What is it about?

The Internet of Things offers enormous promise in healthcare to manage day-to-day activity in a routine lifestyle with the control and monitoring process that may bring new capabilities and economic benefits. This article addresses the general issues and risks at the endpoint node, such as wearables and Body Sensor Networks (BSN), to the node communication for reliable data acquisition to make decisions for the operations. The approach is implemented on the wide applicable resource to help in situations such as real-time medical emergencies and daily routine adaptations features for IoT endpoint subsystem and authorization node through dedicated private Block-Chain implementation with Software-defined Network (SDN) stack applications methods to protect the node to prevent chunk data collection. In this recursive process, which parses the device identification and compares the local connected hosts and neighbour availability to prepare topology map and identify the dodgy addressed host in the network. This study develops a fresh perspective to comprehend IoT endpoint security concerns and appropriate mitigation techniques. It offers a new field of secured and redundant designs that protect operational integrity in sensitive personal data used in medical treatment while enabling IoT advantages.

Featured Image

Why is it important?

The Local Compute Node (LCN) plays a crucial role in ensuring data integrity and reliability within the system. It acknowledges every data collection and message, creating a comprehensive log of all sensor data in a time-series database. This logging mechanism enables efficient monitoring and tracking of endpoints within the system. To address challenges related to storage overhead and data reconstruction delay in distributed storage systems, a distributed storage architecture with a distributed file system application for the blockchain network is proposed. This architecture aims to reduce overhead storage requirements while maintaining data integrity. By implementing a distributed file system, the system can efficiently manage storage access challenges and provide scalability as the system grows. One key feature of the system is verified data possession, which substitutes evidence in original digital transactions for storing new data blocks. This process involves comparing newly stored data blocks with proof, resulting in a significant reduction in computing capacity required for storage operations. This approach enhances data security and integrity, ensuring that only authorized data is stored within the system. Overall, the suggested architecture offers significant advantages for real-time applications by providing secure and distributed data storage capabilities. The experimental study derives various parameters such as endpoint performance analysis, power utilization factor when the endpoint is battery powered, network performance and utilization of hardware, data transfer of processed data and delivery ratio analysis. The analysed data and sets are depicted in the chart form to analyze the result to enhance the study to explore more real time workload. The experimental study comprehensively evaluates the dataset by considering multiple features and parameters, ensuring a thorough analysis of data integrity, processing power, memory capacity, energy consumption, network performance, scalability, security, data acquisition, and system utilization. These features and parameters provide a holistic view of the system's performance and capabilities, enabling a detailed understanding of the experimental outcomes. In the context of data transmission, the process typically begins with data originating from a sensor network endpoint. This data is structured within a payload and transmitted using a gateway with Local Compute Node (LCN) notation. The endpoint receives acknowledged feedback, ensuring reliable data transfer. The tasks involved in this transaction include Trigger (T1), Record (T2), Transfer (T3), and Reset (T4). These tasks can be easily executed on either endpoint using direct REST APIs and LCN-based communication, leveraging dedicated hardware for hashing and an SDN (SoftwareDefined Networking) stack.

Perspectives

Address Reservation in IoT devices to require consistent IP addresses for specific services or applications. DHCP servers can be configured to reserve specific IP addresses for such devices, ensuring they always receive the same address. While DHCP simplifies network management, it's crucial to implement security measures. Unauthorized devices might attempt to obtain IP addresses or pose security risks. DHCP snooping and DHCP server security features can help mitigate such risks. Scale and Performance: In extremely large IoT deployments, DHCP server performance and scalability might become critical. Ensuring that the DHCP infrastructure can handle the increasing number of devices is important for smooth operation. DHCP is a convenient and efficient way to manage IP address assignment and network configurations in IoT environments, providing automation, centralization, and scalability [13]. Properly configuring and securing the DHCP infrastructure is essential to ensure reliable and secure operation in IoT deployments.

Ajithraj R. A
Indian Institute of Technology Tirupati

Read the Original

This page is a summary of: A method of preventing endpoint exploits in healthcare with block-chain token authorization implementation in SDN stack, January 2024, American Institute of Physics,
DOI: 10.1063/5.0197755.
You can read the full text:

Read

Contributors

The following have contributed to this page