Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

ITC XXXXXXXXXXS I Version 2 - Published 08 July 2020 Subject Outline ITC571 - Emerging Technologies and Innovation Table of Contents Subject Summary...

1 answer below »
ITC XXXXXXXXXXS I Version 2 - Published 08 July 2020
Subject Outline
ITC571 - Emerging Technologies and Innovation
Table of Contents
Subject Summary ............................................................................................... XXXXXXXXXX2
Subject Coordinator ........................................................................................... XXXXXXXXXX2
Subject Coordinator .............................................................................. XXXXXXXXXX2
Email ...................................................................................................... XXXXXXXXXX2
Phone ..................................................................................................... XXXXXXXXXX2
Consultation procedures ...................................................................... XXXXXXXXXX2
Subject Overview................................................................................................ XXXXXXXXXX2
Abstract .................................................................................................. XXXXXXXXXX2
Learning outcomes................................................................................ XXXXXXXXXX3
Subject content ..................................................................................... XXXXXXXXXX3
Key subjects........................................................................................... XXXXXXXXXX4
Subject Schedule & Delivery .............................................................................. XXXXXXXXXX4
Prescribed text....................................................................................... XXXXXXXXXX4
Class/tutorial times and location ......................................................... XXXXXXXXXX4
Schedule ................................................................................................ XXXXXXXXXX6
Learning materials............................................................................... XXXXXXXXXX10
Learning, teaching and support strategies ........................................ XXXXXXXXXX10
Recommended student time commitment ....................................... XXXXXXXXXX13
Assessment Items .................................................................................................
Answered Same Day Aug 12, 2021 ITC571 Charles Sturt University

Solution

Amit answered on Aug 15 2021
108 Votes
Student name and CSU ID
    
    Project type
    Review Basic Project
    Project name
    Two Factor authentication technique for security of IoT devices in Healthcare secto
    
    Technology
    Internet of things
    
    Techniques
    Two factor authentication
    
    Domain
    Healthcare
    1
    Title of the paper
    Hy
id optimization with cryptography encryption for medical image security in Internet of Things.
    Reference in APA format
    Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hy
id optimization with cryptography encryption for medical image security in Internet of Things. Neural computing and applications, 1-15.
    Citation in APA
    (Elhoseny et al, 2018)
    URL of the reference
    Level of Journal (Q1, Q2,...Qn)
    Key words in this Reference
    https:
link.springer.com/article/10.1007/s00521-018-3801-x
    Q1
    · Hy
id optimization
· Medical image
· Security in IoT
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ...
etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    Who else has used this the cu
ent solution ( Give the full reference in APA format)
    
    Technique: Hy
id optimization
Tools: Encryption tools
Applied Area: Healthcare
    Problem: The security of medical images because of IOT devices is considered as the primary problem for IOT devices.
Goal: The implementation of encryption and making hy
id optimization for improving the security of medical images shows the primary goal behind this research work.
    Safi A (2017) Improving the security of the internet of things using encryption algorithms. World Acad Sci Eng Technol Int J Comput Electr Autom Control Inf Eng 11(5):546–549
Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708
    How this research/cu
ent solution is valuable for your project
    The involvement of IOT has completely changed the healthcare system and this industry. The healthcare industry makes use of different medical images and their security is very important. The use of optimization strategies with implementation of cryptographic model can provide the required security to healthcare IOT devices. The use of cloud for storing the generated data by IOT devices create security challenges for healthcare industry. So, for transmission of this healthcare data requires a proper framework which can assure the security. Thus, cryptographic implementation with swarm optimization or curve cryptography can provide the required solution to IOT devices based healthcare data. The optimal keys for encryption and decryption can be generated and used at sender and receiver end for improving the security of medical images. The use of IOT framework with optimization and cryptography implementation will provide a secure environment to store and transmit the medical images with IOT devices.
    2
    Title of the paper
    The future of blockchain technology in healthcare internet of things security
    Reference in APA format
    Srivastava, G., Parizi, R. M., & Dehghantanha, A. (2020). The future of blockchain technology in healthcare internet of things security. In Blockchain Cybersecurity, Trust and Privacy (pp. 161-184). Springer, Cham.
    Citation in APA
    Srivastava et al, 2020
    URL of the reference
    Level of Journal (Q1, Q2,...Qn)
    Key words in this Reference
    https:
link.springer.com/chapte
10.1007/978-3-030-38181-3_9
    Q1
    · Blockchain technology
· two factor authentication.
· IOT
· Health technologies
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ...
etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    Who else has used this the cu
ent solution ( Give the full reference in APA format)
    
