Skip to main content
Log in

A novel medical internet of things perception system based on visual image encryption and intrusion detection

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Smart cities are the emerging topics in the recent decade with advancements in science and technology especially in the areas of communication technologies. Concept of smart cities depicts the inteconnectivity of physical objects to provide transparency in communication between the physical components or objects. However, implementation of a smart city using Internet of Things (IoT) which is the backbone architecture is affected by several attacks in the wireless communication domain during communication of information between the components as well as cyber-attacks which necessiate the need for the intrusion detection mechanism to prevent any illegeal loss data. This research paper addresses these security issues by implementing the IoT architecture and systematically analysing the demands in security aspects as well as justifying the results with experimentations conducted in a simulated smart city environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Cirani, S., Ferrari, G., Veltri, L.: Enforcing security mechanisms in the IP based internet of things: an algorithmic overview. Int. J. Sens. 6, 197–226 (2013)

    MATH  Google Scholar 

  2. Suresh, M., Neema, M.: Hardware implementation of Blowfish algorithm for the secure data transmission in internet of things. Procedia. technol. (2016). https://doi.org/10.1016/j.protcy.2016.08.104

    Article  Google Scholar 

  3. Yue, L.H., Guo, L., Li, R., Asaeda, H., Fang, Y.: From data clouds: enabling community-based data-centric services over the internet of things. IEEE Int. Things J. 1(5), 472–482 (2014)

    Article  Google Scholar 

  4. Mandal, P.C.: Superiority of blowfish algorithm. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(9), 196–201 (2012)

    Google Scholar 

  5. Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9(4), 289–306 (2015)

    Google Scholar 

  6. Muthukumar, G., Raj, G.D.P.: A comparative analysis on symmetric key encryption algorithms. Int. J. Adv. Res. Comput. Eng. Technol. 3(2), 1087–1097 (2014)

    Google Scholar 

  7. Can, O., Sahingoz, OK.: “A survey of intrusion detection systems in wireless sensor networks”. In: 6th international conference on modeling, simulation, and applied optimization, 2015

  8. Welbourne, E., et al.: Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Comput. 13(3), 48–55 (2009)

    Article  Google Scholar 

  9. Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the Internet of Things: a survey. IEEE Commun. Surv 16(1), 414–454 (2013)

    Article  Google Scholar 

  10. Atzori, L., Iera, A., Morabito, G.: From `smart objects’ to `social objects’: the next evolutionary step of the internet of things. IEEE Commun. Mag. 52(1), 97–105 (2014)

    Article  Google Scholar 

  11. Ortiz, A.M., Hussein, D., Park, S., Han, S.N., Crespi, N.: The cluster between internet of things and social networks: review and research challenges. IEEE Internet Things J. 1(3), 206–215 (2014)

    Article  Google Scholar 

  12. Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the internet of things: a standardization perspective. IEEE Internet Things J. 1(3), 265–275 (2014)

    Article  Google Scholar 

  13. Chen, M., Wan, J., Li, F.: Machine-to-machine communications: architecture, standards and applications. KSII Trans. Internet Inf. Syst. 6(2), 480–497 (2012)

    Google Scholar 

  14. Kavitha, T., Sridharan, D.: Security vulnerabilities in wireless sensor networks: a survey. J. inf. assur. secur. 5, 31–44 (2010)

    Google Scholar 

  15. Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEEE Wirel. Commun. 11(6), 6–28 (2004)

    Article  Google Scholar 

  16. Jerbi, M., et al.: Towards efficient geographic routing in urban vehicular networks. IEEE Trans Veh. Technol 58(9), 5048–5059 (2009)

    Article  Google Scholar 

  17. Sun, Y.L., Han, Z., Liu, K.J.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(2), 112–119 (2008)

    Article  Google Scholar 

  18. Raymond, D.R., Midkiff, S.F.: Denial of service in wireless sensor network: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)

    Article  Google Scholar 

  19. Qian, Y., Lu, K., Tipper, D.: A design for secure and survivable wireless sensor networks. IEEE Wirel. Commun. 14(5), 30–37 (2007)

    Article  Google Scholar 

  20. Mohammad, A.R., Rjoub, A., Baset, A.: A low-energy security algorithm for exchanging information in wireless sensor networks. J. Inf. Assur. Secur. 4(1), 48–59 (2009)

    Google Scholar 

  21. Gendreau, A.A., Moorman, M.: “Survey of intrusion detection systems towards an end to end secure internet of things” In: proceedings of international conference on future internet of things and cloud, (2016)

  22. Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99–105 (2008)

    Article  Google Scholar 

  23. Batalla, J.M., Krawiec, P.: Conception of ID layer performance at the network level for internet of things. Pers. Ubiquit. Comput. 18(2), 465–480 (2014)

    Article  Google Scholar 

  24. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)

    Article  Google Scholar 

  25. El_Deen, A., El-Sayed, A., El-Badawy, E., Gobarn, N.: Digital image encryption based on RSA algorithm. Int. J. Electro. Commun. Eng. 9(1), 69–73 (2014)

    Google Scholar 

  26. Deshmukh, S., Deshmukh, S., Patil, R.: Hybrid cryptography technique using modified diffiehellman and RSA”. Int. Comput. Sci. Inf. Technol. 5(6), 7302–7304 (2014)

    Google Scholar 

Download references

Acknowledgement

National Natural Science Foundation of China (Grant: 61376028).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meihua Xu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guo, A., Xu, M., Ran, F. et al. A novel medical internet of things perception system based on visual image encryption and intrusion detection. Cluster Comput 22 (Suppl 6), 13405–13413 (2019). https://doi.org/10.1007/s10586-018-1944-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1944-2

Keywords

Navigation