Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications

Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in he...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of healthcare engineering 2022-01, Vol.2022, p.2500377-8
Hauptverfasser: Divakaran, J., Prashanth, S. K., Mohammad, Gouse Baig, Shitharth, Dr, Mohanty, Sachi Nandan, Arvind, C., Srihari, K., Abdullah R., Yasir, Sundramurthy, Venkatesa Prabhu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 8
container_issue
container_start_page 2500377
container_title Journal of healthcare engineering
container_volume 2022
creator Divakaran, J.
Prashanth, S. K.
Mohammad, Gouse Baig
Shitharth, Dr
Mohanty, Sachi Nandan
Arvind, C.
Srihari, K.
Abdullah R., Yasir
Sundramurthy, Venkatesa Prabhu
description Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.
doi_str_mv 10.1155/2022/2500377
format Article
fullrecord <record><control><sourceid>proquest_pubme</sourceid><recordid>TN_cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_8759874</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2620754425</sourcerecordid><originalsourceid>FETCH-LOGICAL-c420t-f30dc2ed738ae1b151463a874bbf26492f798c608ae6aa2dd9e27cbec95787dd3</originalsourceid><addsrcrecordid>eNp9kcFv0zAYxSMEYtPYjTPyEQnCHDuOkwtSVbXrpLFd2Nly7C-LIbGD7bTa_iT-Sly1neCCL7b8fnrv-_Sy7H2BvxQFY1cEE3JFGMaU81fZOcElzgnFzevTmzTsLLsM4QdOhza0LOjb7IwyTFldVOfZ75tx8m4LGm2k1enh0WKOPdholIzGWWQsWpsu9vk1WPCHv6Ubx9meiDuIO-d_BvQQjH1E6_n5-Qmttm6Y97L0T-h-imY04YDvTOzRnbROOQ9oNcCY0sI-55trzQBoA3KIvZJJXUzTcIwJ77I3nRwCXB7vi-xhvfq-3OS399c3y8VtrkqCY95RrBUBzWktoWgLVpQVlTUv27YjVdmQjje1qnBSKymJ1g0QrlpQDeM115peZF8PvtPcjqBVms7LQUzejGkX4aQR_yrW9OLRbUXNWZNyksHHo4F3v2YIUaTdFQyDtODmIEhFMGdlSVhCPx9Q5V0IHrqXmAKLfcNi37A4NpzwD3-P9gKf-kzApwPQG6vlzvzf7g9A6bPQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2620754425</pqid></control><display><type>article</type><title>Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications</title><source>MEDLINE</source><source>PubMed Central Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>PubMed Central</source><source>Alma/SFX Local Collection</source><creator>Divakaran, J. ; Prashanth, S. K. ; Mohammad, Gouse Baig ; Shitharth, Dr ; Mohanty, Sachi Nandan ; Arvind, C. ; Srihari, K. ; Abdullah R., Yasir ; Sundramurthy, Venkatesa Prabhu</creator><contributor>Abdulhay, Enas</contributor><creatorcontrib>Divakaran, J. ; Prashanth, S. K. ; Mohammad, Gouse Baig ; Shitharth, Dr ; Mohanty, Sachi Nandan ; Arvind, C. ; Srihari, K. ; Abdullah R., Yasir ; Sundramurthy, Venkatesa Prabhu ; Abdulhay, Enas</creatorcontrib><description>Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.</description><identifier>ISSN: 2040-2295</identifier><identifier>EISSN: 2040-2309</identifier><identifier>DOI: 10.1155/2022/2500377</identifier><identifier>PMID: 35035816</identifier><language>eng</language><publisher>England: Hindawi</publisher><subject>Computer Communication Networks ; Computer Security ; Humans ; Mobile Applications ; Telemedicine ; Wireless Technology</subject><ispartof>Journal of healthcare engineering, 2022-01, Vol.2022, p.2500377-8</ispartof><rights>Copyright © 2022 J. Divakaran et al.</rights><rights>Copyright © 2022 J. Divakaran et al. 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c420t-f30dc2ed738ae1b151463a874bbf26492f798c608ae6aa2dd9e27cbec95787dd3</citedby><cites>FETCH-LOGICAL-c420t-f30dc2ed738ae1b151463a874bbf26492f798c608ae6aa2dd9e27cbec95787dd3</cites><orcidid>0000-0002-8210-1491 ; 0000-0002-2829-830X ; 0000-0003-1101-6051 ; 0000-0002-4931-724X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC8759874/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC8759874/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,885,27924,27925,53791,53793</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/35035816$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><contributor>Abdulhay, Enas</contributor><creatorcontrib>Divakaran, J.</creatorcontrib><creatorcontrib>Prashanth, S. K.</creatorcontrib><creatorcontrib>Mohammad, Gouse Baig</creatorcontrib><creatorcontrib>Shitharth, Dr</creatorcontrib><creatorcontrib>Mohanty, Sachi Nandan</creatorcontrib><creatorcontrib>Arvind, C.</creatorcontrib><creatorcontrib>Srihari, K.</creatorcontrib><creatorcontrib>Abdullah R., Yasir</creatorcontrib><creatorcontrib>Sundramurthy, Venkatesa Prabhu</creatorcontrib><title>Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications</title><title>Journal of healthcare engineering</title><addtitle>J Healthc Eng</addtitle><description>Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.