Network statistics-based routing and path orient data encryption scheme for efficient healthcare monitoring with IoT in WSN

被引:3
作者
Vijayakumar, M. [1 ]
机构
[1] VET Inst Arts & Sci, Sch Comp Sci, Dept Comp Sci, Thindal, Erode, India
关键词
big data; cloud; IoT; NCSRM; NSR-PDE; WSN;
D O I
10.1002/dac.5361
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless communication has been adapted for a variety of difficulties as a result of recent developments in sensor networks. The sensors are meant to communicate with network nodes located at a distance and to adapt to various conditions. In addition, Internet of Things (IoT) devices are becoming a part of WSN and are being tailored to various healthcare systems. Nonetheless, the presence of massive nodes and rogue nodes makes transmitting data packets difficult. The procedure, however, confronts a number of obstacles, including data security, continuous monitoring, and routing issues. A variety of ideas are explored to help with the situation, but they all have flaws. A network statistics-based routing and path orient data encryption system has been developed to address this problem (NSR-PDE). The strategy focuses on keeping track on patients and providing strong, decisive support systems. The model is created to access data stored on cloud servers and allows for the monitoring of multiple patients in different locations. The model begins by monitoring the whole bodily states of patients in real time using dedicated equipment. Such monitored characteristics are provided over a variety of channels, with route selection based on the patient's class and the type of information being transmitted. The approach calculates the network constraint secure route measure (NCSRM), which is calculated using route information, node behavior, and physical attributes. Similarly, data transmission is protected by path orient data encryption (PDE), which ensures data security according on the route's type and conditions.
引用
收藏
页数:12
相关论文
共 30 条
[1]  
Antonidoss A., 2019, P 5 INT C INDIA 2018, V1, DOI [10.1007/978-981-13-3329-3_18, DOI 10.1007/978]
[2]  
Aziz N.A.A., 2019, 2019 INT C COMPUTER, P1
[3]  
Bala K., 2019, INT J ENG ADV TECHNO, V8, P1977
[4]  
Baskar M, 2023, NEURAL PROCESS LETT, V55, P19, DOI 10.1007/s11063-020-10407-4
[5]   Graphene oxide-iron modified clinoptilolite based composites for adsorption of arsenate and optimization using response surface methodology [J].
Bilici Baskan, Meltem ;
Hadimlioglu, Secil .
JOURNAL OF ENVIRONMENTAL SCIENCE AND HEALTH PART A-TOXIC/HAZARDOUS SUBSTANCES & ENVIRONMENTAL ENGINEERING, 2021, 56 (05) :537-548
[6]   Context Aware Based Access Control Model in Cloud Data Center Environment [J].
Byun, Yun Sang ;
Kwak, Jin .
FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 :515-524
[7]   Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique [J].
Chidambaram, Nithya ;
Raj, Pethuru ;
Thenmozhi, K. ;
Amirtharajan, Rengarajan .
INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2016, 2016
[8]  
EL HAJJI F., 2018, J COMMUNICATIONS INF, V3, P67
[9]   A secure cloud storage system combining time-based one-time password and automatic blocker protocol [J].
El-Booz S.A. ;
Attiya G. ;
El-Fishawy N. .
Eurasip Journal on Information Security, 2016, 2016 (01)
[10]  
Elma KJ, 2018, INT J APPL ENG RES, V13, P337