An efficient key establishment for pervasive healthcare monitoring
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.28Keywords:
Authentication, Cryptanalysis, Secure healthcare systems, Healthcare data security, Key establishment, Security, IoT, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Health is one of the issues that present more challenges in the world. These challenges not only come from the requirements of the region itself yet in addition result from outside conditions that impact individuals’ health conditions and access to therapeutic administrations. To augment the security strength of real-time healthcare applications in the IoT environment, a novel framework, namely, an Enhanced and IoT-based medical healthcare security scheme (EIMSS), has been proposed in this chapter. The proposed EIMSS adapts the AUP authentication technique proposed in the previous chapter for authentication while transferring the patient’s data. The proposed EIMSS approach offers flexible services to aged people like confidentiality, integrity, and authentication for protecting their vital biological and medical data. The simulation results, analysis and comparison confirm that the proposed EIMSS outperforms existing protocols with improved security strength.Abstract
How to Cite
Downloads
Similar Articles
- Kritika Gautam, Anitha Arvind, Neha Kapur, Mukesh Kumar, The keratometry changes pre and post-applanation tonometry , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Sweta Jain, Jacob Joseph Kalapurackal, Green Innovation, Pressure, Green Training, and Green Manufacturing: Empirical evidence from the Indian apparel export industry , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Panda Aditi Ambarish, Kaushik Trivedi, Immersive learning: A virtual reality teaching model for enhancing english speaking skills , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Mantsha Rayeen, Roshni Sengupta, Sanjay Chaudhary, Short-term changes in lens vault post implantable collamer lens surgery in myopic patients , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- Jonnakuti V. G. Rama Rao, Muthuvel Balasubramanian, Chaladi S. Gangabhavani, Mutyala A. Devi, Kona D. Devi, A TLBO algorithm-based optimal sizing in a standalone hybrid renewable energy system , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- J. Pavithra, Status of investment in startup in India – An analysis , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- Geetha Satish Pisharody, Sanjay Gupta, Effect of School Aspects on the Adversity Profile of Higher Secondary School Students , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Afroz Alam, Krishna Kumar Rawat, Praveen Kumar Verma, Sonu Yadav, Bryodiversity of Eastern Ghats (India) , The Scientific Temper: Vol. 7 No. 1&2 (2016): THE SCIENTIFIC TEMPER
- Surender Singh, Deep Lal, Rachna Thakur, Suchitra Devi, Socio-economic Compulsions on Climate Change and Energy Security of India , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- S. Manohar, T. P. Vijayakumar, Optimization of gluten-free bread using RSM (Design Expert) to study its textural and sensory properties , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 35 36 37 38 39 40 41 42 43 44 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

