Skip to main content

Advertisement

Log in

State-of-the-art session key generation on priority-based adaptive neural machine (PANM) in telemedicine

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Telemedicine is one of the safest methods to provide healthcare facilities to the remote patients with the help of digitization. In this paper, state-of-the-art session key has been proposed based on the priority oriented neural machines followed by its validation. State-of-the-art technique can be mentioned as newer scientific method. Soft computing has been extensively used and modified here under the ANN domain. Telemedicine facilitates secure data communication between the patients and the doctors regarding their treatments. The best fitted hidden neuron can contribute only in the formation of the neural output. Minimum correlation was taken into consideration under this study. Hebbian learning rule was applied on both the patient’s neural machine and the doctor’s neural machine. Lesser iterations were needed in the patient’s machine and the doctor’s machine for the synchronization. Thus, the key generation time has been shortened here which were 4.011 ms, 4.324 ms, 5.338 ms, 5.691 ms, and 6.105 ms for 56 bits, 128 bits, 256 bits, 512 bits, and 1024 bits of state-of-the-art session keys, respectively. Statistically, different key sizes of the state-of-the-art session keys were tested and accepted. Derived value-based function had yielded successful outcomes too. Partial validations with different mathematical hardness had been imposed here too. Thus, the proposed technique is suitable for the session key generation and authentication in the telemedicine in order to preserve the patients’ data privacy. This proposed method has been highly protective against numerous data attacks inside the public networks. Partial transmission of the state-of-the-art session key disables the intruders to decode the same bit patterns of the proposed set of keys.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Maatuk AM, Elberkawi EK, Aljawarneh S et al (2021) The COVID-19 pandemic and E-learning: challenges and opportunities from the perspective of students and instructors. J Comput High Educ. https://doi.org/10.1007/s12528-021-09274-2

    Article  Google Scholar 

  2. Almaiah MA, Al-Khasawneh A, Althunibat A (2020) Exploring the critical challenges and factors influencing the Elearning system usage during COVID-19 pandemic. Educ Inf Technol 25:5261–5280. https://doi.org/10.1007/s10639-020-10219-y

    Article  Google Scholar 

  3. Mislovaty R, Perchenok Y, Kanter I, Kinzel W (2002) Secure key-exchange protocol with an absence of injective functions. Phys Rev E 66:066102

    Article  Google Scholar 

  4. Song S, Miller KD, Abbott LF (2000) Competitive Hebbian learning through spike-timing-dependent synaptic plasticity. Nat Neurosci 3:919–926

    Article  Google Scholar 

  5. Jeong S, Park C, Hong D, Seo C, Jho N (2021) Neural cryptography based on generalized tree parity machine for real-life systems. Secur Commun Netw. https://doi.org/10.1155/2021/6680782

    Article  Google Scholar 

  6. Hellman M (1978) An overview of public key cryptography. IEEE Commun Soc Mag 16(6):24–32

    Article  Google Scholar 

  7. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MathSciNet  MATH  Google Scholar 

  8. Anoop MS (2008) Security needs in embedded systems. IACR Cryptology ePrint Archive 198

  9. Choi Y et al (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10081–10106

    Article  Google Scholar 

  10. Carlson A (1990) Anti-Hebbian learning in a non-linear neural network. Biol Cybern 64:171–176

    Article  Google Scholar 

  11. Yang XS (2010) Nature-inspired Metaheuristic Algorithms Luniver Press.

  12. Francke JA, Groden P, Ferrer C et al (2022) Remote enrollment into a telehealth-delivering patient portal: Barriers faced in an urban population during the COVID-19 pandemic. Health Technol 12:227–238. https://doi.org/10.1007/s12553-021-00614-x

    Article  Google Scholar 

  13. Alonso SG, Marques G, Barrachina I et al (2021) Telemedicine and e-Health research solutions in literature for combatting COVID-19: a systematic review. Health Technol 11:257–266. https://doi.org/10.1007/s12553-021-00529-7

