Skip to main content

Factual Data Protection Procedure on IoT-Based Customized Medicament Innovations

  • Conference paper
  • First Online:
Computational Intelligence in Data Science (ICCIDS 2022)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 654))

Included in the following conference series:

Abstract

The basic values of urban communities in terms of smart worlds modified quickly by innovative industry. Mini sensor systems and smart access points are heavily involved to use the surrounding atmosphere data. In all industrial Internet of Things, it has been used to remotely capture and interpret real-time data. Since the Interoperable ecosystem collects and discloses data via unsecure government networks, an effective Encryption and Schlissel Agreement approach to avoid un authorized access is preferred. The Internet of Medical Stuff has grown into an expert technology infrastructure in the medical industry. The clinical symptoms of patients are obtained and analyzed. The clinical smart objects, incorporated in the human chest, must be studied functionally. In exchange, it will use smart mobile devices to provide the patient medical records. Although the data obtained by patients is so delicate that it is not a medical profession, the safety and protection of medical data becomes a problem for the IoM. Thus, a user authentication protocol based on anonymity is chosen to solve problems in IoM about the security of privacy. A reliable and transparent facial recognition user identification scheme is introduced in this paper in order to ensure safe contact in smart healthcare. This report also indicates that a competitor cannot unlawfully view or remove the intelligent handheld card as a lawful user. A comprehensive review on the basis of the model of random oracles and resource analysis is given to illustrate medical applications’ security and resource performance. Moreover, the proposed schema foresees that it has high-safety characteristics to develop intelligent IoM health application systems as a result of the performance review. This application system uses ADV routing protocol. For the analyses of routing protocols with the NS3 emulator, experimental research was performed here. The findings obtained have been comparable to several other protocols in terms of the packet processing, end-to-end delay, throughput speeds and overhead route for the proposed SAB-UAS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Al Turjman, F., Hasan, M.Z., Al‐Rizzo, H.: Task scheduling in cloud‐based survivability applications using swarm optimization in IoT. Trans. Emerg. Telecommun. Technol. 30(8), e3539 (2019)

    Google Scholar 

  • Choi, Y., Lee, Y., Won, D.: Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction. Int. J. Distrib. Sens. Netw. 12(1), 8572410 (2016)

    Article  Google Scholar 

  • Das, A.K., Wazid, M., Yannam, A.R., Rodrigues, J.J., Park, Y.: Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 7, 55382–55397 (2019)

    Article  Google Scholar 

  • Das, A.K.: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer Peer Netw. Appl. 9(1), 223–244 (2014). https://doi.org/10.1007/s12083-014-0324-9

    Article  Google Scholar 

  • Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086–1090 (2009)

    Article  Google Scholar 

  • Farash, M.S., Chaudhry, S.A., Heydari, M., SajadSadough, S.M., Kumari, S., et al.: A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst 30(4), e3019 (2017)

    Article  Google Scholar 

  • Gope, P., Lee, J., Quek, T.Q.: Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans. Inf. Forensics Secur. 13(11), 2831–2843 (2018)

    Article  Google Scholar 

  • Hameed, K., Khan, A., Ahmed, M., Reddy, A.G., Rathore, M.M.: Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Gener. Comput. Syst. 82, 274–289 (2018)

    Article  Google Scholar 

  • Huang, X., Chen, X., Li, J., Xiang, Y., Xu, L.: Further observations on smart-card-based password-authenticated key agreement in distributed systems. IEEE Trans. Parallel Distrib. Syst. 25(7), 1767–1775 (2013)

    Article  Google Scholar 

  • Li, C.-T., Chen, C.-L., Lee, C.-C., Weng, C.-Y., Chen, C.-M.: A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft. Comput. 22(8), 2495–2506 (2017). https://doi.org/10.1007/s00500-017-2504-z

    Article  MATH  Google Scholar 

  • Madhusudhan, R., Mittal, R.C.: Dynamic ID-based remote user password authentication schemes using smart cards: a review. J. Netw. Comput. Appl. 35(4), 1235–1248 (2012)

    Article  Google Scholar 

  • Odelu, V., Das, A.K., Goswami, A.: A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 10(9), 1953–1966 (2015)

    Article  Google Scholar 

  • Park, Y., Lee, S., Kim, C., Park, Y.: Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. Int. J. Distrib. Sens. Netw. 12(7), 1550147716658607 (2016)

    Article  Google Scholar 

  • Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., et al.: TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 59–64 (2004)

    Google Scholar 

  • Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), vol. 1, pp. 8-pp. IEEE (2006)

    Google Scholar 

  • Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7), 1160–1172 (2008)

    Article  MathSciNet  Google Scholar 

  • Yoon, E.J., Kim, C.: Advanced biometric-based user authentication scheme for wireless sensor networks. Sens. Lett. 11(9), 1836–1843 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Srinivasan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Srinivasan, N., Anantha Sivaprakasam, S. (2022). Factual Data Protection Procedure on IoT-Based Customized Medicament Innovations. In: Kalinathan, L., R., P., Kanmani, M., S., M. (eds) Computational Intelligence in Data Science. ICCIDS 2022. IFIP Advances in Information and Communication Technology, vol 654. Springer, Cham. https://doi.org/10.1007/978-3-031-16364-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-16364-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-16363-0

  • Online ISBN: 978-3-031-16364-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics