CONCEALMENT SECURITY FOR MOBILE THERAPEUTIC FEELER DATA

K. Nagamma, K.Ashok Babu

Abstract


In today agedness, mobile sensor networks have been regular in healthcare applications, being institution and home victim monitoring. Wireless pharmaceutical sensor networks are more sensitive to eavesdropping, adjustment, acting and rehash besieges than the circuited networks. A lot of work out-of-date done to reliable radio medicinal sensor networks. The real solutions can save the inmate data at the time automatic transmission, but cannot stop the innards beat spot the superintendent of the sufferer directory reveals the delicate inmate data. In this card, we urge a viable wayto avoid the indoors beat by accepting different data hostess to store inmate data. The main grant on this subject script is heavily distributing the inmate data in legion data assistant and employing the Parlier and Megamall cryptosystems to show action reasoning on the subject data on the outside compromising the cases’ privacy.


Keywords


:Wireless Medical Sensor Network; Patient Data Privacy;ParlierEncryption; And MegamallEncryption;

References


S. Raaz, H. Lee, S. Lee, and Y. K. Lee, “BARI+: A biometric based distributed key management approach for wireless body area networks,” Sensors, vol. 10, pp. 3911–3933, 2010.

SHA-3 Standard: Permutation-based hash and extendable-output functions. Draft FIPS PUB 202 [Online]. Available: http: csrc. nest. govpublicationsdraftsfips202fips_202_draft.pdf, May 2014.

P. Paillier, “Public-key cryptosystems based on composite degree residuosityclasses,” in Proc. 17th Int. Conf. Theory Appl. Cryptograph. Techn., 1999, pp. 223–238.

A. B. Waluyo, I. Pek, X. Chen, and W.-S. Yeoh, “Design and evaluation of lightweight middleware for personal wireless body area network,” Personal Ubiquitous Comput., vol. 13, pp. 509–525, 2009.

J. Ng, B. Lo, O. Wells, M. Sloman, N. Peters, A. Darzi, C. Toumazou, and G. Z. Yang, “Ubiquitous monitoring environment for wearable and implantable sensors (UbiMon),” (poster), in Proc. 6th Int. Conf. Ubiquitous Comput., Nottingham, U.K., Sep. 7–14, 2004.

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.