• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology


Indian Journal of Science and Technology

Year: 2020, Volume: 13, Issue: 28, Pages: 2833-2848

Original Article

IoT-based Secure and Energy Efficient scheme for E-health applications

Received Date:08 June 2020, Accepted Date:19 July 2020, Published Date:07 August 2020


Background/objectives: This study presents a secure and energy-efficient scheme of patient’s data transmission from wearable IoT sensors (WIS) to base station (BS). IoT sensors are widely used in the healthcare domain for realtime data collection and transmission. However, these sensors are resourceconstrained in terms of computational power and storage due to which chances of security breaches and threats increase. Moreover, with time the energy level of IoT sensors also degrade that sometimes leads towards loss of sensitive patient data. Purpose: The purpose of this study is to provide secure data transmission between wearable sensors and base stations and increasing energy efficiency of resource-constrained wearable IoT sensors. Method: The proposed scheme was tested by creating a mathematical model and then creating a simulation setup using the Cooja Contiki simulator. Findings: The results show that the proposed scheme provides secure and energy-efficient data transmission from WISs to BS as compared to the existing approaches. Further, the proposed scheme addresses some key issues including availability, reliability, scalability, and limited patient mobility. Novelty: Our research presented a unique approach for e-health applications using the IoT, where we considered the lightweight and secure scheme providing multiple group node concept.

Keywords: Internet of Things (IoT); wearable IoT sensors (WIS); healthcare; Group node (GN); base station (BS); simulation


  1. Farahani B, Firouzi F, Chakrabarty K, Iot H. Healthcare IOT. In: Intelligent Internet of Things. (pp. 515-545) Springer. 2020.
  2. Satija U, Ramkumar B, Manikandan MS. Real-Time Signal Quality-Aware ECG Telemetry System for IoT-Based Health Care Monitoring. IEEE Internet of Things Journal. 2017;4(3):815–823. Available from: https://dx.doi.org/10.1109/jiot.2017.2670022
  3. Tanwar S, Parekh K, Evans R. Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and Applications. 2020;50:102407. Available from: https://dx.doi.org/10.1016/j.jisa.2019.102407
  4. Greco L, Ritrovato P, Xhafa F. An edge-stream computing infrastructure for real-time analysis of wearable sensors data. Future Generation Computer Systems. 2019;93:515–528. Available from: https://dx.doi.org/10.1016/j.future.2018.10.058
  5. Indrakumari R. The growing role of Internet of Things in healthcare wearables. Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach. 2020. ;p. 163–194. Available from: https://doi.org/10.1016/B978-0-12-819593-2.00006-6
  6. Muthu B. IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector. Peer-to-Peer Networking and Applications. 2020;2020:1–12. Available from: https://doi.org/10.1007/s12083-019-00823-2
  7. Kaur H, Atif M, Chauhan R. An Internet of Healthcare Things (IoHT)-Based Healthcare Monitoring System. Advances in Intelligent Computing and Communication. 2020. ;p. 475–482. Available from: https://doi.org/10.1007/978-981-15-2774-6_56
  8. Vora J, Nayyar A, Tanwar S, Tyagi S, Kumar N, Obaidat MS, et al. BHEEM: A blockchain-based framework for securing electronic health records. In: 2018 IEEE Globecom Workshops (GC Wkshps). IEEE. p. 1–6.
  9. Hathaliya JJ, Tanwar S. An exhaustive survey on security and privacy issues in Healthcare 4.0. Computer Communications. 2020;153:311–335. Available from: https://dx.doi.org/10.1016/j.comcom.2020.02.018
  10. Hathaliya JJ, Tanwar S, Evans R. Securing electronic healthcare records: A mobile-based biometric authentication approach. Journal of Information Security and Applications. 2020;53:102528. Available from: https://dx.doi.org/10.1016/j.jisa.2020.102528
  11. Salih FI. IoT security risk management model for healthcare industry. Malaysian Journal of Computer Science. 2019;p. 131–144. Available from: https://doi.org/https://doi.org/10.22452/mjcs.sp2019no3.9
  12. Almulhim M, Islam N, Zaman N. A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications. International Journal of Computer Science and Network Security. 2019;19(1):107–120. Available from: https://expert.taylors.edu.my/file/rems/publication/109566_5572_1.pdf
  13. Mamoona Humayun NZ, Jhanjhi, Malak Z, Alamri. Smart Secure and Energy Efficient Scheme for E-Health Applications using IoT: A Review. IJCSNS International Journal of Computer Science and Network Security. 2020;(6) 20.
  14. Gope P, Hwang T. BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network. IEEE Sensors Journal. 2016;16:1368–1376. Available from: https://dx.doi.org/10.1109/jsen.2015.2502401
  15. Zakaria H. IoT Security Risk Management Model for Secured Practice in Healthcare Environment. Procedia Computer Science. 2019;161:1241–1248. Available from: https://doi.org/10.1016/j.procs.2019.11.238
  16. Moosavi SR. Performance analysis of end-to-end security schemes in healthcare IoT. Procedia computer science. 2018;130:432–439. Available from: https://doi.org/10.1016/j.procs.2018.04.064
  17. Zouka HAE, Hosni MM. Secure IoT communications for smart healthcare monitoring system. Internet of Things. 2019;p. 100036. Available from: https://dx.doi.org/10.1016/j.iot.2019.01.003
  18. Romdhani I, Al-Dubai AY, Qasem M, Ghaleb B. Cooja Simulator Manual. United Kingdom. Edinburgh Napier University. 2016.
  19. Bagula B, Erasmus Z. IOT emulation with Cooja. In: ICTP-IoT Workshop. .
  20. Almulhim M, Zaman N. Proposing secure and lightweight authentication scheme for IoT based E-health applications. 20th International Conference on Advanced Communication Technology (ICACT). 2018;p. 481–487. Available from: https://doi.org/10.23919/ICACT.2018.8323802
  21. Marcos A, Simplicio, et al. Lightweight and escrow- Less authenticated key agreement for the IoT. Computer Communications. 2017;98:43–51. Available from: https://doi.org/10.1016/j.comcom.2016.05.002
  22. Almusaylim ZA, Alhumam A, Jhanjhi NZ. Proposing a Secure RPL based Internet of Things Routing Protocol: A Review. Ad Hoc Networks. 2020;101:102096. Available from: https://dx.doi.org/10.1016/j.adhoc.2020.102096
  23. Diro A, Reda H, Chilamkurti N, Mahmood A, Zaman N, Nam Y. Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication. IEEE Access. 2020;8:60539–60551. Available from: https://dx.doi.org/10.1109/access.2020.2983117


© 2020 Humayun et al..This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee).


Subscribe now for latest articles and news.