z-logo
open-access-imgOpen Access
Blockchain-based Intelligent Monitored Security System for Detection of Replication Attack in the Wireless Healthcare Network
Author(s) -
Jatinder Warraich,
Chetanpal Singh,
Prem Thapa
Publication year - 2021
Publication title -
european journal of engineering and technology research
Language(s) - English
Resource type - Journals
ISSN - 2736-576X
DOI - 10.24018/ejeng.2021.6.6.2599
Subject(s) - computer science , wireless sensor network , node (physics) , replication (statistics) , blockchain , computer security , computer network , wireless , wireless network , component (thermodynamics) , key distribution in wireless sensor networks , telecommunications , engineering , statistics , mathematics , structural engineering , physics , thermodynamics
Wireless sensor networks have revolutionized the way healthcare works replacing the traditional methods with sensor-enabled IoT devices that help in monitoring the data. The data is collected by these sensors that are there on the body of the user, the data is transmitted over the network to the healthcare monitoring systems. The transmission follows the route of the wireless channel that is not secure as it can be accessed by legitimate as well as illegitimate users. These pose security threats; one such attack is a replication attack. This makes the replicas of the original node, replaces the data with the malicious content for attacking the system, and deploys the node back to the network making it difficult to detect. The aim of the work is to review the Blockchain-based intelligent monitored security system for the detection of replication attacks in the wireless healthcare network. The method used for review is the secondary research method. The main focus of the work is kept on the literature review for obtaining insights and knowledge. The results show that blockchain provides the required security to the data carried by the sensor-enabled IoT. The result contributed to the understanding of the different blockchain techniques in securing data. The system component is farmed in the work and verified in the results.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here