    Article  Google Scholar 

  14. Ghosh A, Gupta R, Misra A (2020) Telemedicine for diabetes care in India during COVID19 pandemic and national lockdown period: Guidelines for physicians. Diabetes Metab Syndr: Clin Res Rev 14:273–276. https://doi.org/10.1016/j.dsx.2020.04.001

    Article  Google Scholar 

  15. Abo-Zahhad M, Ahmed SM, Elnahas O (2014) A wireless emergency telemedicine system for patients monitoring and diagnosis. Int J Telemed App. https://doi.org/10.1155/2014/380787

    Article  Google Scholar 

  16. Hatcher-Martin JM, Adams JL, Anderson ER et al (2020) Telemedicine in Neurology. Neurology 94(1):30–38

    Article  Google Scholar 

  17. Norman S (2006) The use of telemedicine in psychiatry. J Psychiatr Mental Health Nursing 13(6):771–777

    Article  Google Scholar 

  18. Tresenriter M, Holdaway J, Killeen J et al (2021) The implementation of an emergency medicine telehealth system during a pandemic. J Emergency Med 60(4):548–553

    Article  Google Scholar 

  19. Bokolo A (2021) Exploring the adoption of telemedicine and virtual software for care of outpatients during and after COVID-19 pandemic. Ir J Med Sci 190:1–10. https://doi.org/10.1007/s11845-020-02299-z

    Article  Google Scholar 

  20. Yang L, Brown-Johnson CG, Miller-Kuhlmann R et al (2020) Accelerated launch of video visits in ambulatory neurology during COVID-19. Neurology 95(7):305–311

    Article  Google Scholar 

  21. Chauhan V, Galwankar S, Arquilla B et al (2020) Novel coronavirus (COVID-19): leveraging telemedicine to optimize care while minimizing exposures and viral transmission. J Emerg Trauma Shock 13(1):20

    Article  Google Scholar 

  22. Jnr Bokolo A (2020) Use of telemedicine and virtual care for remote treatment in response to COVID-19 pandemic. J Med Syst 44:132

    Article  Google Scholar 

  23. Dey J, Mukherjee S (2021) Wireless COVID-19 telehealth: leukocytes encryption guided by amino acid matrix. Wireless Pers Commun 120:1769–1789. https://doi.org/10.1007/s11277-021-08534-9

    Article  Google Scholar 

  24. Sarkar A, Dey J, Chatterjee M, Bhowmik A, Karforma S (2019) Neural soft computing based secured transmission of intraoral gingivitis image in E-health. Indonesian J Electr Eng Comput Sci 14(1):178–184

    Article  Google Scholar 

  25. Rahman S, Amit S, Kafy A (2022) Impact of COVID-19 and telehealth on mental health in Bangladesh: a propensity score matching approach. Spat Inf Res. https://doi.org/10.1007/s41324-022-00434-9

    Article  Google Scholar 

  26. Dash S, Aarthy R, Mohan V (2021) Telemedicine during COVID-19 in India—a new policy and its challenges. J Public Health Pol 42:501–509. https://doi.org/10.1057/s41271-021-00287-w

    Article  Google Scholar 

  27. Lei X, Liao X, Chen F, Huang T (2013) Two-layer tree-connected feed-forward neural network model for neural cryptography. Phys Rev E 87(3):032811

    Article  Google Scholar 

  28. Allam AM, Abbas HM, El-Kharashi MW (2013) Authenticated key exchange protocol using neural cryptography with secret boundaries. In: The 2013 International Joint Conference on Neural Networks (IJCNN) Aug 4 (pp. 1-8). IEEE.

