An efficient key establishment for pervasive healthcare monitoring
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.28Keywords:
Authentication, Cryptanalysis, Secure healthcare systems, Healthcare data security, Key establishment, Security, IoT, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Health is one of the issues that present more challenges in the world. These challenges not only come from the requirements of the region itself yet in addition result from outside conditions that impact individuals’ health conditions and access to therapeutic administrations. To augment the security strength of real-time healthcare applications in the IoT environment, a novel framework, namely, an Enhanced and IoT-based medical healthcare security scheme (EIMSS), has been proposed in this chapter. The proposed EIMSS adapts the AUP authentication technique proposed in the previous chapter for authentication while transferring the patient’s data. The proposed EIMSS approach offers flexible services to aged people like confidentiality, integrity, and authentication for protecting their vital biological and medical data. The simulation results, analysis and comparison confirm that the proposed EIMSS outperforms existing protocols with improved security strength.Abstract
How to Cite
Downloads
Similar Articles
- Manikannan Palanivel, Alaudeen A, Pandiyan K. S, Sivaprakasam P, Hybrid fuzzy and fire fly algorithm-based MPPT controller for PV system using super lift boost converter , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- A. Appu, How does brand equity influence the intent of e-bike users? Evidence from Chennai city , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Namita R. Behera, A Study on credit facilities of micro, small, and medium enterprises at Syndicate Bank , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Rajeev P. R., K. Aravinthan, A novel approach for metrics-based software defect prediction using genetic algorithm , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Santosh Kumar Sahu, B. R. Senthil kumar, Y. Aboobucker parvez, Ashish Verma, Assessment of noise levels by using noise prediction modeling , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Y. Aboobucker Parvez, Prasanth Ponnusamy, S Santhosh , Rakhi Kamra, Synthesis and structural feasibility of photonic materials , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Damtew Girma, Addisalem Mebratu, Fresew Belete, Response of potato (Solanum tuberosum L.) varieties to blended NPSB fertilizer rates on tuber yield and quality parameters in Gummer district, Southern Ethiopia , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Sheena Edavalath, Manikandasaran S. Sundaram, MARCR: Method of allocating resources based on cost of the resources in a heterogeneous cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Isreal Zewide, Wondwosen Wondimu, Melash Woldu, Kibnesh Admasu, Maize (Zea mays L.) Productivity as affected by different ratios of fertilizer (blended NPS) and inter row spacing at West Omo, South-West Ethiopia , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper