Open Access iconOpen Access

ARTICLE

Encryption with User Authentication Model for Internet of Medical Things Environment

K. S. Riya1, R. Surendran2,*, Carlos Andrés Tavera Romero3, M. Sadish Sendil4

1 Department of Information Technology, Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai, 600062, India
2 Center for Artificial Intelligence and Research (CAIR), Chennai Institute of Technology, Chennai, 600069, India
3 COMBA R&D Laboratory, Faculty of Engineering, Universidad Santiago de Cali, Cali, 76001, Colombia
4 Department of Emerging Technologies, Guru Nanak Institute of Technology, Ibrahipatnam, 501506, Telangana, India

* Corresponding Author: R. Surendran. Email: email

Intelligent Automation & Soft Computing 2023, 35(1), 507-520. https://doi.org/10.32604/iasc.2023.027779

Abstract

Internet of Medical Things (IoMT) enabled e-healthcare has the potential to greately improve conventional healthcare services significantly. However, security and privacy become major issues of IoMT because of the restricted processing abilities, storage, and energy constraints of the sensors. Therefore, it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors. In order to ensure security on sensitive medical data, effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers. In this view, this study designs an effective metaheuristic optimization based encryption with user authentication (EMOE-UA) technique for IoMT environment. This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity. Moreover, the EMOE-UA technique employs optimal multikey homomorphic encryption (OMKHE) technique to encrypt the IoMT data. Furthermore, the improved social spider optimization algorithm (ISSOA) was employed for the optimal multikey generation of the MKHE technique. The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects. The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques.

Keywords


Cite This Article

APA Style
Riya, K.S., Surendran, R., Romero, C.A.T., Sendil, M.S. (2023). Encryption with user authentication model for internet of medical things environment. Intelligent Automation & Soft Computing, 35(1), 507-520. https://doi.org/10.32604/iasc.2023.027779
Vancouver Style
Riya KS, Surendran R, Romero CAT, Sendil MS. Encryption with user authentication model for internet of medical things environment. Intell Automat Soft Comput . 2023;35(1):507-520 https://doi.org/10.32604/iasc.2023.027779
IEEE Style
K.S. Riya, R. Surendran, C.A.T. Romero, and M.S. Sendil, “Encryption with User Authentication Model for Internet of Medical Things Environment,” Intell. Automat. Soft Comput. , vol. 35, no. 1, pp. 507-520, 2023. https://doi.org/10.32604/iasc.2023.027779



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1380

    View

  • 786

    Download

  • 0

    Like

Share Link