Work place: Department of Computer Science and Engineering, Islamic University of Science and Technology, Kashmir, India
E-mail: maheenmalik.0901@gmail.com
Website:
Research Interests: IoT, Data Science, Data Processing, Image and Sound Processing, Machine Learning
Biography
Ms. Maheen Fayaz received her B. E. in Computer Sciences in the year 2021 from University of Jammu. She has pursued M. Tech in Computer Sciences in the year 2023 from University of Jammu. Her research interests include Image Processing, IoT, Data Science and Machine Learning.
By Alina Pervaiz Adil Bashir Maheen Fayaz Numrena Farooq Ajaz Hussain Mir
DOI: https://doi.org/10.5815/ijwmt.2024.02.04, Pub. Date: 8 Apr. 2024
In the dynamic realm of Smart Healthcare Systems (SHS), the integration of IoT devices has revolutionized conventional practices, ushering in an era of real-time data collection and seamless communication across the healthcare ecosystem. Amidst this technological shift, the paramount concern remains the security of sensitive healthcare data within intricate networks. Several cryptographic algorithms have been proposed for smart healthcare systems for the protection of critical and sensitive data in SHS, however, the majority of newly proposed algorithms have shortcomings in terms of resource utilization and the level of security that they provide. Our research delves into the existing highly secure cryptographic algorithms and provides a comparative analysis of two popular and secure cryptographic algorithms viz N-th Degree Truncated Polynomial Ring (NTRU) and Elliptic Curve Cryptography (ECC) and verifies their applicability in SHS. Recognizing ECC's compact key sizes and its vulnerability to quantum computing threats, our study finds NTRU as a resilient and quantum-resistant alternative, providing a robust defense mechanism in the evolving landscape of healthcare cybersecurity. Key findings underscore the efficacy of NTRU in safeguarding healthcare data, emphasizing its superior performance compared to ECC, especially in the face of emerging quantum computing challenges. The comparative analysis depicts that ECC excels in key generation speed, delivering efficient and swift key creation. However, it requires larger keys to withstand potential quantum computing vulnerabilities. On the other hand, the key generation time in NTRU is slightly more than ECC but being quantum-resistant, it provides high security.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals