Driving a key generation strategy with training-based optimization to provide safe and effective authentication using data sharing approach in IoT healthcare

  • Anand Muni Mishra
  • , Yogesh Ramdas Shahare
  • , Piyush Kumar Shukla
  • , Akhtar Husain
  • , Santar Pal Singh
  • , Sultan Alyami
  • , Abdullah Alghamdi
  • , Tariq Ahamed Ahanger

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Blockchain technology offers a solution to the interoperability issues that currently plague health information systems (BT). Additionally, blockchain technology provides the cutting-edge standard that ensures the safe exchange of computerized health data among healthcare providers, institutions, people, and medical specialists. Recently, both businesses and academics recognized the Internet of Things (IoT) as one of the top study fields. Nevertheless, a significant issue in IoT healthcare across several product domains is the secrecy of patient health data transmission. For secure and effective authentication with data sharing strategy in IoT healthcare, a method called Driving Training Based Optimization (DTBO) Key generation is presented to address these issues. The entities involved in the proposed DTBO_Key generation technique are the user, owner, authenticating minor, blockchain, and IoT server. The suggested technique consists of seven stages: initialization, registration phase, key creation, login phase, data protection, authentication process, and verification phase. A minimum memory consumption of 2.983 MB, a computation cost of 28.008%, and an accuracy of 0.9 were attained using the proposed method.

Original languageEnglish
Pages (from-to)407-419
Number of pages13
JournalComputer Communications
Volume212
DOIs
StatePublished - 1 Dec 2023

Keywords

  • Authentication
  • Blockchain
  • Driving training based optimization
  • IoT healthcare
  • Key generation

Fingerprint

Dive into the research topics of 'Driving a key generation strategy with training-based optimization to provide safe and effective authentication using data sharing approach in IoT healthcare'. Together they form a unique fingerprint.

Cite this