TY - GEN
T1 - Smart security system using Hybrid System with IoT and Blockchain
T2 - 3rd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
AU - Singhal, Priyank
AU - Sharma, Sachin
AU - Saha, Supratim
AU - Mishra, Isa
AU - Alfurhood, Badria Sulaiman
AU - Singh, Prabhdeep
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - By eliminating the need for information rehashing, blockchain technology enables the secure transmission of sensitive data without the need for duplication, reducing patient history errors and saving time. The information is made even more secure by the fact that it has a timestamp. Blockchain technology has the potential to improve financial transaction security and efficiency in a variety of healthcare applications. This prevents unauthorised individuals from seeing or altering the patient's medical information in addition to restricting access to it. In this study, it is suggested that using blockchain technology to connect patients and medical professionals to a mechanism for data retrieval and storage would aid in the development of a secure and effective healthcare system. Since 1970, there have been numerous token-based methods, including passports, bank cards, bank accounts, identification cards, and keys; however, none of them have been successful in developing a reliable and secure conduit for transactions. Personal Identification Recognition Numbers (PIRN), passwords, and other security measures are used in conventional knowledge-based systems. Since they are so easily lost, stolen, or misplaced, they often can't maintain confidentiality or establish the legitimacy of a claimant. Additionally, since usernames and PINs are so easily forgotten or guessed by a fraudster, personally identifiable information like this is particularly vulnerable to theft. Due to its inherent potential and advantages over other traditional techniques of identification and verification, biological identification and authentication, also known as biometrics, is currently garnering a lot of attention. Particularly in the context of information security systems, this is true. The device's distinctive biological properties, such as fingerprints, facepalms, gesture recognition (including iris), and the device's own iris, enable a wide range of applications. These consist of forensics, educational materials, security systems for airports, international ports of entry, and financial services kiosks. In addition, it is used in a variety of other fields, like as forensics and law enforcement. As a result, every layer of the system, including the data that is sensed, calculated, and processed, as well as the information that is kept and managed, may be impacted by the system's various vulnerabilities and risks.
AB - By eliminating the need for information rehashing, blockchain technology enables the secure transmission of sensitive data without the need for duplication, reducing patient history errors and saving time. The information is made even more secure by the fact that it has a timestamp. Blockchain technology has the potential to improve financial transaction security and efficiency in a variety of healthcare applications. This prevents unauthorised individuals from seeing or altering the patient's medical information in addition to restricting access to it. In this study, it is suggested that using blockchain technology to connect patients and medical professionals to a mechanism for data retrieval and storage would aid in the development of a secure and effective healthcare system. Since 1970, there have been numerous token-based methods, including passports, bank cards, bank accounts, identification cards, and keys; however, none of them have been successful in developing a reliable and secure conduit for transactions. Personal Identification Recognition Numbers (PIRN), passwords, and other security measures are used in conventional knowledge-based systems. Since they are so easily lost, stolen, or misplaced, they often can't maintain confidentiality or establish the legitimacy of a claimant. Additionally, since usernames and PINs are so easily forgotten or guessed by a fraudster, personally identifiable information like this is particularly vulnerable to theft. Due to its inherent potential and advantages over other traditional techniques of identification and verification, biological identification and authentication, also known as biometrics, is currently garnering a lot of attention. Particularly in the context of information security systems, this is true. The device's distinctive biological properties, such as fingerprints, facepalms, gesture recognition (including iris), and the device's own iris, enable a wide range of applications. These consist of forensics, educational materials, security systems for airports, international ports of entry, and financial services kiosks. In addition, it is used in a variety of other fields, like as forensics and law enforcement. As a result, every layer of the system, including the data that is sensed, calculated, and processed, as well as the information that is kept and managed, may be impacted by the system's various vulnerabilities and risks.
KW - ACO (Ant Colony Optimisation)
KW - Blockchain
KW - Hybrid system
KW - IoT(Internet of Things)
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85178259422&partnerID=8YFLogxK
U2 - 10.1109/ICACITE57410.2023.10182383
DO - 10.1109/ICACITE57410.2023.10182383
M3 - Conference contribution
AN - SCOPUS:85178259422
T3 - 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
SP - 1032
EP - 1036
BT - 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 12 May 2023 through 13 May 2023
ER -