    Technique: Block chain technique
Tools: Authentication tools
Applied Area: Healthcare
    Problem: The security of healthcare data generated with IOT devices is considered as the primary problem.
Goal: The use of Blockchain techniques for improving the security of healthcare data shows the primary goal behind this research.
    M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J.A. Halderman, L. Invernizzi, M. Kallitsis et al., Understanding the Mirai Botnet, in 26th {USENIX} Security Symposium ({USENIX} Security 17), pp. 1093–1110 (2017
A. Azaria, A. Ekblaw, T. Vieira, A. Lippman, MedRec: Using blockchain for medical data access and permission management, in 2016 2nd International Conference on Open and Big Data (OBD) (IEEE, New York, 2016), pp. 25–30
    How this research/cu
ent solution is valuable for your project
    The IOT devices are providing new heights to healthcare sector and helping in improving the efficiency of this healthcare sector. But benefits of IOT devices are
inging security challenges to healthcare sector. The communication and connectivity among IOT devices is mainly creating security challenges to healthcare sector. The use of Blockkchain technology with two factor authentication has improved the security in finance sector, thus, implementation of same Blockchain technology with two factor authentication in healthcare sector is proposed in this research work. It will provide different positive aspects related to improved security and performance for healthcare data generated with IOT devices. The improvement in IOT infrastructure with Block chain technology and two factor authentication are mainly recommended with this research. The authentication and data recovery capabilities of healthcare sector using IOT devices will be improved with this research work. The improved authentication and high stability of healthcare data with IOT devices will be provided by block chain technology with two factor authentication.
    3
    Title of the paper
    Secure medical data transmission model for IoT-based healthcare systems
    Reference in APA format
    Elhoseny, M., Ramírez-González, G., Abu-Elnasr, O. M., Shawkat, S. A., Arunkumar, N., & Farouk, A. (2018). Secure medical data transmission model for IoT-based healthcare systems. Ieee Access, 6, 20596-20608.
    Citation in APA
    Elhoseny et al, 2018
    URL of the reference
    Level of Journal (Q1, Q2,...Qn)
    Key words in this Reference
    https:
ieeexplore.ieee.org/abstract/document/8320774
    Q1
    · data models
· diagnostic images
· encryption.
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ...
etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    Who else has used this the cu
ent solution ( Give the full reference in APA format)
    
    Technique: Encryption
Tools: Data transmission model
Applied Area: Healthcare
    Problem: The frequency domain of IOT devices creates security issues which shows the main problem behind this research work.
Goal: The implementation of both DWT levels for image splitting for improving the security shows the main goal behind this research work.
    Ahmed Faeq Hussein, N Arunkumar, Chandima Gomes, A
as K. Alzubaidi, Qais Ahmed Habash, Luz Santamaria-Granados, Juan Francisco Mendoza-Moreno, Gustavo Ramirez-Gonzalez, "Focal and Non-Focal Epilepsy Localization: A Review", Access IEEE, vol. 6, pp. 49306-49324, 2018.
G. Bagyalakshmi, G. Rajkumar, N. Arunkumar, M. Easwaran, K. Narasimhan, V. Elamaran, Mario Solarte, Iván Hernández, Gustavo Ramirez-Gonzalez, "Network Vulnerability Analysis on Brain Signal/Image Databases Using Nmap and Wireshark Tools", Access IEEE, vol. 6, pp. 57144-57151, 2018.
    How this research/cu
ent solution is valuable for your project
    Maintaining the security and integrity of healthcare data with use of IOT devices is highly challenging task. The hy
id security model for medical images is mainly proposed in this research work. The DWT with level 1 and 2 with involvement of encryption and stereography is mainly recommended by this research work. The implementation of encryption based on the color of medical image and text size will provide new heights to the security of this IOT based healthcare database. It also suggests different statistical parameters like bit e
or rate, noise ratio, structural content etc. which can work with color and size of the image. The confidential data of patient can easily be secured with suggested methods. The suggested methods provides minimum deterioration, high capacity and imperceptivity for improving the security of healthcare data generated with IOT devices. The multi factor authentication based on image color and text size can be implemented. The possible attacks on the IOT based healthcare database will also be minimized with implementation of suggested technique. The implementation of both DWT levels for image splitting for improving the security will
ing security to healthcare data.
    4
    Title of the paper
    Proposing secure and lightweight authentication scheme for IoT based E-health applications
    Reference in APA format
    Almulhim, M., & Zaman, N. (2018, Fe
uary). Proposing secure and lightweight authentication scheme for IoT based E-health applications. In 2018 20th International Conference on Advanced Communication Technology (ICACT) (pp. 481-487). IEEE.
    Citation in APA
    Almulhim & Zaman, 2018
    URL of the reference
    Level of Journal (Q1, Q2,...Qn)
    Key words in this Reference
    https:
ieeexplore.ieee.org/abstract/document/8323802
    Q1
    · Authentication protocols
· cloud computing.
· medical services
· IOT
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ...
etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    Who else has used this the cu
ent solution ( Give the full reference in APA format)
    
    Technique: Authentication protocol
Tools: cloud computing
Applied Area: E-health application of IOT
    Problem: The IOT devices implementing healthcare data requires high security but always implementing heavy authentication protocols creates issues in data fetching and this is main problem shown in this research work.
Goal: The implementation of light weight authentication for maintaining the security of healthcare data stored and processed in IOT devices is main goal behind this research work.
    Jinhong YANG, Chul-Soo KIM, Md Mehedi Hassan ONIK, "Aggregated Risk Modelling of Personal Data Privacy in Internet of Things", Advanced Communication Technology (ICACT) 2019 21st International Conference on, pp. 425-430, 2019.
J. Ranjith, K. Mahantesh, "Privacy and Security issues in Smart Health Care", Electrical Electronics Communication Computer Technologies and Optimization Techniques (ICEECCOT) 2019 4th International Conference on, pp. 378-383, 2019.
    How this research/cu
ent solution is valuable for your project
    The rapid use of wireless technology with IOT based smart devices is helping healthcare sector to improve its performance. It is providing cost effective solution to healthcare services but these applications makes use of heavy authentication protocols for maintaining the privacy and security of healthcare data. The use of light weight authentication protocols with identical security and privacy handling capacities is recommended in this research work. The possible data
eaches in healthcare data can lead to huge damage to this healthcare industry. Thus developing an effective solution to maintain the security of healthcare data becomes essential. The elliptic...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here