  29. Dey L, Chakraborty S, Mukhopadhyay A (2020) Machine learning techniques for sequence-based prediction of viral–host interactions between SARS-CoV-2 and human proteins. Biomed J 43(5):438–450

    Article  Google Scholar 

  30. Jeong S, Park C, Hong D, Seo C, Jho N (2021) Neural cryptography based on generalized tree parity machine for real-life systems. Secur Commun Netw. https://doi.org/10.1155/2021/6680782

    Article  Google Scholar 

  31. Mislovaty R, Perchenok Y, Kanter I, Kinzel W (2002) Secure key-exchange protocol with an absence of injective functions. Phys Rev E 66(6):066102

    Article  Google Scholar 

  32. Rosen-Zvi M, Klein E, Kanter I, Kinzel W (2002) Mutual learning in a tree parity machine and its application to cryptography. Phys Rev E 66(6):066135

    Article  MathSciNet  Google Scholar 

  33. Dolecki M, Kozera R (2015) The Impact of the TPM Weights Distribution on Network Synchronization Time. Computer Information Systems and Industrial Management, pp.451–460.

  34. Ruttor A, Kinzel W, Kanter I (2007) Dynamics of neural cryptography. Phys Rev E 75(5):056104

    Article  MathSciNet  Google Scholar 

  35. Volkmer M, Wallner S (2005) Tree parity machine rekeying architectures. IEEE Trans Comput 54(4):421–427

    Article  Google Scholar 

  36. Santhanalakshmi S, Sudarshan T, Patra GK Neural synchronization by mutual learning using genetic approach for secure key generation. In: Proceedings of the International Conference on Security in Computer Networks and Distributed Systems, 422–431, Thiruvanathapuram, India, March 2014.

  37. Han YL, Li Y, Li Z, Zhu SS (2020) An improved method to evaluate the synchronization in neural key exchange protocol. Secur Commun Netw. https://doi.org/10.1155/2020/8869688

    Article  Google Scholar 

  38. Jalali MS et al (2020) Why employees (still ) click on phishing links: investigation in hospitals. J Med Internet Res 22(1):e16775

    Article  Google Scholar 

  39. Bassan S (2020) Data privacy considerations for telehealth consumers amind COVID-19. J Law Biosci 7(1).

  40. Kahate A (2006) Cryptography and Network Security, 2003. Tata McGraw-Hill publishing Company Limited, Eighth reprint

    Google Scholar 

  41. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST special publication 800–22.

  42. Martínez Padilla J, Meyer-Baese U, Foo S (2018) Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions. EURASIP J on Info Secur 2018:3. https://doi.org/10.1186/s13635-018-0073-z

    Article  Google Scholar 

  43. Wu B, Chen J, Wu J, Cardei M (2007) A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Xiao, Y., Shen, X.S., Du, DZ. (eds) Wireless Network Security. Signals and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-33112-6_5.

  44. Hofstede R, Jonker M, Sperotto A et al (2017) Flow-based web application brute-force attack and compromise detection. J Netw Syst Manage 25:735–758. https://doi.org/10.1007/s10922-017-9421-4

    Article  Google Scholar 

  45. Vykopal J (2013) Flow-based brute-force attack detection in large and high-speed networks. Ph.D. thesis, Masaryk University, Brno, Czech Republic.

  46. Rui Z, et al. (2020). PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network. In: Cyber Security. CNCERT 2020. Communications in Computer and Information Science, vol 1299. Springer, Singapore. https://doi.org/10.1007/978-981-33-4922-3_1.

Download references

Acknowledgements

The author do acknowledges the moral and congenial atmosphere support provided by Maharajadhiraj Uday Chand Women’s College, Burdwan, India -713104.

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joydeep Dey.

Ethics declarations

Conflict of interests

There is no conflict of interests in this manuscript.

Ethics approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dey, J. State-of-the-art session key generation on priority-based adaptive neural machine (PANM) in telemedicine. Neural Comput & Applic 35, 9517–9533 (2023). https://doi.org/10.1007/s00521-022-08169-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-022-08169-2

Keywords