Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2023 May 25;23(11):5055.
doi: 10.3390/s23115055.

An Intelligent Healthcare System Using IoT in Wireless Sensor Network

Affiliations

An Intelligent Healthcare System Using IoT in Wireless Sensor Network

Tallat Jabeen et al. Sensors (Basel). .

Abstract

The Internet of Things (IoT) uses wireless networks without infrastructure to install a huge number of wireless sensors that track system, physical, and environmental factors. There are a variety of WSN uses, and some well-known application factors include energy consumption and lifespan duration for routing purposes. The sensors have detecting, processing, and communication capabilities. In this paper, an intelligent healthcare system is proposed which consists of nano sensors that collect real-time health status and transfer it to the doctor's server. Time consumption and various attacks are major concerns, and some existing techniques contain stumbling blocks. Therefore, in this research, a genetic-based encryption method is advocated to protect data transmitted over a wireless channel using sensors to avoid an uncomfortable data transmission environment. An authentication procedure is also proposed for legitimate users to access the data channel. Results show that the proposed algorithm is lightweight and energy efficient, and time consumption is 90% lower with a higher security ratio.

Keywords: IoT; authentication; cryptography; genetic algorithm; intelligent healthcare; remote patients monitoring system; wireless sensor networks.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Architecture of wireless sensor networks.
Figure 2
Figure 2
Conceptual Workflow of Proposed Genetic-based System on WSN.
Figure 3
Figure 3
Example String 1.
Figure 4
Figure 4
Genetically Cryptographic algorithm for data security.
Figure 5
Figure 5
Authentication Process for Smooth Data Transmission.
Figure 6
Figure 6
Encryption Time Complexity.
Figure 7
Figure 7
Decryption Time Complexity.
Figure 8
Figure 8
Comparison Analysis of Encryption Time Complexity.
Figure 9
Figure 9
Comparison Analysis of Decryption Time Complexity.
Figure 10
Figure 10
Comparison Analysis of Total Computation Cost of System.

References

    1. Majid M., Habib S., Javed A.R., Rizwan M., Srivastava G., Gadekallu T.R., Lin J.C.-W. Applications of Wireless Sensor Networks, and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review. Sensors. 2022;22:2087. doi: 10.3390/s22062087. - DOI - PMC - PubMed
    1. Akyildiz I.F., Su W., Subramaniam Y.S., Cayirci E. Wireless sensor networks: A survey. Comput. Netw. 2002;38:393–422. doi: 10.1016/S1389-1286(01)00302-4. - DOI
    1. Estrin D., Culler D., Pister K., Sukhatme G. Connecting the physical world with pervasive networks. IEEE Pervasive Comput. 2002;7:59–69. doi: 10.1109/MPRV.2002.993145. - DOI
    1. Akyildiz I., Jornet F. Electromagnetic wireless nano sensor networks. Nano Commun. Netw. 2010;1:3–19. doi: 10.1016/j.nancom.2010.04.001. - DOI
    1. Akyildiz I., Kasimoglu F. Wireless sensor and actor networks: Research challenges. Ad Hoc Netw. 2014;2:351–367. doi: 10.1016/j.adhoc.2004.04.003. - DOI

LinkOut - more resources