Vol.35, No.1, 2023, pp.507-520, doi:10.32604/iasc.2023.027779
OPEN ACCESS
ARTICLE
Encryption with User Authentication Model for Internet of Medical Things Environment
  • K. S. Riya1, R. Surendran2,*, Carlos Andrés Tavera Romero3, M. Sadish Sendil4
1 Department of Information Technology, Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai, 600062, India
2 Center for Artificial Intelligence and Research (CAIR), Chennai Institute of Technology, Chennai, 600069, India
3 COMBA R&D Laboratory, Faculty of Engineering, Universidad Santiago de Cali, Cali, 76001, Colombia
4 Department of Emerging Technologies, Guru Nanak Institute of Technology, Ibrahipatnam, 501506, Telangana, India
* Corresponding Author: R. Surendran. Email:
Received 25 January 2022; Accepted 28 February 2022; Issue published 06 June 2022
Abstract
Internet of Medical Things (IoMT) enabled e-healthcare has the potential to greately improve conventional healthcare services significantly. However, security and privacy become major issues of IoMT because of the restricted processing abilities, storage, and energy constraints of the sensors. Therefore, it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors. In order to ensure security on sensitive medical data, effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers. In this view, this study designs an effective metaheuristic optimization based encryption with user authentication (EMOE-UA) technique for IoMT environment. This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity. Moreover, the EMOE-UA technique employs optimal multikey homomorphic encryption (OMKHE) technique to encrypt the IoMT data. Furthermore, the improved social spider optimization algorithm (ISSOA) was employed for the optimal multikey generation of the MKHE technique. The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects. The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques.
Keywords
User authentication; security; privacy; internet of medical things; homomorphic encryption; optimal key generation
Cite This Article
K. S. Riya, R. Surendran, C. Andrés Tavera Romero and M. Sadish Sendil, "Encryption with user authentication model for internet of medical things environment," Intelligent Automation & Soft Computing, vol. 35, no.1, pp. 507–520, 2023.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.