoT-based present day human administrations system. In this Procedure, at first we address the few security requirements in BSN based present day human administrations system. By then, we propose a safe IoT based social protection structure using BSN, called BSN-Care, which can guarantee to successfully complete those requirements.BSN configuration made out of wearable and implantable sensors. Each sensor center is composed with bio-sensors, for instance, Electrocardiogram (ECG)Electromyography (EMG), Electroencephalography (EEG), Circulatory strain (BP), et cetera. These sensors accumulate the physiological parameters and forward them to a facilitator called Nearby Handling Unit (LPU).The LPU goes about as a switch between the BSN center points and the central server called BSN-Care server, using the remote correspondence mediums, for instance, compact frameworks 3G/CDMA/GPRS. In addition, when the LPU perceives any varieties from the standard then it gives provoke alert to the person that wearing the bio-sensors. In this wander, we delineate the key security necessities in IoT based social protection system using BSN

Reference :

    1. L. Atzori, A. Iera, and G. Morabito, ‘‘The Internet of Things: A survey,’’ Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
    2. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, ‘‘Internet of Things (IoT): A vision, architectural elements, and future directions,’’ Future Generat. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013.
    3. D. Dolev and A. Yao, ‘‘On the security of public key protocols,’’ IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198–208, Mar. 1983. 
    4. T. S. Messerges, E. A. Dabbish, and R. H. Sloan, ‘‘Examining smart-card security under the threat of power analysis attacks,’’ IEEE Trans. Comput., vol. 51, no. 5, pp. 541–552, May 2002.
    5.  P. Kocher, J. Jaffe, and B. Jun, ‘‘Differential power analysis,’’ in Advances in Cryptology, vol. 1666. Berlin, Germany: Springer-Verlag, 1999, pp. 388–397.
    6.  N. Koblitz, ‘‘Elliptic curves cryptosystems,’’ Math. Comput., vol. 48 , pp. 203–209, Sep. 1987.
    7. T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, ‘‘DTLS based security and two-way authentication for the Internet of Things,’’ Ad Hoc Netw., vol. 11, no. 8, pp. 2710–2723, Sep. 2013.
    8. D. Liu, P. Ning, S. Zhu, and S. Jajodia, ‘‘Practical broadcast authentication in sensor networks,’’ in Proc. 2nd Annu. Int. Conf. Mobile Ubiquitous Syst. Netw. Serv. (MobiQuitous), San Diego, CA, USA, 2005, pp. 118–129

Recent Article