An efficient key establishment for pervasive healthcare monitoring
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.28Keywords:
Authentication, Cryptanalysis, Secure healthcare systems, Healthcare data security, Key establishment, Security, IoT, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Health is one of the issues that present more challenges in the world. These challenges not only come from the requirements of the region itself yet in addition result from outside conditions that impact individuals’ health conditions and access to therapeutic administrations. To augment the security strength of real-time healthcare applications in the IoT environment, a novel framework, namely, an Enhanced and IoT-based medical healthcare security scheme (EIMSS), has been proposed in this chapter. The proposed EIMSS adapts the AUP authentication technique proposed in the previous chapter for authentication while transferring the patient’s data. The proposed EIMSS approach offers flexible services to aged people like confidentiality, integrity, and authentication for protecting their vital biological and medical data. The simulation results, analysis and comparison confirm that the proposed EIMSS outperforms existing protocols with improved security strength.Abstract
How to Cite
Downloads
Similar Articles
- J. Helan Shali Margret, N. Amsaveni, Application of Lotka’s law in Indian cytokine publications: A scientometric study based on web of science during 1998 TO 2022 , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Rakhimov S. Bekturdievich, Grave structures of the population of the lower part of the Amudarya in the islamic period (On the example of archeological monuments of IX-XIII centuries) , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Archana Borde, Dattatraya Pandurang Rane, Pratap Vasantrao Pawar, Role of artificial intelligence in digital marketing in enhancing customer engagement , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Aarthi Monalisa M, Anli Suresh, Adoptive bancassurance models transforming patronization among the insured , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- Jadhav Girish Vasantrao, Chirag Patel, AT&C and non-technical loss reduction in smart grid using smart metering with AI techniques , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Improving image quality assessment with enhanced denoising autoencoders and optimization methods , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Merla Agnes Mary, Britto Ramesh Kumar, Hybrid GAN with KNN - SMOTE Approach for Class-Imbalance in Non-Invasive Fetal ECG Monitoring , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Muthuvel Balasubramanian, Jonnakuti V. G. Rama Rao, Surya C. P. R. Sanaboina, Vavilala Venkatesh, Amalodbhavi Sanaboina, Tracking and control of power oscillation dampings in transmission lines using PV STATCOM , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- G Gayathri Devi, R Radha, Smart alerting services: Safeguarding women and children in the digital age , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Mithun Vinayaka Kulkarni, Vijayanand M, Syed Mudassir, Said Bakhit Ali Bakhit Tabook, Mohammed Hassan Abdullah Al-Hafeedh, An overview of wastepaper and carton recycling in Oman , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
<< < 31 32 33 34 35 36 37 38 39 40 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

