An efficient key establishment for pervasive healthcare monitoring
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.28Keywords:
Authentication, Cryptanalysis, Secure healthcare systems, Healthcare data security, Key establishment, Security, IoT, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Health is one of the issues that present more challenges in the world. These challenges not only come from the requirements of the region itself yet in addition result from outside conditions that impact individuals’ health conditions and access to therapeutic administrations. To augment the security strength of real-time healthcare applications in the IoT environment, a novel framework, namely, an Enhanced and IoT-based medical healthcare security scheme (EIMSS), has been proposed in this chapter. The proposed EIMSS adapts the AUP authentication technique proposed in the previous chapter for authentication while transferring the patient’s data. The proposed EIMSS approach offers flexible services to aged people like confidentiality, integrity, and authentication for protecting their vital biological and medical data. The simulation results, analysis and comparison confirm that the proposed EIMSS outperforms existing protocols with improved security strength.Abstract
How to Cite
Downloads
Similar Articles
- Ramalakshmi V, Prioritizing the factors affecting employee relations and its influence on job performance , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Heena Gulia, Sunder Singh Arya, Neha Yadav, Ajay Kumar, Monika Janaagal, Mamta Sawariya, Naveen Kumar, Himanshu Mehra, Sunil Yadav, Sudershan Singh, Reetu Verma, Strategies for adaptations and mitigation of abiotic stresses in crops: A review , The Scientific Temper: Vol. 16 No. 01 (2025): The Scientific Temper
- Ayalew Ali, Sitotaw Wodajo, Taye Teshoma, The link between corporate governance and earnings management of insurance companies in Ethiopia , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- Prempal ., R.B. Sharma, A Severe Fruit Rot In Market , The Scientific Temper: Vol. 7 No. 1&2 (2016): THE SCIENTIFIC TEMPER
- Ishwar Dan, Viksit Bharat @2047: A vision for India’s sustainable development , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Bayelign Abebe, Ayalew Ali, Linking globalization to commercial banks’ performance in Ethiopia , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Shamba Gowda, AR Chethan Kumar, S. Srinivasaragavan, Scholarly communication behavior in forestry research: A bibliometric analysis of global publications , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Raju Prasad Singh, R.K. Verma, Study of Josephson Effect Between Bose Condensate , The Scientific Temper: Vol. 11 No. 1&2 (2020): The Scientific Temper
- Arenlila Jamir, Sangeeta Kharde, Anita Dalal, Health-seeking behavior of first-time mothers toward pregnancy , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Shaik Chanbasha, N. Jayakumar, N. Bupesh Kumar, A self-regulating optimization algorithm for locating and sizing a local power generation source for a radial structured distribution system in deregulated environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
<< < 41 42 43 44 45 46 47 48 49 50 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

