• Login
    • University Home
    • Library Home
    • Lib Catalogue
    • Advance Search
    View Item 
    •   IR@KDU Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2018 IRC Articles
    • Computing
    • View Item
    •   IR@KDU Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2018 IRC Articles
    • Computing
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Adaptive Solution for Key Challenges in Internet of Medical Things

    Thumbnail
    View/Open
    Untitled(21).pdf (962.6Kb)
    Date
    2018
    Author
    Rathnayake, RMPHK
    Karunarathne, MS
    Metadata
    Show full item record
    Abstract
    Internet of medical things refers to the worldwide network of interconnected medical devices based on a standard communication protocol. Moreover, it is about interconnected medical devices via the internet at any time, with anyone, at any place, to any service, from any network. With the rapid advancements of technology connected through the internet, the healthcare field also affected immensely. This study is an attempt to investigate the most useful technologies and key challenges regarding the Internet of Medical Things (IoMTs) nowadays. This paper proposes an adaptive model to address the identified challenges. The main contribution of this study is an entrusted framework for IoMTs which satisfies major challenges of security, privacy and the data integrity of the sensor data. Furthermore, the proposed cloud-based health management system will increase data availability, storage needs and processing power. In the cloud-mobile architecture, the security is entrusted with three methods: Advanced Data Encryption, Attribute-Based Encryption and Proven Data Possession. The proposed model shows how these 3 methods along with cloud technology address the identified challenges: Security, Privacy, Data Integrity, Processing Power and Storage Issues in medical applications. Local databases are the most common use of the data storage. In this model, it is giving the cloud-based solution along with the algorithm which helps to increase the security level of the sensor data. The used encryption and data provable methods are most recognized and strong algorithms in today world.
    URI
    http://ir.kdu.ac.lk/handle/345/2503
    Collections
    • Computing [46]

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback
     

     

    Browse

    All of IR@KDUCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsFacultyDocument TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsFacultyDocument Type

    My Account

    LoginRegister

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback