An efficient key establishment for pervasive healthcare monitoring
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.28Keywords:
Authentication, Cryptanalysis, Secure healthcare systems, Healthcare data security, Key establishment, Security, IoT, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Health is one of the issues that present more challenges in the world. These challenges not only come from the requirements of the region itself yet in addition result from outside conditions that impact individuals’ health conditions and access to therapeutic administrations. To augment the security strength of real-time healthcare applications in the IoT environment, a novel framework, namely, an Enhanced and IoT-based medical healthcare security scheme (EIMSS), has been proposed in this chapter. The proposed EIMSS adapts the AUP authentication technique proposed in the previous chapter for authentication while transferring the patient’s data. The proposed EIMSS approach offers flexible services to aged people like confidentiality, integrity, and authentication for protecting their vital biological and medical data. The simulation results, analysis and comparison confirm that the proposed EIMSS outperforms existing protocols with improved security strength.Abstract
How to Cite
Downloads
Similar Articles
- Maheshbhai R. Jakhotra, Sanjay Gupta, A Study on the Design and Effectiveness of a Spoken English Program for Gujarati Medium Secondary School Students (Aged 14–15) , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- ALKA SRIVASTAVA, SANJAY KUMAR, STUDY OF NUTRIENT VALUE IN POST HARVESTED INFECTED ORANGE (CITRUS SINENSIS) FRUIT , The Scientific Temper: Vol. 3 No. 1&2 (2012): The Scientific Temper
- Mahima Srivastava, Chemical facets of environment-friendly corrosion impediment of low-carbon steel in aqueous solutions of inorganic mineral acid , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Minas M. Ali, Farah H. Alenezi, Nora F. Alfayyadh, Sara Y. Alhassoun, Rahaf M. Alanzi, Waseem Radwan, Conservative esthetic dentistry in Riyadh – Saudi Arabia , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Priya Rani, Sonia, Garima Dalal, Pooja Vyas, Pooja, Mapping electric vehicle adoption paradigms: A thematic evolution post sustainable development goals implementation , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sapna Pathakji, Shilpi Sharma, Transgender Persons (Protection of Rights) Act, 2019: A critical evaluation of rights access and implementation for the transgender community in India , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Rajarajeswari M, Reena Ravi, Effectiveness of multicomponent intervention on smartphone addiction and leisure wellbeing among adolescents of selected PU college in Bangalore , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- U. Johns Praveena, J. Merline Vinotha, A New Approach for Solving Bilevel Fractional/quadratic Green Transportation Problem by Implementing AI with Multi Choice Parameters Under Uncertainty , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- L. Vamsi Narasimha Rao, P.S.Prakash, M.Veera Kumari, Improvement of power system operation using a novel hybrid optimization method for optimal allocation of facts devices in radial transmission line , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Bhavesh Parekh, Parthiv Patel, Unravelling Indianness in R.K. Narayan’s novels: A multidisciplinary exploration of culture, tradition and modernity , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
<< < 53 54 55 56 57 58 59 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

