Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications
Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in he...
Gespeichert in:
Veröffentlicht in: | Journal of healthcare engineering 2022-01, Vol.2022, p.2500377-8 |
---|---|
Hauptverfasser: | , , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 8 |
---|---|
container_issue | |
container_start_page | 2500377 |
container_title | Journal of healthcare engineering |
container_volume | 2022 |
creator | Divakaran, J. Prashanth, S. K. Mohammad, Gouse Baig Shitharth, Dr Mohanty, Sachi Nandan Arvind, C. Srihari, K. Abdullah R., Yasir Sundramurthy, Venkatesa Prabhu |
description | Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications. |
doi_str_mv | 10.1155/2022/2500377 |
format | Article |
fullrecord | <record><control><sourceid>proquest_pubme</sourceid><recordid>TN_cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_8759874</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2620754425</sourcerecordid><originalsourceid>FETCH-LOGICAL-c420t-f30dc2ed738ae1b151463a874bbf26492f798c608ae6aa2dd9e27cbec95787dd3</originalsourceid><addsrcrecordid>eNp9kcFv0zAYxSMEYtPYjTPyEQnCHDuOkwtSVbXrpLFd2Nly7C-LIbGD7bTa_iT-Sly1neCCL7b8fnrv-_Sy7H2BvxQFY1cEE3JFGMaU81fZOcElzgnFzevTmzTsLLsM4QdOhza0LOjb7IwyTFldVOfZ75tx8m4LGm2k1enh0WKOPdholIzGWWQsWpsu9vk1WPCHv6Ubx9meiDuIO-d_BvQQjH1E6_n5-Qmttm6Y97L0T-h-imY04YDvTOzRnbROOQ9oNcCY0sI-55trzQBoA3KIvZJJXUzTcIwJ77I3nRwCXB7vi-xhvfq-3OS399c3y8VtrkqCY95RrBUBzWktoWgLVpQVlTUv27YjVdmQjje1qnBSKymJ1g0QrlpQDeM115peZF8PvtPcjqBVms7LQUzejGkX4aQR_yrW9OLRbUXNWZNyksHHo4F3v2YIUaTdFQyDtODmIEhFMGdlSVhCPx9Q5V0IHrqXmAKLfcNi37A4NpzwD3-P9gKf-kzApwPQG6vlzvzf7g9A6bPQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2620754425</pqid></control><display><type>article</type><title>Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications</title><source>MEDLINE</source><source>PubMed Central Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>PubMed Central</source><source>Alma/SFX Local Collection</source><creator>Divakaran, J. ; Prashanth, S. K. ; Mohammad, Gouse Baig ; Shitharth, Dr ; Mohanty, Sachi Nandan ; Arvind, C. ; Srihari, K. ; Abdullah R., Yasir ; Sundramurthy, Venkatesa Prabhu</creator><contributor>Abdulhay, Enas</contributor><creatorcontrib>Divakaran, J. ; Prashanth, S. K. ; Mohammad, Gouse Baig ; Shitharth, Dr ; Mohanty, Sachi Nandan ; Arvind, C. ; Srihari, K. ; Abdullah R., Yasir ; Sundramurthy, Venkatesa Prabhu ; Abdulhay, Enas</creatorcontrib><description>Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.</description><identifier>ISSN: 2040-2295</identifier><identifier>EISSN: 2040-2309</identifier><identifier>DOI: 10.1155/2022/2500377</identifier><identifier>PMID: 35035816</identifier><language>eng</language><publisher>England: Hindawi</publisher><subject>Computer Communication Networks ; Computer Security ; Humans ; Mobile Applications ; Telemedicine ; Wireless Technology</subject><ispartof>Journal of healthcare engineering, 2022-01, Vol.2022, p.2500377-8</ispartof><rights>Copyright © 2022 J. Divakaran et al.</rights><rights>Copyright © 2022 J. Divakaran et al. 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c420t-f30dc2ed738ae1b151463a874bbf26492f798c608ae6aa2dd9e27cbec95787dd3</citedby><cites>FETCH-LOGICAL-c420t-f30dc2ed738ae1b151463a874bbf26492f798c608ae6aa2dd9e27cbec95787dd3</cites><orcidid>0000-0002-8210-1491 ; 0000-0002-2829-830X ; 0000-0003-1101-6051 ; 0000-0002-4931-724X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC8759874/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC8759874/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,885,27924,27925,53791,53793</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/35035816$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><contributor>Abdulhay, Enas</contributor><creatorcontrib>Divakaran, J.</creatorcontrib><creatorcontrib>Prashanth, S. K.</creatorcontrib><creatorcontrib>Mohammad, Gouse Baig</creatorcontrib><creatorcontrib>Shitharth, Dr</creatorcontrib><creatorcontrib>Mohanty, Sachi Nandan</creatorcontrib><creatorcontrib>Arvind, C.</creatorcontrib><creatorcontrib>Srihari, K.</creatorcontrib><creatorcontrib>Abdullah R., Yasir</creatorcontrib><creatorcontrib>Sundramurthy, Venkatesa Prabhu</creatorcontrib><title>Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications</title><title>Journal of healthcare engineering</title><addtitle>J Healthc Eng</addtitle><description>Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.