An efficient key establishment for pervasive healthcare monitoring
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.28Keywords:
Authentication, Cryptanalysis, Secure healthcare systems, Healthcare data security, Key establishment, Security, IoT, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Health is one of the issues that present more challenges in the world. These challenges not only come from the requirements of the region itself yet in addition result from outside conditions that impact individuals’ health conditions and access to therapeutic administrations. To augment the security strength of real-time healthcare applications in the IoT environment, a novel framework, namely, an Enhanced and IoT-based medical healthcare security scheme (EIMSS), has been proposed in this chapter. The proposed EIMSS adapts the AUP authentication technique proposed in the previous chapter for authentication while transferring the patient’s data. The proposed EIMSS approach offers flexible services to aged people like confidentiality, integrity, and authentication for protecting their vital biological and medical data. The simulation results, analysis and comparison confirm that the proposed EIMSS outperforms existing protocols with improved security strength.Abstract
How to Cite
Downloads
Similar Articles
- Vijai K. Visvanathan, Karthikeyan Palaniswamy, Thanarajan Kumaresan, Green ammonia: catalysis, combustion and utilization strategies , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Maysam A. Khabisi, Azar B. Masoudzade, Neda F. Rad, On the effectiveness of receiving teacher and peer feedback as a mediator on Iranian English as a Foreign Language learners’ writing skill: Mobile-mediated vs. direct instruction , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Suresh L. Chitragar, Measurement of agricultural productivity and levels of development in the Malaprabha river basin, Karnataka, India , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Abbasova Sona Jamal, Aliyev Sabit Shakir, Mahmudov Elmir Heydar, Museyibli Emin Bakir, Nadirkhanova Dilshat Adalat, Econometric analysis of grain yields (using the example of the Republic of Azerbaijan) , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Vijetna Singh, Alka Thakur, ECOLOGICAL ENGINEERING OF MICROALGAE FOR ENHANCED ENERGY PRODUCTION , The Scientific Temper: Vol. 8 No. 1&2 (2017): The Scientific Temper
- Simeon P, Vijayalakshmi D, Design and development of wall hanging and plant hangers using tie and dye , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Veena Grace Carmel, Correlative Analysis of Cryptocurrencies and Stocks from Asset and Investment Perspective , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Priyanka Dutta, Rianka Sarkar, A Sustainable Approach: Navigating through the Mishing Tribe’s Indigenous Knowledge and Disaster Management Strategies , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Vijay Kumar, Priya Thapliyal, Rajesh Rayal, Baljeet Singh Saharan, Arun Kumar, Shweta Sahni, The Molecular Profiling and HCV RNA Quantification to Study the Distribution of Different HCV Genotypes in Accordance to Geographical Condition , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- Bayelign A. Zelalem, Ayalew A. Abebe, Evaluating supply chain management practice among micro and small manufacturing enterprise in southwest, Ethiopia , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 40 41 42 43 44 45 46 47 48 49 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

