Research Article |
Indexed Steep Descent Fish Optimization with Modified Certificateless Signcryption for Secured IoT Healthcare Data Transmission
Author(s) : K. Hemalatha1 and Dr. P. Vijayakumar2
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 10, Issue 2, Special Issue on IEEE-SD
Publisher : FOREX Publication
Published : 30 June 2022
e-ISSN : 2347-470X
Page(s) : 360-363
Abstract
IoMT is a healthcare strategy and utilization connected with online computer networks for IoT. During data communication from machine to machine, Security is one of essential barriers. In order to improve security, Jaccardized Czekanowski Indexive, Steepest Descent Fish Optimization Based Kupyna Schmidt-Samoa Certificateless Signcryption (JCISDFO-KSSCS) is introduced. JCISDFO-KSSCS is used for enhancing authentication and secure Data Transmission. JCISDFO-KSSCS comprises two major processes, namely authentication, and secured data transmission. The discussed results indicate that proposed JCISDFO-KSSCS increases the performance results than the conventional approaches.
Keywords: IoMT
, Jaccardized Czekanowski Index-based Authentication
, Steepest Descent Fish Swarm Optimization
, Kupyna Schmidt- Samoa Certificateless Signcryption
, Tversky Similarity Coefficient
K. Hemalatha, Ph.D. Scholar, Department of Computer Science, Sri Jayendra Saraswathy Maha Vidyalaya College of Arts and Science, Coimbatore, India; Email: hemalathacbe2010@gmail.com
K. Hemalatha, Assistant Professor, Department of Computer Science, KG College of Arts and Science, Coimbatore, India
Dr. P. Vijayakumar, Associate Professor, Department of Computer Applications, KG College of Arts and Science Coimbatore, India
[1] B.D. Deebak and Fadi Al-Turjman, “Smart Mutual Authentication Protocol for Cloud-Based Medical Healthcare Systems Using Internet of Medical Things”, IEEE Journal on Selected Areas in Communications, Vol. 39, Issue 2, 2021.[Cross Ref]
[2] Sarath Sabu, H.M. Ramalingam, M Vishaka, H.R. Swapna, Swaraj Hegde, “Implementation of a secure and privacy-aware E-Health record and IoT data sharing using blockchain”, Global Transitions Proceedings, Elsevier, Volume 2, Issue 2, November 2021, Pages 429-433.[Cross Ref]
[3] Muhammad Azeem, Ata Ullah, Humaira Ashraf, NzJhanjhi Mamoona Humayun, Sultan Aljahdali, And Thamer A. Tabbakh, “FoG-Oriented Secure and Lightweight Data Aggregation in IoMT”, IEEE Access, Volume 9, 2021, Pages 111072 – 111082.[Cross Ref]
[4] Rui Guo, Geng Yang, Huixian Shi, Yinghui Zhang, and Dong Zheng, “O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System”, IEEE Internet of Things Journal, Volume 8, Issue 11, 2021, Pages 8949 – 8963.[Cross Ref]
[5] Junaid Hassan,Danish Shehzad Insaf Ullah, Fahad Algarni, Muhammad Umar Aftab, Muhammad Asghar Khan, and M. Irfan Uddin, “A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare”, Security and Communication Networks, Hindawi, Volume 2021, November 2021, Pages 1-17.[Cross Ref]
[6] Mohammad Ayoub Khan, Mohammad Tabrez Quasim, Norah Saleh Alghamdi, Mohammad Yahiya Khan, “A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data”, IEEE Access, Vol. 8, 2020, pp. 52018 – 52027.[Cross Ref]
[7] Mahender Kumar and Satish Chand, “A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System with Public Verifiability”, IEEE Internet of Things Journal, Volume 7, Issue 10, 2020, pp. 10650 – 10659.[Cross Ref]
[8] Lanjing Wang; Yasir Ali; Shah Nazir; Mahmood Niazi, “ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods”, IEEE Access, Volume 8, 2020.[Cross Ref]
[9] Samira Akhbarifar, Hamid Haj SeyyedJavadi, Amir Masoud Rahmani& Mehdi Hosseinzadeh, “A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment”, Personal and Ubiquitous Computing, Springer, 2020, Pages 1-17.[Cross Ref]
[10] Lanjing Wang; Yasir Ali; Shah Nazir; Mahmood Niazi, “ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods”, IEEE Access, Vol. 8, 2020, pp. 152316 – 152332.[Cross Ref]
[11] Ding Li, Wang Zhongsheng, Wang Xiaodong, Wu Dong, “Security information transmission algorithms for IoT based on cloud computing”, Computer Communications, Elsevier, Volume 155, 2020, Pages 32-39.[Cross Ref]
[12] Dankan Gowda V, K. R. Swetha, Namitha A R, Manu Y M, Rashmi G R and Veera Sivakumar Chinamuttevi (2022), IOT Based Smart Health Care System to Monitor Covid-19 Patients. IJEER 10(1), 36-40. DOI: 10.37391/IJEER.100105.[Cross Ref]
K. Hemalatha and Dr. P. Vijaykumar (2022), Indexed Steep Descent Fish Optimization with Modified Certificateless Signcryption for Secured IoT Healthcare Data Transmission. IJEER 10(2), 360-363. DOI: 10.37391/IJEER.100249.