Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning

Author:

Malmurugan N.1,Nelson S. Christalin2,Altuwairiqi Majid3,Alyami Hashem3,Gangodkar Durgaprasad4,Abdul Zahra Musaddak Maher5,Asakipaam Simon Atuah6ORCID

Affiliation:

1. SRM Institute of Science & Technology (Tiruchirappalli Campus), SRM Nagar, Chennai Highway, Tiruchirappalli 621105, India

2. Department of Systemics, School of Computer Science, University of Petroleum and Studies (UPES), Bidholi, Dehradun, Uttarakhand 248007, India

3. Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia

4. Computer Science & Engineering, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India

5. Computer Techniques Engineering Department, Al-Mustaqbal University College, Hillah 51001, Iraq

6. Electrical and Electronics Engineering Department, Tamale Technical University, Tamale, Ghana

Abstract

Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from one another, it can be used to monitor physical and environmental conditions in the surrounding environment. In addition to the built-in sensor on the exterior of a pipeline and sensors positioned to support bridge structures, wireless sensor networks have a range of other applications. Other uses include robotics, healthcare, environmental monitoring, and a variety of other areas of technology. It is feasible to use wireless sensor networks to monitor temperature and pressure, as well as leak detection and transmission line sabotage, among other applications. There are several different sorts of attacks that can be launched against wireless sensor networks. When it comes to information security in wireless sensor networks, cryptographic approaches play a critical role in ensuring the integrity of the data. Different types of cryptographic algorithms are now available for use in order to maintain network security. Specific difficulties must be addressed, though, and these are as follows: To strengthen the power of these algorithms, a unique hybrid encryption approach for monitoring energy transmission lines and increasing the security of wireless sensor networks is created in this study. While wireless sensor networks are being used to monitor transmission pipelines, the proposed hybrid encryption method ensures that data is transferred securely and promptly. The proposed method must follow three cryptographic principles: integrity, secrecy, and authenticity. All of the subtleties and underlying principles of the algorithm are explained in detail so that the algorithm can be put into action immediately after it is introduced.

Funder

Taif University

Publisher

Hindawi Limited

Subject

General Mathematics,General Medicine,General Neuroscience,General Computer Science

Reference37 articles.

1. A Secure Remote Health Monitoring Model for Early Disease Diagnosis in Cloud-Based IoT Environment;S. Akhbarifar;Pers Ubiquit Comput,2020

2. Big Data and Machine Learning Based Secure Healthcare Framework

3. Creating Visual Vocabularies for The Retrieval And Classification of Histopathology Images

4. An Efficient Image Encryption Technique Based on Two-Level Security for Internet of Things;M. Gupta;Multimed Tools Appl,2022

5. Intensity versus texture for medical image search and retrival

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3