An efficient key establishment for pervasive healthcare monitoring
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.28Keywords:
Authentication, Cryptanalysis, Secure healthcare systems, Healthcare data security, Key establishment, Security, IoT, Machine learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Health is one of the issues that present more challenges in the world. These challenges not only come from the requirements of the region itself yet in addition result from outside conditions that impact individuals’ health conditions and access to therapeutic administrations. To augment the security strength of real-time healthcare applications in the IoT environment, a novel framework, namely, an Enhanced and IoT-based medical healthcare security scheme (EIMSS), has been proposed in this chapter. The proposed EIMSS adapts the AUP authentication technique proposed in the previous chapter for authentication while transferring the patient’s data. The proposed EIMSS approach offers flexible services to aged people like confidentiality, integrity, and authentication for protecting their vital biological and medical data. The simulation results, analysis and comparison confirm that the proposed EIMSS outperforms existing protocols with improved security strength.Abstract
How to Cite
Downloads
Similar Articles
- Ramya Singh, Archana Sharma, Nimit Gupta, Nursing on the edge: An empirical exploration of gig workers in healthcare and the unseen impacts on the nursing profession , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- V. Seethala Devi, N. Vanjulavalli, K. Sujith, R. Surendiran, A metaheuristic optimisation algorithm-based optimal feature subset strategy that enhances the machine learning algorithm’s classifier performance , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- K. Gokulkannan, M. Parthiban, Jayanthi S, Manoj Kumar T, Cost effective cloud-based data storage scheme with enhanced privacy preserving principles , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Santhanalakshmi M, Ms Lakshana K, Ms Shahitya G M, Enhanced AES-256 cipher round algorithm for IoT applications , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- M. A. Shanti, Optimizing predictive accuracy: A comparative study of feature selection strategies in the healthcare domain , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Gomathi Ramalingam, Logeswari S, M. D. Kumar, Manjula Prabakaran, Neerav Nishant, Syed A. Ahmed, Machine learning classifiers to predict the quality of semantic web queries , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- P. Ananthi, A. Chandrabose, Exploring learning-assisted optimization for mobile crowd sensing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Deepa S, Sripriya T, Radhika M, Jeneetha J. J, Experimental evaluation of artificial intelligence assisted heart disease prediction using deep learning principle , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Tarannum ., Anuja Pandey, Arti Rauthan, An evaluation of the impact of lean management practices on patients’ satisfaction at a small healthcare facility , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Yanbo Wang, Yonghong Zhu, Jingjing Liu, Research on the current situation and influencing factors of college students learning engagement in a blended teaching environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 2 3 4 5 6 7 8 9 10 11 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper