Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/545054
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | An efficient attack detection framework for secure smart health care system | |
dc.date.accessioned | 2024-02-13T04:28:21Z | - |
dc.date.available | 2024-02-13T04:28:21Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/545054 | - |
dc.description.abstract | Healthcare Internet of Things (IoT) is gaining prominence in the area of research to increase the efficiency of intelligent healthcare networks and applications. However, Smart Health(S-Health) data protection and safety face different threats, such as Sybil, MITM, Clone, DDoS, etc. This research on S-Health suggests a stable framework called Multi Attack Detection Framework (MADF) that detects three different attacks: Sybil attack, MITM, and clone attack. Sybil attack is one of the most frequent assaults, in which malicious nodes generate Sybil nodes using morphic identities. Sybil nodes can gain allowed identities and disconformities by routing information and communication line interruptions and storage. Privacy-Aware Digital Health (PASH), a smart health approach built on IoT, is used to secure users confidentiality through regulation hiding. In S-Health applications, PASH is very costly to introduce. It is also not about the revocation of attributes and traceability of nodes. In the context of this study, we suggest a novel solution to SybilWatch Enhanced Privacy-Aware Smart Health (E-PASH). This strategy consists of three main phases: initialization, safe contact, and identification of the Sybil nodes. Using a Prime Order Grouping, Smart Health Record (SHR) transmits a Lightweight encryption algorithm (LEA) in encrypted form. In the detection process, the cluster head collects recent unusual user behaviours. The cluster head announces that it is a Sybil node based on collected parameters (Master key and Last One-time Authentication). The revamped revocation list of active users is exchanged until the Sybil node is identified. Simulation findings and comparative analyses have shown that the SybilWatch proposed is reliable and cost-efficient related to the current solution. The proposed approach has an identification rate of 97% and even a false positive 1% of reduction in smart health networks, which is higher than the conventional approaches. newlineThe attacker gains control over data transmission between the two devices/users in the MITM attack. A novel multifactor authentication scheme for the protection of intelligent health from MITM attacks is used in this article. The proposed systems use an owner-controlled authentication mechanism with different authentication levels for various contact sets in the health sector. To authenticate each communication system in S-Health, a virtual fingerprint (VFP) is used. The users are recognized by a Three-Dimensional (3D) password. The count and the distance between the transmitting nodes are used to detect a MitM threat, namely a timestamp for contact. Existing approaches do not accept revocation leading to certain safety problems, and introspection tokens automatically revoke the device. newline | |
dc.format.extent | xiv,131p. | |
dc.language | English | |
dc.relation | p.119-130 | |
dc.rights | university | |
dc.title | An efficient attack detection framework for secure smart health care system | |
dc.title.alternative | ||
dc.creator.researcher | Vaishnavi, S | |
dc.subject.keyword | Attack detection | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Information Systems | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Health care system | |
dc.subject.keyword | Internet of things | |
dc.description.note | ||
dc.contributor.guide | Sethukarasi, T | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | ||
dc.date.completed | 2022 | |
dc.date.awarded | 2022 | |
dc.format.dimensions | 21cm | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 2.54 MB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.51 MB | Adobe PDF | View/Open | |
03_content.pdf | 2.41 MB | Adobe PDF | View/Open | |
04_abstract.pdf | 2.41 MB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 1.01 MB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 710.37 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 780.31 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.58 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 998.58 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 1.13 MB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 507.48 kB | Adobe PDF | View/Open | |
12_annexures.pdf | 196.46 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 156.89 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: