{"title":"DME:医疗物联网(HIoT)中人体传感器网络的高效加密技术","authors":"Chetan Pandey, Sachin Sharma, Priya Matta","doi":"10.1109/ICIEM51511.2021.9445374","DOIUrl":null,"url":null,"abstract":"In order to secure the precious data and make a secure communication way between the user and their health assistance, the authors of this paper are going to suggest a novel encryption technique named Dynamic Matrix Encryption (DME). This method uses the concept of primary and secondary key concept where the primary key is actually a system-generated verifier and the secondary key will be provided by the medical assistance to whom we want to send our personal medical data or by the user who wants their personal report back. Here the authors explain the suggested encryption technique with a suitable example. In the suggested model every bit of data, including keys, will be in encrypted mode while traveling in the network.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"DME: An Efficient Encryption Technique for Body Sensor Network in Healthcare Internet of Things (HIoT)\",\"authors\":\"Chetan Pandey, Sachin Sharma, Priya Matta\",\"doi\":\"10.1109/ICIEM51511.2021.9445374\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to secure the precious data and make a secure communication way between the user and their health assistance, the authors of this paper are going to suggest a novel encryption technique named Dynamic Matrix Encryption (DME). This method uses the concept of primary and secondary key concept where the primary key is actually a system-generated verifier and the secondary key will be provided by the medical assistance to whom we want to send our personal medical data or by the user who wants their personal report back. Here the authors explain the suggested encryption technique with a suitable example. In the suggested model every bit of data, including keys, will be in encrypted mode while traveling in the network.\",\"PeriodicalId\":264094,\"journal\":{\"name\":\"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIEM51511.2021.9445374\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEM51511.2021.9445374","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DME: An Efficient Encryption Technique for Body Sensor Network in Healthcare Internet of Things (HIoT)
In order to secure the precious data and make a secure communication way between the user and their health assistance, the authors of this paper are going to suggest a novel encryption technique named Dynamic Matrix Encryption (DME). This method uses the concept of primary and secondary key concept where the primary key is actually a system-generated verifier and the secondary key will be provided by the medical assistance to whom we want to send our personal medical data or by the user who wants their personal report back. Here the authors explain the suggested encryption technique with a suitable example. In the suggested model every bit of data, including keys, will be in encrypted mode while traveling in the network.