IoT Smart Implants: Information Security and the Implementation of Lightweight Cryptography

Rozlomii, I. and Yarmilkoa, A. and Naumenko, S. and Mykhailovskyia, P. (2023) IoT Smart Implants: Information Security and the Implementation of Lightweight Cryptography. Proceedings of the 6th International Conference on Informatics & Data-Driven Medicine (IDDM’2023). pp. 145-146.

[img] Text
paper_2 (1).pdf

Download (1MB)

Abstract

The article focuses on the important and timely issue of data security in medical IoT smart implants. With the proliferation of the Internet of Things in healthcare, new opportunities and challenges have arisen. Smart implants embedded in the human body for monitoring and treating various medical conditions are becoming increasingly common, but they also require enhanced information security measures. The article analyzes threats associated with smart implants that could potentially impact the confidentiality and integrity of patients' medical data. Aspects such as unauthorized access to implants, interception and alteration of data transmission, and the possibility of attacks on the implant's hardware are discussed. Considerable attention is given to the concept of lightweight cryptography and its application in the field of medical implants. Modern encryption and authentication methods can play a critical role in ensuring data security in IoT smart implants. The article explores the possibilities of applying cryptographic algorithms that are not only effective but also have low computational requirements, which is particularly important for embedded systems with limited resources. Additionally, the article discusses the implementation of lightweight cryptography in medical implants and provides practical recommendations for developers and manufacturers of smart implants on implementing cryptographic solutions to ensure information security.

Item Type: Article
Uncontrolled Keywords: Smart implants ; information security ; cryptography ; confidentiality ; integrity ; availability ; security threats ; lightweight cryptography ; medical data ; authentication ; cybersecurity ; health monitoring, digital signatures, hash functions, encryption, cryptographic key management, redundant hashing
Subjects: Фізико-математичні науки
Комп'ютерні науки
Комп'ютерні науки
Divisions: Факультет обчислювальної техніки, інтелектуальних та управляючих систем
Depositing User: Наукова Бібліотека
Date Deposited: 23 Feb 2024 10:18
Last Modified: 07 Mar 2024 14:41
URI: https://eprints.cdu.edu.ua/id/eprint/6030

Actions (login required)

View Item View Item