</description><subject>Computer Communication Networks</subject><subject>Computer Security</subject><subject>Humans</subject><subject>Mobile Applications</subject><subject>Telemedicine</subject><subject>Wireless Technology</subject><issn>2040-2295</issn><issn>2040-2309</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>EIF</sourceid><recordid>eNp9kcFv0zAYxSMEYtPYjTPyEQnCHDuOkwtSVbXrpLFd2Nly7C-LIbGD7bTa_iT-Sly1neCCL7b8fnrv-_Sy7H2BvxQFY1cEE3JFGMaU81fZOcElzgnFzevTmzTsLLsM4QdOhza0LOjb7IwyTFldVOfZ75tx8m4LGm2k1enh0WKOPdholIzGWWQsWpsu9vk1WPCHv6Ubx9meiDuIO-d_BvQQjH1E6_n5-Qmttm6Y97L0T-h-imY04YDvTOzRnbROOQ9oNcCY0sI-55trzQBoA3KIvZJJXUzTcIwJ77I3nRwCXB7vi-xhvfq-3OS399c3y8VtrkqCY95RrBUBzWktoWgLVpQVlTUv27YjVdmQjje1qnBSKymJ1g0QrlpQDeM115peZF8PvtPcjqBVms7LQUzejGkX4aQR_yrW9OLRbUXNWZNyksHHo4F3v2YIUaTdFQyDtODmIEhFMGdlSVhCPx9Q5V0IHrqXmAKLfcNi37A4NpzwD3-P9gKf-kzApwPQG6vlzvzf7g9A6bPQ</recordid><startdate>20220107</startdate><enddate>20220107</enddate><creator>Divakaran, J.</creator><creator>Prashanth, S. K.</creator><creator>Mohammad, Gouse Baig</creator><creator>Shitharth, Dr</creator><creator>Mohanty, Sachi Nandan</creator><creator>Arvind, C.</creator><creator>Srihari, K.</creator><creator>Abdullah R., Yasir</creator><creator>Sundramurthy, Venkatesa Prabhu</creator><general>Hindawi</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope><scope>5PM</scope><orcidid>https://orcid.org/0000-0002-8210-1491</orcidid><orcidid>https://orcid.org/0000-0002-2829-830X</orcidid><orcidid>https://orcid.org/0000-0003-1101-6051</orcidid><orcidid>https://orcid.org/0000-0002-4931-724X</orcidid></search><sort><creationdate>20220107</creationdate><title>Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications</title><author>Divakaran, J. ; Prashanth, S. K. ; Mohammad, Gouse Baig ; Shitharth, Dr ; Mohanty, Sachi Nandan ; Arvind, C. ; Srihari, K. ; Abdullah R., Yasir ; Sundramurthy, Venkatesa Prabhu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c420t-f30dc2ed738ae1b151463a874bbf26492f798c608ae6aa2dd9e27cbec95787dd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Communication Networks</topic><topic>Computer Security</topic><topic>Humans</topic><topic>Mobile Applications</topic><topic>Telemedicine</topic><topic>Wireless Technology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Divakaran, J.</creatorcontrib><creatorcontrib>Prashanth, S. K.</creatorcontrib><creatorcontrib>Mohammad, Gouse Baig</creatorcontrib><creatorcontrib>Shitharth, Dr</creatorcontrib><creatorcontrib>Mohanty, Sachi Nandan</creatorcontrib><creatorcontrib>Arvind, C.</creatorcontrib><creatorcontrib>Srihari, K.</creatorcontrib><creatorcontrib>Abdullah R., Yasir</creatorcontrib><creatorcontrib>Sundramurthy, Venkatesa Prabhu</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><jtitle>Journal of healthcare engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Divakaran, J.</au><au>Prashanth, S. K.</au><au>Mohammad, Gouse Baig</au><au>Shitharth, Dr</au><au>Mohanty, Sachi Nandan</au><au>Arvind, C.</au><au>Srihari, K.</au><au>Abdullah R., Yasir</au><au>Sundramurthy, Venkatesa Prabhu</au><au>Abdulhay, Enas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications</atitle><jtitle>Journal of healthcare engineering</jtitle><addtitle>J Healthc Eng</addtitle><date>2022-01-07</date><risdate>2022</risdate><volume>2022</volume><spage>2500377</spage><epage>8</epage><pages>2500377-8</pages><issn>2040-2295</issn><eissn>2040-2309</eissn><abstract>Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.</abstract><cop>England</cop><pub>Hindawi</pub><pmid>35035816</pmid><doi>10.1155/2022/2500377</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0002-8210-1491</orcidid><orcidid>https://orcid.org/0000-0002-2829-830X</orcidid><orcidid>https://orcid.org/0000-0003-1101-6051</orcidid><orcidid>https://orcid.org/0000-0002-4931-724X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2040-2295 |
ispartof | Journal of healthcare engineering, 2022-01, Vol.2022, p.2500377-8 |
issn | 2040-2295 2040-2309 |
language | eng |
recordid | cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_8759874 |
source | MEDLINE; PubMed Central Open Access; EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); PubMed Central; Alma/SFX Local Collection |
subjects | Computer Communication Networks Computer Security Humans Mobile Applications Telemedicine Wireless Technology |
title | Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T19%3A34%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pubme&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Improved%20Handover%20Authentication%20in%20Fifth-Generation%20Communication%20Networks%20Using%20Fuzzy%20Evolutionary%20Optimisation%20with%20Nanocore%20Elements%20in%20Mobile%20Healthcare%20Applications&rft.jtitle=Journal%20of%20healthcare%20engineering&rft.au=Divakaran,%20J.&rft.date=2022-01-07&rft.volume=2022&rft.spage=2500377&rft.epage=8&rft.pages=2500377-8&rft.issn=2040-2295&rft.eissn=2040-2309&rft_id=info:doi/10.1155/2022/2500377&rft_dat=%3Cproquest_pubme%3E2620754425%3C/proquest_pubme%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2620754425&rft_id=info:pmid/35035816&rfr_iscdi=true |