Seamless healthcare access: An efficient solution to access medical data using Internet of Things based multimedia communication

被引:0
作者
Kumar, C. Madan [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ,5 ]
Al-Shehari, Taher [6 ]
Kadrie, Mohammed [6 ]
Alfakih, Taha [7 ]
Alsalman, Hussain [8 ]
Amin, Ruhul [9 ]
机构
[1] Vaagdevi Coll Engn, Dept Comp Sci & Engn, Bollikunta, Warangal, India
[2] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[3] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[4] SRM Univ, Sch Comp, Dept Computat Intelligence, Srm Nagar, Kattankulathur, India
[5] Amity Univ, Sch Engn, Noida, UP, India
[6] King Saud Univ, Dept Self Dev Skill, Comp Skills, Common Year Deanship 1, Riyadh, Saudi Arabia
[7] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh, Saudi Arabia
[8] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh, Saudi Arabia
[9] IIIT Naya Raipur, Naya Raipur IIIT NR, Dept Comp Sci & Engn, Raipur 493661, India
关键词
healthcare system; IoT network; multimedia communication; patient data; WIRELESS SENSOR NETWORKS; AUTHENTICATION PROTOCOL; MUTUAL AUTHENTICATION; SCHEME;
D O I
10.1002/dac.5992
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the present-day scenario, multimedia technology serves as a vital medium for communication, facilitating the exchange of information among individuals across various sectors such as education, mass media, banking, and healthcare. In our proposal for a centralized system to store patient data, we aim to enhance healthcare services by enabling doctors to access the medical history of every patient seamlessly. To ensure hassle-free services, we have devised a for authenticated key sharing protocol leveraging cryptographic hash functions for the Internet of Things healthcare system. A key advantage of our approach is that patients need not undergo medical tests repeatedly, unless it is deemed necessary due to diagnostic requirements. We have provided informal proof of the protocol's ability to safeguard against security threats. Furthermore, we have conducted simulations using the Scyther simulation tool to verify the strength of our protocol, affirming its safety and effectiveness. Our performance analysis section demonstrates significantly improved complexities compared to existing protocols, further emphasizing the reliability and efficiency of our proposed solution. image
引用
收藏
页数:14
相关论文
共 47 条
[1]  
Ali Rifaqat, 2024, Journal of Ambient Intelligence and Humanized Computing, V15, P1165, DOI [10.1007/s12652-018-1015-9, 10.1007/s12652-018-1015-9]
[2]   A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring [J].
Ali, Rifaqat ;
Pal, Arup Kumar ;
Kumari, Saru ;
Karuppiah, Marimuthu ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :200-215
[3]   Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Gope, Prosanta ;
Choo, Kim-Kwang Raymond ;
Tapas, Nachiket .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2019, 23 (04) :1749-1759
[4]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[5]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[6]   Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Obaidat, Mohammad S. .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[7]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[8]   An Enhanced Lightweight Dynamic Pseudonym Identity Based Authentication and Key Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring [J].
Chen, Meriske ;
Lee, Tian-Fu ;
Pan, Jiann-I .
SENSORS, 2019, 19 (05)
[9]   Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Choi, Younsung ;
Lee, Donghoon ;
Kim, Jiye ;
Jung, Jaewook ;
Nam, Junghyun ;
Won, Dongho .
SENSORS, 2014, 14 (06) :10081-10106
[10]   A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks [J].
Das, Ashok Kumar ;
Sutrala, Anil Kumar ;
Odelu, Vanga ;
Goswami, Adrijit .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) :1899-1933