What is it about?
The Internet of Things offers enormous promise in healthcare to manage day-to-day activity in a routine lifestyle with the control and monitoring process that may bring new capabilities and economic benefits. This article addresses the general issues and risks at the endpoint node, such as wearables and Body Sensor Networks (BSN), to the node communication for reliable data acquisition to make decisions for the operations. The approach is implemented on the wide applicable resource to help in situations such as real-time medical emergencies and daily routine adaptations features for IoT endpoint subsystem and authorization node through dedicated private Block-Chain implementation with Software-defined Network (SDN) stack applications methods to protect the node to prevent chunk data collection. In this recursive process, which parses the device identification and compares the local connected hosts and neighbour availability to prepare topology map and identify the dodgy addressed host in the network. This study develops a fresh perspective to comprehend IoT endpoint security concerns and appropriate mitigation techniques. It offers a new field of secured and redundant designs that protect operational integrity in sensitive personal data used in medical treatment while enabling IoT advantages.
Featured Image
Photo by Louis Reed on Unsplash
Why is it important?
The Local Compute Node (LCN) plays a crucial role in ensuring data integrity and reliability within the system. It acknowledges every data collection and message, creating a comprehensive log of all sensor data in a time-series database. This logging mechanism enables efficient monitoring and tracking of endpoints within the system. To address challenges related to storage overhead and data reconstruction delay in distributed storage systems, a distributed storage architecture with a distributed file system application for the blockchain network is proposed. This architecture aims to reduce overhead storage requirements while maintaining data integrity. By implementing a distributed file system, the system can efficiently manage storage access challenges and provide scalability as the system grows. One key feature of the system is verified data possession, which substitutes evidence in original digital transactions for storing new data blocks. This process involves comparing newly stored data blocks with proof, resulting in a significant reduction in computing capacity required for storage operations. This approach enhances data security and integrity, ensuring that only authorized data is stored within the system. Overall, the suggested architecture offers significant advantages for real-time applications by providing secure and distributed data storage capabilities. The experimental study derives various parameters such as endpoint performance analysis, power utilization factor when the endpoint is battery powered, network performance and utilization of hardware, data transfer of processed data and delivery ratio analysis. The analysed data and sets are depicted in the chart form to analyze the result to enhance the study to explore more real time workload. The experimental study comprehensively evaluates the dataset by considering multiple features and parameters, ensuring a thorough analysis of data integrity, processing power, memory capacity, energy consumption, network performance, scalability, security, data acquisition, and system utilization. These features and parameters provide a holistic view of the system's performance and capabilities, enabling a detailed understanding of the experimental outcomes. In the context of data transmission, the process typically begins with data originating from a sensor network endpoint. This data is structured within a payload and transmitted using a gateway with Local Compute Node (LCN) notation. The endpoint receives acknowledged feedback, ensuring reliable data transfer. The tasks involved in this transaction include Trigger (T1), Record (T2), Transfer (T3), and Reset (T4). These tasks can be easily executed on either endpoint using direct REST APIs and LCN-based communication, leveraging dedicated hardware for hashing and an SDN (SoftwareDefined Networking) stack.
Perspectives
Read the Original
This page is a summary of: A method of preventing endpoint exploits in healthcare with block-chain token authorization implementation in SDN stack, January 2024, American Institute of Physics,
DOI: 10.1063/5.0197755.
You can read the full text:
Contributors
The following have contributed to this page