CRYPTOGRAPHY BASED SECURED LIFI FOR PATIENT PRIVACY AND EMERGENCY HEALTHCARE SERVICE

  • Sujatha S
  • Sindhu M
  • Priyanka M
Keywords: LIFI, Elliptic Curve Diffie Hellman algorithm, Secure Hash algorithm, Confidentiality.

Abstract

Health care is one such area, where WIFI is still not used as the electromagnetic waves affects patients with diseases like neurological disorders, cancers etc. Hence LIFI can be considered the next big technology which causes no harm to patients and also provides more additional features like greater speed and wider spectrum than WIFI. The only problem while transmitting data through it, in hospitals is to make sure that it ensures confidentiality. As a solution for this problem, the model proposed here uses Elliptic Curve Diffie Hellman and Secure Hash Algorithms to provide utmost security. Elliptic Curve Diffie Hellman is used as an asymmetric function that is, it uses two keys which in turn makes it difficult to hack. Secure Hash Algorithm works as an added advantage used mainly for authentication purpose.

Downloads

Download data is not yet available.

Author Biographies

Sujatha S

Asst. Professor-III, Dept of Electronics and Communication Engineering, Velammal Engineering College Chennai, India

Sindhu M

Dept of Electronics and Communication Engineering, Velammal Engineering College Chennai, India.

Priyanka M

Dept of Electronics and Communication Engineering, Velammal Engineering College Chennai, India.

References

1. Annu Malik, Anju Sharma (2013) “Greedy Algorithm”, International Journal of Scientific and Research Publications, Vol.3, pp.1-5.

2. Anurag Sarkar, Prof. Shalabh Agarwal, Dr. Ashoke Nath (2015) “Li- Fi Technology: Data Transmission through Visible Light”, International Journal of Advance Research in Computer Science and Management Studies, Vol.3, pp.153-159.

3. Ayaz Ahmad, Mahfuzul Huda, Mohd Atif Kaleem, Rajendra Kr Maurya (2015) “Mobile Ad-Hoc Networks: AODV Routing Protocol Perspective”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.4, pp.514-517.

4. Balajee Maram, Sravanthi Dangani, “Group Key Exchange Analysis in Sensor Networks”, International Journal of Distributed Sensor Networks, Vol.10, pp.1-12.

5. Balaram Ghosal, Asim Kumar (2014), “Li-Fi a Green Energy Initiative”, International Journal of Computer Applications, Vol.95, No.11, pp.1-3.

6. Chaitya B Shah, Drashti R Panchal (2014) “Secured Hash Algorithm-1: review Paper”, International Journal For Advance Research In Engineering And Technology, Vol.2, pp.26-30.

7. Cheng Chen, Harald Hass, Liang Yin, Yunlu Wang “What is LIFI?”, Journal of Lightwave Technology, Volume: 34, pp.1533 – 1544.

8. Christian Lederer, Roland Mader, Manuel Koschuch, Johann Grobsch ad, Alexander Szekely, Stefan Tilich (2009) “Energy-Efficient Implementation of ECDH Key Exchange Algorithm for Wireless Sensor Networks”, Information Security Theory and Practice, Vol.5746, pp.112-127.

9. Ganesan R and Neha Trithani (2014) “Data Security in Cloud Architecture based on Diffie-Hellman and Elliptical Curve Cryptography”, International Association for Cryptologic Research.

10. John Justin Thangaraj . S and A. Rengarajan (2016) “Unreliable Node Detection by Elliptical Curve Diffie-Hellman Algorithm in MANET”, Indian Journal of Science and Technology, Vol.9, pp.1-6
Published
2017-03-27
Section
Articles