An efficient key establishment for pervasive healthcare monitoring
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.28Keywords:
Authentication, Cryptanalysis, Secure healthcare systems, Healthcare data security, Key establishment, Security, IoT, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Health is one of the issues that present more challenges in the world. These challenges not only come from the requirements of the region itself yet in addition result from outside conditions that impact individuals’ health conditions and access to therapeutic administrations. To augment the security strength of real-time healthcare applications in the IoT environment, a novel framework, namely, an Enhanced and IoT-based medical healthcare security scheme (EIMSS), has been proposed in this chapter. The proposed EIMSS adapts the AUP authentication technique proposed in the previous chapter for authentication while transferring the patient’s data. The proposed EIMSS approach offers flexible services to aged people like confidentiality, integrity, and authentication for protecting their vital biological and medical data. The simulation results, analysis and comparison confirm that the proposed EIMSS outperforms existing protocols with improved security strength.Abstract
How to Cite
Downloads
Similar Articles
- Olivia C. Gold, Jayasimman Lawrence, Ensemble of CatBoost and neural networks with hybrid feature selection for enhanced heart disease prediction , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- V. Selvi, T. S. Poornappriya, R. Balasubramani, Cloud computing research productivity and collaboration: A scientometric perspective , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Muhammed Jouhar K. K., Dr. K. Aravinthan, An improved social media behavioral analysis using deep learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Vijay Sharma, Nishu, Anshu Malhotra, An encryption and decryption of phonetic alphabets using signed graphs , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Abhishek Dwivedi, Shekhar Verma, SCNN Based Classification Technique for the Face Spoof Detection Using Deep Learning Concept , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Rajesh Kumar Singh, Abhishek Kumar Mishra, Ramapati Mishra, Hand Gesture Identification for Improving Accuracy Using Convolutional Neural Network(CNN) , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- D. Padma Prabha, C. Victoria Priscilla, A combined framework based on LSTM autoencoder and XGBoost with adaptive threshold classification for credit card fraud detection , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Temesgen A. Asfaw, Batch size impact on enset leaf disease detection , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Sowmiya M, Banu Rekha B, Malar E, Ensemble classifiers with hybrid feature selection approach for diagnosis of coronary artery disease , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 8 9 10 11 12 13 14 15 16 17 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper