Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 6 de 6
Filter
1.
Wirel Pers Commun ; 130(3): 1885-1904, 2023.
Article in English | MEDLINE | ID: covidwho-2294225

ABSTRACT

In this technique, it has been proposed to agree the session keys that have been generated through dual artificial neural networks based on the Telecare Health COVID-19 domain. Electronic health enables secure and protected communication between the patients and physicians, especially during this COVID-19 pandemic. Telecare was the main component which served the remote and non-invasive patients in the crisis period of COVID-19. Neural cryptographic engineering support in terms of data security and privacy is the main theme for Tree Parity Machine (TPM) synchronization in this paper. The session key has been generated on different key lengths and key validation done on the proposed set of robust session keys. A neural TPM network receives a vector designed through same random seed and producing a single output bit. Duo neural TPM networks' intermediate keys would be partially shared between the patient and doctor for the purpose neural synchronization. Higher magnitude of co-existence has been observed at the duo neural networks at the Telecare Health Systems in COVID-19. This proposed technique has been highly protective against several data attacks in the public networks. Partial transmission of the session key disables the intruders to guess the exact pattern, and highly randomized through different tests. The average p-values of different session key lengths of 40 bits, 60 bits, 160 bits, and 256 bits were observed to be 221.9, 259.3, 242, and 262.8 (taken under multiplicative of 1000) respectively.

2.
Wirel Pers Commun ; 129(4): 2455-2480, 2023.
Article in English | MEDLINE | ID: covidwho-2257027

ABSTRACT

In this exceptional COVID-19 crisis, telemedicine had arisen as a substitute technique for medicines. Even more unequivocally, pediatric children were at high risk to outside homes. The spread of COVID-19 has suddenly ascended. Because of lockdown conventions and isolation protocols, kids were confined to live inside their homes. Non-emergency youngsters ought to be managed remotely through the telepediatric health. An establishment of Neural Series Transmission Keys (NSTKs) has been created and security had been planned on the intraoral data. Oral cavity is a kind of dental disease occurring in children. It is for the most cases caused due to drawn out bacterial invasions. Bacterial attacks are more because of sticky chocolates, desserts, sugar, and so forth. Homeopathy medicines are the best prescribed to fix such dental diseases in this current unprecedented COVID-19. Since, it needs no dental medical procedure for the non-invasive kids, which is the reason that the homeopathy medicines are most appropriate in this COVID-19 lockdown stages. The doctor can gather symptoms of the kids from their parents through online interfaces. Some of the normal homeopathy drugs are: Kreasotum, Mercurius, Mezereum, etc. Moreover, in this pandemic situation online telepediatric homeopathy medicines were better alternatives to investigate from home disengages. Additionally it bears no voyaging consumptions and costs. Secure online transmission of clinical pediatric information has been the most challenging issue in COVID-19 telepediatric oral wellbeing. Data mystery factor is protected with tendency in this proposed cryptographic technique. Neural Series Transmission Keys (NSTKs) were established based on neural network based hamming codes. It has been diffused inside the intraoral pediatric data. The proposed key was so particularly amazing that it gives assorted blend after each bit of evolving. Beginning seeds were kept at the dentists and the patients, in order to go against external attacks inside the public channel, especially during this hyper digitized COVID-19 times. Standard graphs were drawn with accuracy using the proposed cryptographic method. The absolute cryptographic time in this strategy was 2.88 ms which was significantly important. By applying Chi Square test, we have noted χ 2 = 17.012, under 5% level of significance.

3.
2022 IEEE Global Communications Conference, GLOBECOM 2022 ; : 5510-5515, 2022.
Article in English | Scopus | ID: covidwho-2228774

ABSTRACT

Digital Contact Tracing (DCT) has been proposed to limit the spread of COVID-19, allowing for targeted quarantine of close contacts. The protocol is designed to be lightweight, broad-casting limited-time tokens over Bluetooth Low Energy (BLE) beacons, allowing receivers to record contacts pseudonymously. However, currently proposed protocols have vulnerabilities that permit an adversary to perform massive surveillance or cause significant numbers of false-positive alerts. In this paper, we present AcousticMask, which encrypts broadcast messages using a key derived from the audio signal present at each device with sufficient security levels. Our results show that a receiver sharing the same social space as a sender will hear all of the sender's ephemeral IDs (EphIDs) with Hamming distance at most 3, which can be decrypted at the rate of 10 Hz on a Raspberry Pi 4, while achieving a security factor of over 2108against attackers in our testing set, showing AcousticMask is lightweight for DCT and provides sufficient security levels to protect user's privacy. © 2022 IEEE.

