Driving a key generation strategy with training-based optimization to provide safe and effective authentication using data sharing approach in IoT healthcare

被引:2
|
作者
Mishra, Anand Muni [1 ]
Shahare, Yogesh Ramdas [2 ]
Shukla, Piyush Kumar [3 ]
Husain, Akhtar [4 ]
Singh, Santar Pal [5 ]
Alyami, Sultan [6 ]
Alghamdi, Abdullah [7 ]
Ahanger, Tariq Ahamed [8 ]
机构
[1] Chitkara Univ, Inst Engn & Technol, Rajpura, Punjab, India
[2] Sarawati Engn Coll, Navi Mumbai, India
[3] Rajiv Gandhi Proudyogiki Vishwavidyalaya Technol U, Univ Inst Technol, Dept Comp Sci & Engn, Bhopal 462033, Madhya Pradesh, India
[4] MJP Rohilkhand Univ, Fac Engn &Technol, Dept CS &IT, Bareilly, India
[5] Rashtrakavi Ramdhari Singh Dinkar Coll Engn, Dept Comp Sc & Engn, Begusarai, India
[6] Najran Univ, Coll Comp Sci & Informat Syst, Comp Sci Dept, Najran, Saudi Arabia
[7] Najran Univ, Coll Comp Sci & Informat Syst, Informat Syst Dept, Najran, Saudi Arabia
[8] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj, Saudi Arabia
关键词
Driving training based optimization; Key generation; Authentication; Blockchain; IoT healthcare; BLOCKCHAIN; INTERNET;
D O I
10.1016/j.comcom.2023.09.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain technology offers a solution to the interoperability issues that currently plague health information systems (BT). Additionally, blockchain technology provides the cutting-edge standard that ensures the safe exchange of computerized health data among healthcare providers, institutions, people, and medical specialists. Recently, both businesses and academics recognized the Internet of Things (IoT) as one of the top study fields. Nevertheless, a significant issue in IoT healthcare across several product domains is the secrecy of patient health data transmission. For secure and effective authentication with data sharing strategy in IoT healthcare, a method called Driving Training Based Optimization (DTBO) Key generation is presented to address these issues. The entities involved in the proposed DTBO_Key generation technique are the user, owner, authenticating minor, blockchain, and IoT server. The suggested technique consists of seven stages: initialization, registration phase, key creation, login phase, data protection, authentication process, and verification phase. A minimum memory consumption of 2.983 MB, a computation cost of 28.008%, and an accuracy of 0.9 were attained using the proposed method.
引用
收藏
页码:407 / 419
页数:13
相关论文
共 4 条
  • [1] An Efficient and Secure Authentication Protocol with Deep Learning Based Key Generation toward Securing Healthcare Data in IoT
    Sharma, Sudhir
    Tripathi, Sandesh
    Bhatt, Kaushal Kishor
    Chhimwal, Nitin
    CYBERNETICS AND SYSTEMS, 2024, 55 (04) : 848 - 871
  • [2] APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization
    Palekar, Supriya
    Radhika, Y.
    CYBERNETICS AND SYSTEMS, 2024, 55 (04) : 823 - 847
  • [3] CBO-IE: A Data Mining Approach for Healthcare IoT Dataset Using Chaotic Biogeography-Based Optimization and Information Entropy
    Ahirwar, Manish Kumar
    Shukla, Piyush Kumar
    Singhai, Rakesh
    SCIENTIFIC PROGRAMMING, 2021, 2021
  • [4] HECC-ABE: A novel blockchain-based IoT healthcare data storage using hybrid cryptography schemes with key optimization by hybrid meta-heuristic algorithm
    Dubey, Anil Kumar
    Ramanjaneyulu, N.
    Saraswat, Mala
    Brammya, G.
    Govindasamy, Chinnaraj
    Ninu Preetha, N. S.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (10)