Method for preserving privacy in wearable IoT devices by extending security using fog computing
The overarching objective has been achieved through the development of a method enabling the extension of Fog Computing (FC) to facilitate the transport and encryption of sensitive data from wearable devices. The study presents a method leveraging Fog Computing (FC) to transport and encrypt sensitiv...
Saved in:
Published in | 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0 pp. 1 - 6 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
05.06.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The overarching objective has been achieved through the development of a method enabling the extension of Fog Computing (FC) to facilitate the transport and encryption of sensitive data from wearable devices. The study presents a method leveraging Fog Computing (FC) to transport and encrypt sensitive data from wearable devices, effectively mitigating privacy risks. Through comprehensive tests, NFC emerges as the optimal technology for data transport, while the DHEC algorithm is identified as the best encryption method for securing data between FC and the cloud. Real-world simulations validate the proposed approach, demonstrating its feasibility and effectiveness. The MyNFC app facilitates secure data transmission to AWS, with ServerNFC successfully decrypting data. The AES algorithm exhibited an average CPU usage of 31.8375, with low energy consumption and an average execution time of 26.404 seconds. For the RSA algorithm, the average CPU usage was 33.5875, also with low energy consumption, and an average execution time of 27.8 seconds. The DHEC algorithm showed an average CPU usage of 33.25, with low energy consumption, and an average execution time of 26.711 seconds. Lastly, the HJP algorithm displayed an average CPU usage of 32.375, with low energy consumption, and an average execution time of 30.163 seconds. Overall, the study highlights the ability of FC to safeguard information against interception, endorsing the proposed method's security and scalability. |
---|---|
DOI: | 10.1109/OTCON60325.2024.10688002 |