4.
IEEE Sensors Journal ; : 1-1, 2022.
Article in English | Scopus | ID: covidwho-2018961

ABSTRACT

At present, COVID-19 is still spreading and affecting millions of people worldwide. Minimizing the need for travel can significantly reduce the probability of infection and improve patients’quality of life. The wireless body area network (WBAN) transmits the patients’physiological data to the doctor remotely through the sensors in a way that minimizes physical contact with others. However, existing WBAN security authentication schemes have core limitation that includes weak authentication performance and over-consumption of resources that precludes their widespread adoption in practical applications. Therefore, in this paper, an enhanced dual-factor authentication system that address the mentioned drawbacks is proposed for securing WBAN resources. By combining iris and electrocardiogram (ECG) features, users would be required to pass the first-level iris authentication before performing the second-level ECG authentication, thus enhancing the overall security scheme of a WBAN system. Furthermore, we examined the existing Inter-Pulse-Intervals (IPI) encoding methods and propose a more efficient ECG IPI encoding algorithm which can effectively shorten the encoding time without affecting the overall encoding performance. Finally, extensive experiments were performed to verify the performance of the proposed dual-factor iris and ECG based WBAN authentication system using public iris and ECG databases. The experimental results show that the false acceptance rate (FAR) is close to 0.0% and the false rejection rate (FRR) is close to 3.2%. Findings from this study suggest that the proposed dual-factor authentication scheme could aid adequate deployment of security schemes to protect WBAN resources in practical applications. IEEE

5.
Journal of The Institution of Engineers (India): Series B ; 103(4):1127-1146, 2022.
Article in English | ProQuest Central | ID: covidwho-1971889

ABSTRACT

The volume of E-commerce transactions had accelerated on huge scale due to COVID-19. Telemedicine comes under the segment of E-commerce, where the patients can get their treatments from isolates. Patients’ information security is a basic challenge in this COVID-19 telemedicine segment. The majority of the non-obtrusive and non-emergency patients are encouraged and treated distantly from their secludes without the inclusion of COVID-19 transmission. Anxiety, depressive disorders, stress, dementia, mood disorder, OCD, aggression, etc. are the critical mental challenges that have abruptly occurred during this COVID period. The present work focused on “New Normal Mode” of COVID-19 telepsychiatry so that the patients’ mental illness can be treated remotely in a secure way. An episode of dual neural-genetic firefly (DNGF) has been proposed on COVID-19 "New Normal Mode" 2nd wave telepsychiatry. The pool of transmission keys was generated with the help of firefly algorithm, neural perceptron, and genetic operations. Besides these, the proposed DNGF keys are effective to be used for different online psychiatric transactions. The objectivity of this paper is to generate a robust pool of transmission keys in order to nullify different types of intruding. It has effectively cleared Avalanche test and Strict Avalanche test. The outcome of parameterized functional security test has been recorded with adequacy. These were: 0.327933, 0.350467, 0.332533, 0.317867, and 0.350267 on the generated pool of DNGF. The correlation coefficient between the key generation time and parameterized functional security has been found to be rGT,FS=-0.53404. Distinctive mathematical arranged examinations were directed on the proposed key pool. It has shown better reasonability on the part of the COVID-19 2nd wave telepsychiatry, which is a component of E-commerce.

6.
International Journal of Reconfigurable and Embedded Systems ; 11(1):13-24, 2022.
Article in English | Scopus | ID: covidwho-1835817

ABSTRACT

In this unprecedented coronavirus crisis, telehealth had emerged as a substitute way of treatment. More specifically, paediatric children are at high risk of outside exposure now. Non critical children must be treated remotely through the tableware system. A key based secured online transmission of an intraoral image of the paediatric cavity has been proposed in this manuscript. A cavity is a dental disease occurring in children. It is mainly caused due to prolonged bacterial infections. Secured online transmission with respect to medical transactions is immensely required in telecare information systems (TIS). Data confidentiality factor is preserved with preference in this proposed technique. A parity based novel chain key (NCK) has been generated and diffused inside the intraoral paediatric cavity image. NCK generation scheme is so highly robust that it gives different combinations after each bit altering. Initial seeds are kept at the dentist and patients, to resist myriad attacks inside the wireless channel, especially during this COVID-19 period. Histogram, floating frequency, and autocorrelation were obtained with accuracy using the proposed technique. Effects were observed by flipping simultaneous bits of the initial key and results were highly acceptable. The time for the proposed key generation has been found to be 514.61 ms. The total cryptographic time has been noted as 3.5983 ms in this technique. © 2022, Institute of Advanced Engineering and Science. All rights reserved.

SELECTION OF CITATIONS
SEARCH DETAIL