An efficient key establishment for pervasive healthcare monitoring
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.28Keywords:
Authentication, Cryptanalysis, Secure healthcare systems, Healthcare data security, Key establishment, Security, IoT, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Health is one of the issues that present more challenges in the world. These challenges not only come from the requirements of the region itself yet in addition result from outside conditions that impact individuals’ health conditions and access to therapeutic administrations. To augment the security strength of real-time healthcare applications in the IoT environment, a novel framework, namely, an Enhanced and IoT-based medical healthcare security scheme (EIMSS), has been proposed in this chapter. The proposed EIMSS adapts the AUP authentication technique proposed in the previous chapter for authentication while transferring the patient’s data. The proposed EIMSS approach offers flexible services to aged people like confidentiality, integrity, and authentication for protecting their vital biological and medical data. The simulation results, analysis and comparison confirm that the proposed EIMSS outperforms existing protocols with improved security strength.Abstract
How to Cite
Downloads
Similar Articles
- Hemamalini V., Victoria Priscilla C, Deep learning driven image steganalysis approach with the impact of dilation rate using DDS_SE-net on diverse datasets , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Mohit Kalra, Arpan Nautiyal, Krishnapal Singh, Health Assessment of Buksa Tribe: Exploring CSR Models for Indigenous Community Empowerment in Ramnagar Block, Nainital District , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- C. Agilan, Lakshna Arun, Optimization-based clustering feature extraction approach for human emotion recognition , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Sathya, M. S. Mythili, MOHCOA: Multi-objective hermit crab optimization algorithm for feature selection in sentiment analysis of Covid-19 Twitter datasets , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Vimala S, G. Arockia Sahaya Sheela, Label-Aware Imputation with Cluster Refinement for Smartphone Usage Analytics in Educational Institutions , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- S. Dhivya, S. Prakash, Power quality assessment in solar-connected smart grids via hybrid attention-residual network for power quality (HARN-PQ) , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Merlin Sofia S, D. Ravindran, G. Arockia Sahaya Sheela, Clean Balance-Ensemble CHD: A Balanced Ensemble Learning Framework for Accurate Coronary Heart Disease Prediction , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- C. Muruganandam, V. Maniraj, A Self-driven dual reinforcement model with meta heuristic framework to conquer the iot based clustering to enhance agriculture production , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- D. Jayadurga, A. Chandrabose, Distribution of virtual machines with SVM-FFDM approach in cloud computing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Basheer Ahamed, M. Mohamed Surputheen, M. Rajakumar, Quantitative transfer learning- based students sports interest prediction using deep spectral multi-perceptron neural network , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 12 13 14 15 16 17 18 19 20 21 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

