Open Access
ARTICLE
Improved Key Agreement Based Kerberos Protocol for M-Health Security
1 Department of Computer Science and Engineeirng, Nandha Engineering College, Erode, 638052, India
2 Department of Computer Sceince and Engineering, Karpagam College of Engineering, Coimbatore, 641032, India
3 Department of Electrical, Electronics and Communication Engineering, GITAM University, Bengaluru Campus, 561203, India
4 Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, 641112, India
5 Department of Electronics and Communication Engineering, Kongu Engineering College, Perundurai, 638060, India
* Corresponding Author: P. Thirumoorthy. Email:
Computer Systems Science and Engineering 2022, 42(2), 577-587. https://doi.org/10.32604/csse.2022.021717
Received 12 July 2021; Accepted 23 August 2021; Issue published 04 January 2022
Abstract
The development of wireless sensor network with Internet of Things (IoT) predicts various applications in the field of healthcare and cloud computing. This can give promising results on mobile health care (M-health) and Telecare medicine information systems. M-health system on cloud Internet of Things (IoT) through wireless sensor network (WSN) becomes the rising research for the need of modern society. Sensor devices attached to the patients’ body which is connected to the mobile device can ease the medical services. Security is the key connect for optimal performance of the m-health system that share the data of patients in wireless networks in order to maintain the anonymity of the patients. This paper proposed a secure transmission of M-health data in wireless networks using proposed key agreement based Kerberos protocol. The patients processed data are stored in cloud server and accessed by doctors and caregivers. The data transfer between the patients, server and the doctors are accessed with proposed protocol in order to maintain the confidentiality and integrity of authentication. The efficiency of the proposed algorithm is compared with the existing protocols. For computing 100 devices it consumes only 91milllisecond for computation.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.