An efficient key establishment for pervasive healthcare monitoring
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.28Keywords:
Authentication, Cryptanalysis, Secure healthcare systems, Healthcare data security, Key establishment, Security, IoT, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Health is one of the issues that present more challenges in the world. These challenges not only come from the requirements of the region itself yet in addition result from outside conditions that impact individuals’ health conditions and access to therapeutic administrations. To augment the security strength of real-time healthcare applications in the IoT environment, a novel framework, namely, an Enhanced and IoT-based medical healthcare security scheme (EIMSS), has been proposed in this chapter. The proposed EIMSS adapts the AUP authentication technique proposed in the previous chapter for authentication while transferring the patient’s data. The proposed EIMSS approach offers flexible services to aged people like confidentiality, integrity, and authentication for protecting their vital biological and medical data. The simulation results, analysis and comparison confirm that the proposed EIMSS outperforms existing protocols with improved security strength.Abstract
How to Cite
Downloads
Similar Articles
- R. Gomathi, Balaji V, Sanjay R. Pawar, Ayesha Siddiqua, M. Dhanalakshmi, Ravi Rastogi, Ensuring ethical integrity and bias reduction in machine learning models , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Shefali Bahadur, Rohit Kushwaha, M. Venkatesan, Ramya Singh, Manish Mishra, Strategic alignment in multispecialty hospitals: Implementing a balanced scorecard approach for optimal performance , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Nisha Patil, Archana Bhise, Rajesh K. Tiwari, Fusion deep learning with pre-post harvest quality management of grapes within the realm of supply chain management , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- ABHAYA K. SINGH, IMPLICATIONS OF CLIMATE CHANGE IN THE HIMALAYAN REGION AND ITS IMPACT ON INDIAN SECURITY , The Scientific Temper: Vol. 2 No. 1&2 (2011): The Scientific Temper
- Krishna P. Kalyanathaya, Krishna Prasad K, A novel method for developing explainable machine learning framework using feature neutralization technique , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- B. S. E. Zoraida, J. Jasmine Christina Magdalene, Smart grid precision: Evaluating machine learning models for forecasting of energy consumption from a smart grid , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Thiagarajan, S. Prakash Kumar, Performance of public transport appraisal using machine learning , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R Prabhu, S Sathya, P Umaeswari, K Saranya, Lung cancer disease identification using hybrid models , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- S. Gomathi, C. Radhika, A secure messaging application using steganography and AES encryption a dual-layer secure messaging system , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Sachin V. Chaudhari, Jayamangala Sristi, R. Gopal, M. Amutha, V. Akshaya, Vijayalakshmi P, Optimizing biocompatible materials for personalized medical implants using reinforcement learning and Bayesian strategies , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
<< < 8 9 10 11 12 13 14 15 16 17 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

