共 4 条
Driving a key generation strategy with training-based optimization to provide safe and effective authentication using data sharing approach in IoT healthcare
被引:2
|作者:
Mishra, Anand Muni
[1
]
Shahare, Yogesh Ramdas
[2
]
Shukla, Piyush Kumar
[3
]
Husain, Akhtar
[4
]
Singh, Santar Pal
[5
]
Alyami, Sultan
[6
]
Alghamdi, Abdullah
[7
]
Ahanger, Tariq Ahamed
[8
]
机构:
[1] Chitkara Univ, Inst Engn & Technol, Rajpura, Punjab, India
[2] Sarawati Engn Coll, Navi Mumbai, India
[3] Rajiv Gandhi Proudyogiki Vishwavidyalaya Technol U, Univ Inst Technol, Dept Comp Sci & Engn, Bhopal 462033, Madhya Pradesh, India
[4] MJP Rohilkhand Univ, Fac Engn &Technol, Dept CS &IT, Bareilly, India
[5] Rashtrakavi Ramdhari Singh Dinkar Coll Engn, Dept Comp Sc & Engn, Begusarai, India
[6] Najran Univ, Coll Comp Sci & Informat Syst, Comp Sci Dept, Najran, Saudi Arabia
[7] Najran Univ, Coll Comp Sci & Informat Syst, Informat Syst Dept, Najran, Saudi Arabia
[8] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj, Saudi Arabia
关键词:
Driving training based optimization;
Key generation;
Authentication;
Blockchain;
IoT healthcare;
BLOCKCHAIN;
INTERNET;
D O I:
10.1016/j.comcom.2023.09.016
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
Blockchain technology offers a solution to the interoperability issues that currently plague health information systems (BT). Additionally, blockchain technology provides the cutting-edge standard that ensures the safe exchange of computerized health data among healthcare providers, institutions, people, and medical specialists. Recently, both businesses and academics recognized the Internet of Things (IoT) as one of the top study fields. Nevertheless, a significant issue in IoT healthcare across several product domains is the secrecy of patient health data transmission. For secure and effective authentication with data sharing strategy in IoT healthcare, a method called Driving Training Based Optimization (DTBO) Key generation is presented to address these issues. The entities involved in the proposed DTBO_Key generation technique are the user, owner, authenticating minor, blockchain, and IoT server. The suggested technique consists of seven stages: initialization, registration phase, key creation, login phase, data protection, authentication process, and verification phase. A minimum memory consumption of 2.983 MB, a computation cost of 28.008%, and an accuracy of 0.9 were attained using the proposed method.
引用
收藏
页码:407 / 419
页数:13
相关论文