Secured Healthcare Data Sharing Through Wireless Networks for Mobile Computing Using Trust-Bat-Adaptive Homomorphic Crypto Routing Protocol

Author:

Aljohani Abeer A.1,Tripathi Rajendra Kumar2,Bhardwaj Rajat3,Kaushal Rajesh Kumar4,Kumar Naveen4,Gupta Shashi Kant5,Hamato Gemechu Geda6

Affiliation:

1. Taibah University

2. Khwaja Moinuddin Chishti Language University

3. RV University

4. Chitkara University Institute of Engineering and Technology, Chitkara University

5. Eudoxia Research University

6. Bule Hora University

Abstract

Abstract The Wireless Sensor Network's (WSN's) sensor nodes commonly communicate via mobiles, which have been widely regarded as the most prevalent and perhaps most important communication technology. Due to their self-configuration, ease of handling, and adaptability, WSNs have become more popular in mobile computing. The WSN is set up with extra nodes to transport data. As a result of their short memory, poor throughput, restricted capacity, and other limitations, sensor networks become notoriously difficult to secure. WSN has been grappling with how to maintain network security in mobile computing while using as little power as possible in current history. So, we present a novel trust-bat-adaptive homomorphic crypto routing protocol (TBAHCRP) to overcome these difficulties. Initially, we gather healthcare datasets from the medical server and deploy a 5G (fifth-generation) network to transfer these datasets from sending node to receiving node. The encryption and decryption are performed by employing the proposed technique and it also performs clustering and routing functionalities. A multi-gradient spider monkey optimization (MG-SMO) approach is applied to optimize the received data for mobile applications. Finally, performance metrics like security level, memory usage, energy efficiency, and energy consumption of the proposed technique are examined and compared with other classical techniques to prove our work with the greatest efficiency. These metrics are depicted in graphical form by using the MATLAB tool.

Publisher

Research Square Platform LLC

Reference39 articles.

1. ECH: An enhanced clustering hierarchy approach to maximize the lifetime of wireless sensor networks;Alami H;Ieee Access : Practical Innovations, Open Solutions,2019

2. Lai, S., Zhao, R., Tang, S., Xia, J., Zhou, F., & Fan, L. (2021). Intelligent secure mobile edge computing for beyond 5G wireless networks. Physical Communication, 45, p.101283.

3. EMG based finger motion classification using wavelet transform and Artificial Neural Networks;Mary Vasanthi S;Caribben Journal of Science,2019

4. Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN;Ullah A;Peer-to-Peer Networking and Applications,2020

5. Revamping data access privacy preservation method against inside attacks in wireless sensor networks;Babu SS;Cluster Computing,2019

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3