phonelogo+234 8146561114 or +2347015391124

QUANTUM CRYPTOGRAPHY FOR THE SECURITY OF INTERNET OF MEDICAL THINGS

USER'S INSTRUCTIONS: The project work you are about to view is on "quantum cryptography for the security of internet of medical things". Please, sit back and study the below research material carefully. This project topic"quantum cryptography for the security of internet of medical things"have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this"quantum cryptography for the security of internet of medical things"project research material is to reduce the stress of moving from one school library to another all in the name of searching for"quantum cryptography for the security of internet of medical things"research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.


TITLE PAGE

 

BY

---
--/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---



APPROVAL PAGE

This is to certify that the research work,"quantum cryptography for the security of internet of medical things"by ---, Reg. No. --/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.

By
---                                                     . ---
Supervisor                                                  Head of Department.
Signature……………….                           Signature……………….        

……………………………….
---
External Invigilator



DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.



ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.


PROJECT DESCRIPTION: This work"quantum cryptography for the security of internet of medical things"research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of"quantum cryptography for the security of internet of medical things"is to be ordered for. Happy viewing!!!


ABSTRACT

ABSTRACT
Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information.

One of the best ways to which medical image could be kept secured is through the use of quantum cryptography

Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption and authentication.

This paper can make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured.

This work has been able to provide a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred.

 

 TABLE OF CONTENTS
Cover page/Title page
Certification page
Executive summary
CHAPTER ONE

  • Introduction
    • Background of the Study
    • Aim and Objectives
    • significance of the Study
    • Internet of Medical Things (IoMT)

CHAPTER TWO

  • Literature Review
    • Review of related studies
    • Impact of internet of medical things (IoMT)
    • Challenges of IoMT Adoption
    • Importance of IoMT Adoption

CHAPTER THREE

    • Methodology
    • Quantum n shor’s factorizing algorithm
    • System flowchart
    • Conclusion

Reference

 

CHAPTER ONE
1.0                                            INTRODUCTION
1.1                               BACKGROUND OF THE STUDY
Medical images have become an essential part of medical diagnoses and treatments. Often, many diseases are better diagnosed through medical imaging. Occasionally, there are needs to refer patients for further diagnosis and treatment without physically moving their medical records to the referred location, and these are usually transferred through network communication infrastructure such as the internet. Usually, medical images are classified information that should be treated with utmost confi- dentiality. Now to ensure the integrity and confidentiality of a medical image, medical professionals must properly secure these data with the network communication infrastructure in order for the patient referred location to receive the exact transferred medical image.
Alowolodu, Alese, and Adetunmbi (2016) posit that, despite the internet providing a better solution to various kinds of scalability, flexibility, and availability, some people are still skeptical to relinquish their personal data or information over the internet.
Picture Archiving and Communications Systems (PACS) have been described as a reliable means of transferring and distributing image data. Communication of images in a PACS environment is usually over the local area network that is protected by a firewall from outside intruders (Samaan, 2016).
Nowadays, the transmission of images is a daily routine, and it is necessary to find an efficient way to transmit them over the networks. With the number of internet users on the increase every day, every- thing done online is under the threat of malicious intruders (Kapur et al., 2013). The transmission of images over the internet is challenging because of the high risk of eavesdroppers and internet communication hackers. In this manner, one of the secured means of transmitting the image over the internet is cryptography.
Cryptography is a security tool that provides security in the ciphers of a message. It is also the art of encoding and decoding messages and has existed as long as people have distrusted each other and sought forms of secure communication. Cryptographic algorithms use encryption keys, which are the elements that turn a general encryption algorithm into a specific method of encryption. Cryptography plays a central role in mobile phone communication, e-commerce, Pay-TV, sending private e- mails, and transmitting financial information, and it touches on many aspects of daily lives. There are various cryptographic schemes available, one of which is the Quantum Cryptography. Quantum Cryptography, or Quantum Key Distribution (QKD), applies fundamental laws of quantum physics to guarantee secure communication. It enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption (for instance, the one-time pad) and authentication (Van Der Walt, 2016). Unlike conventional cryptography, whose security often relies on unproven computational assumptions, QKD guarantees security based on the fundamental laws of quantum mechanics. Quantum cryptography solves the problems of secret-key cryptography by providing a way for two authorized users who are in different locations to securely establish a network secret key.
The necessity of fast and secure diagnosis is vital in the medical world to save the life of world creatures. Nowadays, the transmission of images is a daily routine, and it is necessary to find an efficient way to transmit them over networks (Lo-Varco, Puech, & Dumas, 2003; Norcen, Podesser, Pommer, Schmidt, & Uhl, 2003). For image transmission, two different approaches of technologies have been developed. The first approach is based on content protection through encryption (Berlekemp et al., 2018; McEliece 2018). In this approach, proper decryption of data requires a key. The second approach based the protection on digital watermarking or data hiding and aimed at secretly embedding a message into the data. In the current era, the transmission of images over the internet is challenging because of the high risk of eavesdroppers and unsecure communication to internet communication hackers. In this manner, the better way to transmit the image over internet is encryption.
The development of quantum cryptography was motivated by the short-comings of classical crypto- graphic methods, which can be classified as either “public-key” or “secret-key” methods.
Public-key encryption is based on the idea of a safe with two keys: a public key to lock the safe and a private key to open it (Ekert, 2015) Using this method, anyone can send a message since the public key is used to encrypt messages, but only someone with the private key can decrypt the messages.

Since the encrypting and decrypting keys are different, it is not necessary to securely distribute a key. The security of public-key encryption depends on the assumed difficulty of certain mathematical operations, such as factoring extremely large prime numbers.
1.2     Aim and objectives of the study
This seminar is aimed at discussing the application quantum cryptography for the security of internet of medical things. The objectives are:

  • To study a means of securing internet of medical things
  • To provide a remarkable new dimension in secured network communication infrastructure.
  • To ensure proper security of medical infrastructure.

1.3     Significance of the study


This seminar will make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured.

It will also serve as a means of providing a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred

1.4    Internet of Medical Things (IoMT)

The Internet of Medical Things (IoMT) refers to the interconnected network of medical devices, wearables, and other technology that can collect, transfer, and analyze health data. This technology is transforming the healthcare industry by enabling real-time patient monitoring, improved patient outcomes, and reduced costs.
The Internet of Medical Things (IoMT) works by collecting data from medical devices and wearables and transferring it to healthcare providers, such as doctors and hospitals. This data can be used to monitor patients in real-time and provide early warning signs of potential health problems. The data can also be analysed to identify patterns and trends, which can lead to improved patient outcomes and reduced costs

 


CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of"quantum cryptography for the security of internet of medical things"is also available. Order full work to download. Chapter two of"quantum cryptography for the security of internet of medical things"consists of the literature review. In this chapter all the related work on"design and construction of an arduino based public address system"was reviewed.

CHAPTER THREE: The complete chapter three of"quantum cryptography for the security of internet of medical things"is available. Order full work to download. Chapter three of"quantum cryptography for the security of internet of medical things"consists of the methodology. In this chapter all the method used in carrying out this work was discussed.

CHAPTER FOUR: The complete chapter four of"quantum cryptography for the security of internet of medical things"is available. Order full work to download. Chapter four of"quantum cryptography for the security of internet of medical things"consists of all the test conducted during the work and the result gotten after the whole work

CHAPTER FIVE: The complete chapter five of"quantum cryptography for the security of internet of medical things"is available. Order full work to download. Chapter five of"quantum cryptography for the security of internet of medical things"consist of conclusion, recommendation and references.

CLICK HERE FOR MORE RELATED TOPICS/MATERIAL


To "DOWNLOAD" the complete material on this particular topic above click "HERE"

Do you want our Bank Accounts? please click HERE

To view other related topics click HERE

To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE

Do you want us to research your new topic? if yes, click "HERE"

Do you have any question concerning our post/services? click HERE for answers to your questions


For more information contact us through any of the following means:

Mobile No phonelogo:+2348146561114 or +2347015391124 [Mr. Innocent]

Email address emailus:engr4project@gmail.com

Watsapp No whatsapp.html :+2348146561114


COUNTRIES THAT FOUND OUR SERVICES USEFUL

Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124

Watsapp Nowhatsapp.html
:+2348146561114


E
mail Address emailus:engr4project@gmail.com


FOLLOW / VISIT US VIA:

tweeter instagram.htmlfacebook logomyyoutubelogo.html

Order Full Material(s)
Download Full Material(s)
Bank Accounts

Contact us

Hire a writer

Order/learn construction


View other related topics

Frequently asked questions(FAQ)
View more related topics
Format = microsoft word

Chapters = 1-5 chapters


Price: N3,000.

FOLLOW OR CONTACT US VIA:
facebook logomyyoutubelogo.html