Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Research Article

A Secure Network with Minimization of Energy for E-healthcare Application in IoMT

Author(s): Rajanikanth Aluvalu, Uma Maheswari V.*, Mohan A. and Yadaiah Balagoni

Volume 18, Issue 9, 2024

Published on: 12 June, 2023

Article ID: e280423216332 Pages: 11

DOI: 10.2174/1872212118666230428105619

Price: $65

Abstract

Aims: Protect patient healthcare records.

Background: The adaptability of the digital healthcare system is a major factor in its recent rise in popularity. Utilizing the digital healthcare system has resulted in an ever-increasing number of healthcare apps. The Internet of Medical Things (IoMT) is a newly emerging digital healthcare system using various biomedical sensors and the cutting-edge capabilities of wireless systems and cloud computing. Since IoMT can exchange data between various connecting nodes thanks to the combination of other technologies, security and energy consumption provide the greatest challenge to the IoMT infrastructure.

Objective: Reduce the cost of communication in order to strengthen defenses against unauthorized access and increase energy efficiency.

Method: This patent study provides a protocol for protecting patients; medical records called the request-type-based energy-aware framework (Re-EAF) based on patent. The primary goal is to reduce the cost of communication in order to strengthen defences against unauthorized access and increase energy efficiency. An identifying unit called a request-type energy aware framework has been proposed. The proposed method avoids treating all requests the same by instead characterizing them based on the identified criteria and characteristics. Using Constrained Application Protocol (CoAP), remote patient monitoring can increase the safety of gathered data.

Results: Using Constrained Application Protocol (CoAP), remote patient monitoring can increase the safety of gathered data. Using a software-defined networking (SDN) framework, our research ensures that data and requests are sent and received as effectively and efficiently as possible while conserving energy.

Conclusion: In this research, the transmitted healthcare data is encrypted via cipher Block-chaining. The experimental study demonstrates that the suggested Re-EAF consumes less energy while producing a higher throughput than conventional methods.

