Abstract
The basic values of urban communities in terms of smart worlds modified quickly by innovative industry. Mini sensor systems and smart access points are heavily involved to use the surrounding atmosphere data. In all industrial Internet of Things, it has been used to remotely capture and interpret real-time data. Since the Interoperable ecosystem collects and discloses data via unsecure government networks, an effective Encryption and Schlissel Agreement approach to avoid un authorized access is preferred. The Internet of Medical Stuff has grown into an expert technology infrastructure in the medical industry. The clinical symptoms of patients are obtained and analyzed. The clinical smart objects, incorporated in the human chest, must be studied functionally. In exchange, it will use smart mobile devices to provide the patient medical records. Although the data obtained by patients is so delicate that it is not a medical profession, the safety and protection of medical data becomes a problem for the IoM. Thus, a user authentication protocol based on anonymity is chosen to solve problems in IoM about the security of privacy. A reliable and transparent facial recognition user identification scheme is introduced in this paper in order to ensure safe contact in smart healthcare. This report also indicates that a competitor cannot unlawfully view or remove the intelligent handheld card as a lawful user. A comprehensive review on the basis of the model of random oracles and resource analysis is given to illustrate medical applications’ security and resource performance. Moreover, the proposed schema foresees that it has high-safety characteristics to develop intelligent IoM health application systems as a result of the performance review. This application system uses ADV routing protocol. For the analyses of routing protocols with the NS3 emulator, experimental research was performed here. The findings obtained have been comparable to several other protocols in terms of the packet processing, end-to-end delay, throughput speeds and overhead route for the proposed SAB-UAS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al Turjman, F., Hasan, M.Z., Al‐Rizzo, H.: Task scheduling in cloud‐based survivability applications using swarm optimization in IoT. Trans. Emerg. Telecommun. Technol. 30(8), e3539 (2019)
Choi, Y., Lee, Y., Won, D.: Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction. Int. J. Distrib. Sens. Netw. 12(1), 8572410 (2016)
Das, A.K., Wazid, M., Yannam, A.R., Rodrigues, J.J., Park, Y.: Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 7, 55382–55397 (2019)
Das, A.K.: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer Peer Netw. Appl. 9(1), 223–244 (2014). https://doi.org/10.1007/s12083-014-0324-9
Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086–1090 (2009)
Farash, M.S., Chaudhry, S.A., Heydari, M., SajadSadough, S.M., Kumari, S., et al.: A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst 30(4), e3019 (2017)
Gope, P., Lee, J., Quek, T.Q.: Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans. Inf. Forensics Secur. 13(11), 2831–2843 (2018)
Hameed, K., Khan, A., Ahmed, M., Reddy, A.G., Rathore, M.M.: Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Gener. Comput. Syst. 82, 274–289 (2018)
Huang, X., Chen, X., Li, J., Xiang, Y., Xu, L.: Further observations on smart-card-based password-authenticated key agreement in distributed systems. IEEE Trans. Parallel Distrib. Syst. 25(7), 1767–1775 (2013)
Li, C.-T., Chen, C.-L., Lee, C.-C., Weng, C.-Y., Chen, C.-M.: A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft. Comput. 22(8), 2495–2506 (2017). https://doi.org/10.1007/s00500-017-2504-z
Madhusudhan, R., Mittal, R.C.: Dynamic ID-based remote user password authentication schemes using smart cards: a review. J. Netw. Comput. Appl. 35(4), 1235–1248 (2012)
Odelu, V., Das, A.K., Goswami, A.: A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 10(9), 1953–1966 (2015)
Park, Y., Lee, S., Kim, C., Park, Y.: Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. Int. J. Distrib. Sens. Netw. 12(7), 1550147716658607 (2016)
Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., et al.: TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 59–64 (2004)
Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), vol. 1, pp. 8-pp. IEEE (2006)
Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7), 1160–1172 (2008)
Yoon, E.J., Kim, C.: Advanced biometric-based user authentication scheme for wireless sensor networks. Sens. Lett. 11(9), 1836–1843 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Srinivasan, N., Anantha Sivaprakasam, S. (2022). Factual Data Protection Procedure on IoT-Based Customized Medicament Innovations. In: Kalinathan, L., R., P., Kanmani, M., S., M. (eds) Computational Intelligence in Data Science. ICCIDS 2022. IFIP Advances in Information and Communication Technology, vol 654. Springer, Cham. https://doi.org/10.1007/978-3-031-16364-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-16364-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16363-0
Online ISBN: 978-3-031-16364-7
eBook Packages: Computer ScienceComputer Science (R0)