Skip to main content
Log in

Healthcare Data Encryption Technique Using Hybrid Cellular Automata in IoT Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this article, we secure the healthcare data using low complexity hybrid cellular automata (CA) algorithm while enabling remote monitoring of patients using IoT (Internet of Things) network. Since IoT devices are limited to power and memory space, the traditional encryption and decryption algorithms, called as ciphers, cannot be executed owing to the inherent implementation complexities and power requirements. The results show that the encrypted data sequence passes the randomness tests as prescribed by the National Institute of Standards and Technology (NIST) and is suitable for cryptography. Comparison with the state-of-the-art methods proves the superiority of our proposed method in terms of run-time complexity. Using the proposed hybrid CA algorithm, we achieve an average execution time of 0.3892 seconds per kilobit (kb) of data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Kumar, R., Khan, P., Kumar, S. (2019). A cellular automata-based healthcare data encryption technique for iot networks. In 2019 IEEE 16th India Council International Conference (INDICON) (pp. 1–4). https://doi.org/10.1109/INDICON47234.2019.9030349

  2. Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93–101.

    Article  Google Scholar 

  3. Islam, S. R., Kwak, D., Kabir, M. H., Hossain, M., & Kwak, K.-S. (2015). The internet of things for health care: A comprehensive survey. IEEE Access, 3, 678–708.

    Article  Google Scholar 

  4. Sharma, P. K., Chen, M.-Y., & Park, J. H. (2017). A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access, 6, 115–124.

    Article  Google Scholar 

  5. Meingast, M., Roosta, T., Sastry, S. (2006). Security and privacy issues with health care information technology. In 2006 International Conference of the IEEE Engineering in Medicine and Biology Society (pp. 5453–5458). IEEE.

  6. Fuster-Sabater, A., & Caballero-Gil, P. (2006). On the use of cellular automata in symmetric cryptography. Acta Applicandae Mathematica, 93(1–3), 215–236.

    Article  MathSciNet  Google Scholar 

  7. Díaz Len, R., Hernández Encinas, A., Hernández Encinas, L., Martín del Rey, Á., Rodríguez Sánchez, G., Visus Ruiz, I. (2003). Wolfram cellular auto mata and their cryptographic use as pseudorandom bit generators.

  8. Roy, S., Karjee, J., Rawat, U., Dey, N., et al. (2016). Symmetric key encryption technique: A cellular automata based approach in wireless sensor networks. Procedia Computer Science, 78, 408–414.

    Article  Google Scholar 

  9. Roy, S., Nandi, S., Dansana, J., Pattnaik, P. K. (2014). Application of cellular automata in symmetric key cryptography. In 2014 International Conference on Communication and Signal Processing (pp. 572–576). IEEE.

  10. Roy, S., Rawat, U., & Karjee, J. (2019). A lightweight cellular automata based encryption technique for IoT applications. IEEE Access, 7, 39782–39793.

    Article  Google Scholar 

  11. Fensli, R., Gunnarson, E., Hejlesen, O. (2004). A wireless ecg system for continuous event recording and communication to a clinical alarm station. In The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, vol. 1 (pp. 2208–2211). IEEE.

  12. Ng, H., Sim, M., & Tan, C. (2006). Security issues of wireless sensor networks in healthcare applications. BT Technology Journal, 24(2), 138–144.

    Article  Google Scholar 

  13. Hodge, J. G., Jr. (2003). Health information privacy and public health. The Journal of Law, Medicine & Ethics, 31(4), 663–671.

    Article  Google Scholar 

  14. Shah, K. T. (2019). Privacy and security issues of wearables in healthcare. PhD thesis, Flinders University, College of Science and Engineering.

  15. Alagar, V., Alsaig, A., Ormandjiva, O., Wan, K. (2018). Context-based security and privacy for healthcare IoT. In 2018 IEEE International Conference on Smart Internet of Things (SmartIoT) (pp. 122–128). IEEE.

  16. Jangra, P., Gupta, M. (2018). A design of real-time multilayered smart healthcare monitoring framework using IoT. In 2018 International Conference on Intelligent and Advanced System (ICIAS) (pp. 1–5). IEEE.

  17. Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things security: A survey. Journal of Network and Computer Applications, 88, 10–28.

    Article  Google Scholar 

  18. Conti, M., Dehghantanha, A., Franke, K., Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Elsevier.

  19. Nandi, S., Kar, B. K., & Chaudhuri, P. P. (1994). Theory and applications of cellular automata in cryptography. IEEE Transactions on Computers, 43(12), 1346–1357.

    Article  MathSciNet  Google Scholar 

  20. Sarkar, P. (2000). A brief history of cellular automata. Acm Computing Surveys (csur), 32(1), 80–107.

    Article  Google Scholar 

  21. Wolfram, S. (1986). Theory and applications of cellular automata. World Scientific.

  22. Das, A. K., Sanyal, A., & Palchaudhuri, P. (1992). On characterization of cellular automata with matrix algebra. Information Sciences, 61(3), 251–277.

    Article  MathSciNet  Google Scholar 

  23. Martin, O., Odlyzko, A. M., & Wolfram, S. (1984). Algebraic properties of cellular automata. Communications in Mathematical Physics, 93(2), 219–258.

    Article  MathSciNet  Google Scholar 

  24. Pries, W., Thanailakis, A., & Card, H. C. (1986). Group properties of cellular automata and VLSI applications. IEEE Transactions on Computers, 12, 1013–1024.

    Article  Google Scholar 

  25. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., & Barker, E. (2001). A statistical test suite for random and pseudorandom number generators for cryptographic applications. Booz-allen and hamilton inc mclean va: Technical report.

  26. Smid, E.B., Leigh, S., Levenson, M., Vangel, M., DavidBanks, A., JamesDray, S. (2001). A statistical test suite for random and pseudorandom number generators for cryptographic applications.

  27. Das, D., Misra, R. (2011). Programmable cellular automata based efficient parallel AES encryption algorithm. arXiv preprint arXiv:1112.2021

  28. Singh, S., Maakar, S. K., & Kumar, S. (2013). A performance analysis of DES and RSA cryptography. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 2(3), 418–423.

    Google Scholar 

  29. Singh, A., Marwaha, M., Singh, B., & Singh, S. (2013). Comparative study of DES, 3DES, AES and RSA. International Journal of Computers & Technology, 9(3), 1164–1170.

    Article  Google Scholar 

Download references

Funding

This work acknowledges the support rendered by the Early Career Research (ECR) award scheme project “Cyber-Physical Systems for M-Health" (ECR/2016/001532) (duration 2017-2020), under Science and Engineering Research Board (SERB), Govt. of India.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Data collection was performed by Pritam Khan and analysis was performed by Ritesh Kumar. Material preparation, revision, and correction were performed by Ritesh Kumar, Pritam Khan, and Sudhir Kumar. The first draft of the manuscript was written by Ritesh Kumar and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Sudhir Kumar.

Ethics declarations

Conflicts of Interests

The authors have no relevant financial or non-financial interests to disclose.

Data Availability

No database is associated with the present work. However, the sample ECG data used as example in the work, is already disclosed in detail inside the manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, R., Khan, P. & Kumar, S. Healthcare Data Encryption Technique Using Hybrid Cellular Automata in IoT Networks. Wireless Pers Commun 126, 3021–3039 (2022). https://doi.org/10.1007/s11277-022-09850-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09850-4

Keywords

Navigation