</description><subject>Computer Communication Networks</subject><subject>Computer Security</subject><subject>Humans</subject><subject>Mobile Applications</subject><subject>Telemedicine</subject><subject>Wireless Technology</subject><issn>2040-2295</issn><issn>2040-2309</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>EIF</sourceid><recordid>eNp9kcFv0zAYxSMEYtPYjTPyEQnCHDuOkwtSVbXrpLFd2Nly7C-LIbGD7bTa_iT-Sly1neCCL7b8fnrv-_Sy7H2BvxQFY1cEE3JFGMaU81fZOcElzgnFzevTmzTsLLsM4QdOhza0LOjb7IwyTFldVOfZ75tx8m4LGm2k1enh0WKOPdholIzGWWQsWpsu9vk1WPCHv6Ubx9meiDuIO-d_BvQQjH1E6_n5-Qmttm6Y97L0T-h-imY04YDvTOzRnbROOQ9oNcCY0sI-55trzQBoA3KIvZJJXUzTcIwJ77I3nRwCXB7vi-xhvfq-3OS399c3y8VtrkqCY95RrBUBzWktoWgLVpQVlTUv27YjVdmQjje1qnBSKymJ1g0QrlpQDeM115peZF8PvtPcjqBVms7LQUzejGkX4aQR_yrW9OLRbUXNWZNyksHHo4F3v2YIUaTdFQyDtODmIEhFMGdlSVhCPx9Q5V0IHrqXmAKLfcNi37A4NpzwD3-P9gKf-kzApwPQG6vlzvzf7g9A6bPQ</recordid><startdate>20220107</startdate><enddate>20220107</enddate><creator>Divakaran, J.</creator><creator>Prashanth, S. K.</creator><creator>Mohammad, Gouse Baig</creator><creator>Shitharth, Dr</creator><creator>Mohanty, Sachi Nandan</creator><creator>Arvind, C.</creator><creator>Srihari, K.</creator><creator>Abdullah R., Yasir</creator><creator>Sundramurthy, Venkatesa Prabhu</creator><general>Hindawi</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope><scope>5PM</scope><orcidid>https://orcid.org/0000-0002-8210-1491</orcidid><orcidid>https://orcid.org/0000-0002-2829-830X</orcidid><orcidid>https://orcid.org/0000-0003-1101-6051</orcidid><orcidid>https://orcid.org/0000-0002-4931-724X</orcidid></search><sort><creationdate>20220107</creationdate><title>Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications</title><author>Divakaran, J. ; Prashanth, S. K. ; Mohammad, Gouse Baig ; Shitharth, Dr ; Mohanty, Sachi Nandan ; Arvind, C. ; Srihari, K. ; Abdullah R., Yasir ; Sundramurthy, Venkatesa Prabhu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c420t-f30dc2ed738ae1b151463a874bbf26492f798c608ae6aa2dd9e27cbec95787dd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Communication Networks</topic><topic>Computer Security</topic><topic>Humans</topic><topic>Mobile Applications</topic><topic>Telemedicine</topic><topic>Wireless Technology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Divakaran, J.</creatorcontrib><creatorcontrib>Prashanth, S. K.</creatorcontrib><creatorcontrib>Mohammad, Gouse Baig</creatorcontrib><creatorcontrib>Shitharth, Dr</creatorcontrib><creatorcontrib>Mohanty, Sachi Nandan</creatorcontrib><creatorcontrib>Arvind, C.</creatorcontrib><creatorcontrib>Srihari, K.</creatorcontrib><creatorcontrib>Abdullah R., Yasir</creatorcontrib><creatorcontrib>Sundramurthy, Venkatesa Prabhu</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><jtitle>Journal of healthcare engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Divakaran, J.</au><au>Prashanth, S. K.</au><au>Mohammad, Gouse Baig</au><au>Shitharth, Dr</au><au>Mohanty, Sachi Nandan</au><au>Arvind, C.</au><au>Srihari, K.</au><au>Abdullah R., Yasir</au><au>Sundramurthy, Venkatesa Prabhu</au><au>Abdulhay, Enas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications</atitle><jtitle>Journal of healthcare engineering</jtitle><addtitle>J Healthc Eng</addtitle><date>2022-01-07</date><risdate>2022</risdate><volume>2022</volume><spage>2500377</spage><epage>8</epage><pages>2500377-8</pages><issn>2040-2295</issn><eissn>2040-2309</eissn><abstract>Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.</abstract><cop>England</cop><pub>Hindawi</pub><pmid>35035816</pmid><doi>10.1155/2022/2500377</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0002-8210-1491</orcidid><orcidid>https://orcid.org/0000-0002-2829-830X</orcidid><orcidid>https://orcid.org/0000-0003-1101-6051</orcidid><orcidid>https://orcid.org/0000-0002-4931-724X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2040-2295
ispartof Journal of healthcare engineering, 2022-01, Vol.2022, p.2500377-8
issn 2040-2295
2040-2309
language eng
recordid cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_8759874
source MEDLINE; PubMed Central Open Access; EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); PubMed Central; Alma/SFX Local Collection
subjects Computer Communication Networks
Computer Security
Humans
Mobile Applications
Telemedicine
Wireless Technology
title Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T19%3A34%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pubme&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Improved%20Handover%20Authentication%20in%20Fifth-Generation%20Communication%20Networks%20Using%20Fuzzy%20Evolutionary%20Optimisation%20with%20Nanocore%20Elements%20in%20Mobile%20Healthcare%20Applications&rft.jtitle=Journal%20of%20healthcare%20engineering&rft.au=Divakaran,%20J.&rft.date=2022-01-07&rft.volume=2022&rft.spage=2500377&rft.epage=8&rft.pages=2500377-8&rft.issn=2040-2295&rft.eissn=2040-2309&rft_id=info:doi/10.1155/2022/2500377&rft_dat=%3Cproquest_pubme%3E2620754425%3C/proquest_pubme%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2620754425&rft_id=info:pmid/35035816&rfr_iscdi=true