[1]
K.K. Chennam, V. Uma Maheshwari, and R. Aluvalu, Maintaining IoT healthcare records using cloud storage. In: IoT and IoE Driven Smart Cities., Cham Springer, 2022, pp. 215-233.
[http://dx.doi.org/10.1007/978-3-030-82715-1_10]
[2]
K.K. Chennam, R. Aluvalu, and S. Shitharth, An authentication model with high security for cloud database. In: Architectural wireless networks solutions and security issues., Singapore: Springer, 2021, pp. 13-25.
[http://dx.doi.org/10.1007/978-981-16-0386-0_2]
[3]
S. Vishnu, S.J. Ramson, and R. Jegan, "Internet of medical things (IoMT)-An overview", 2020 5th international conference on devices, circuits and systems (ICDCS), pp. 101-104, 2020.
[4]
R. Aluvalu, V. Uma Maheswari, K.K. Chennam, and S. Shitharth, Data security in cloud computing using Abe-based access control. In: Architectural wireless networks solutions and security issues., Springer: Singapore, 2021, pp. 47-61.
[http://dx.doi.org/10.1007/978-981-16-0386-0_4]
[5]
F. Al-Turjman, M.H. Nawaz, and U.D. Ulusar, "Intelligence in the internet of medical things era: A systematic review of current and future trends", Comput. Commun., vol. 150, pp. 644-660, 2020.
[http://dx.doi.org/10.1016/j.comcom.2019.12.030]
[6]
M. Swapna, U.M. Viswanadhula, R. Aluvalu, V. Vardharajan, and K. Kotecha, "Bio-signals in medical applications and challenges using artificial intelligence", J. Sens. Actuator Netw., vol. 11, no. 1, p. 17, 2022.
[http://dx.doi.org/10.3390/jsan11010017]
[7]
M.V.V. Kantipudi, C.J. Moses, R. Aluvalu, and S. Kumar, Remote patient monitoring using IoT, cloud computing and AI. In: Hybrid Artificial Intelligence and IoT in Healthcare., Springer: Singapore, 2021, pp. 51-74.
[http://dx.doi.org/10.1007/978-981-16-2972-3_3]
[8]
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks", IEEE Commun. Surv. Tutor., vol. 8, no. 2, pp. 2-23, 2006.
[http://dx.doi.org/10.1109/COMST.2006.315852]
[9]
X. Du, M. Guizani, Y. Xiao, and H.H. Chen, "Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks", IEEE Trans. Wirel. Commun., vol. 8, no. 3, pp. 1223-1229, 2009.
[http://dx.doi.org/10.1109/TWC.2009.060598]
[10]
A.D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
[http://dx.doi.org/10.1002/j.1538-7305.1975.tb02040.x]
[11]
J. Barros, and M.R. Rodrigues, "Secrecy capacity of wireless channels", Proc. IEEE Int. Symp. Information Theory, pp. 356-360, 2006.
[12]
M. Bloch, J. Barros, M.R.D. Rodrigues, and S.W. McLaughlin, "Wireless information-theoretic security", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, 2008.
[http://dx.doi.org/10.1109/TIT.2008.921908]
[13]
H. Moosavi, and F.M. Bui, "Delay-aware optimization of physical layer security in multi-hop wireless body area networks", IEEE Trans. Inf. Forensics Security, vol. 11, no. 9, pp. 1928-1939, 2016.
[http://dx.doi.org/10.1109/TIFS.2016.2566446]
[14]
D. Wang, B. Bai, W. Chen, and Z. Han, "Energy efficient secure communication over decode-and-forward relay channels", IEEE Trans. Commun., vol. 63, no. 3, pp. 892-905, 2015.
[http://dx.doi.org/10.1109/TCOMM.2014.2387342]
[15]
Y. Chen, L. Wang, M. Ma, and B. Jiao, "Power allocation for full-duplex relay networks: Secure energy efficiency optimization", 2016 IEEE Globecom Workshops (GC Wkshps), pp. 1-6, 2016.
[16]
Z. Sheng, H.D. Tuan, A.A. Nasir, T.Q. Duong, and H.V. Poor, "Power allocation for energy efficiency and secrecy of wireless interference networks", IEEE Trans. Wirel. Commun., vol. 17, no. 6, pp. 3737-3751, 2018.
[http://dx.doi.org/10.1109/TWC.2018.2815626]
[17]
F. Al-Turjman, and B.D. Deebak, "Privacy-aware energy-efficient framework using the internet of medical things for COVID-19", IEEE Internet Things Mag., vol. 3, no. 3, pp. 64-68, 2020.
[http://dx.doi.org/10.1109/IOTM.0001.2000123]
[18]
M. Kaur, D. Singh, V. Kumar, B.B. Gupta, and A.A. Abd El-Latif, "Secure and energy efficient-based E-health care framework for green internet of things", IEEE Trans. Green Commun. Netw., vol. 5, no. 3, pp. 1223-1231, 2021.
[http://dx.doi.org/10.1109/TGCN.2021.3081616]
[19]
J.J. Kang, M. Dibaei, G. Luo, W. Yang, P. Haskell-Dowland, and X. Zheng, "An energy-efficient and secure data inference framework for internet of health things: A pilot study", Sensors , vol. 21, no. 1, p. 312, 2021.
[http://dx.doi.org/10.3390/s21010312] [PMID: 33466416]
[20]
C. Feng, M. Adnan, A. Ahmad, A. Ullah, and H.U. Khan, "Towards energy-efficient framework for IoT big data healthcare solutions", Sci. Program., vol. 2020, pp. 1-9, 2020.
[http://dx.doi.org/10.1155/2020/7063681]
[21]
A. Rana, C. Chakraborty, S. Sharma, S. Dhawan, S.K. Pani, and I. Ashraf, "Internet of medical things-based secure and energy-efficient framework for health care", Big Data, vol. 10, no. 1, pp. 18-33, 2022.
[http://dx.doi.org/10.1089/big.2021.0202] [PMID: 34958234]
[22]
T.G.D. Prince, and P. Wankhade, "Machine Learning approaches for energy efficient mechanisms in IoT System for Medical Domain", J. Posit. Psychol., vol. 6, no. 3, pp. 7835-7844, 2022.
[23]
L. Liu, and Z. Li, "Permissioned blockchain and deep reinforcement learning enabled security and energy efficient Healthcare Internet of Things", IEEE Access, vol. 10, pp. 53640-53651, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3176444]
[24]
R.U. Rasool, H.F. Ahmad, W. Rafique, A. Qayyum, and J. Qadir, "Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML", J. Netw. Comput. Appl., vol. 201, p. 103332, 2022.
[http://dx.doi.org/10.1016/j.jnca.2022.103332]
[25]
M. Swan, "Sensor Mania! The internet of things, wearable computing, objective metrics, and the quantified self 2.0", J. Sens. Actuator Networks, vol. 1, no. 3, pp. 217-253, 2012.
[http://dx.doi.org/10.3390/jsan1030217]
[26]
S. Rani, R. Talwar, J. Malhotra, S. Ahmed, M. Sarkar, and H. Song, "A novel scheme for an energy efficient Internet of Things based on wireless sensor networks", Sensors , vol. 15, no. 11, pp. 28603-28626, 2015.
[http://dx.doi.org/10.3390/s151128603] [PMID: 26569260]
[27]
P.C. Pop, "The generalized minimum spanning tree problem: An overview of formulations, solution procedures and latest advances", Eur. J. Oper. Res., vol. 283, no. 1, pp. 1-15, 2020.
[http://dx.doi.org/10.1016/j.ejor.2019.05.017]
[28]
D. Samanta, A.H. Alahmadi, M.P. Karthikeyan, M.Z. Khan, A. Banerjee, G.K. Dalapati, and S. Ramakrishna, "Cipher block chaining support vector machine for secured decentralized cloud enabled intelligent IoT architecture", IEEE Access, vol. 9, pp. 98013-98025, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3095297]

Rights & Permissions Print Cite
© 2025 Bentham Science Publishers | Privacy Policy