Cargando…
Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning
Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9283022/ https://www.ncbi.nlm.nih.gov/pubmed/35845910 http://dx.doi.org/10.1155/2022/7348488 |
_version_ | 1784747242625695744 |
---|---|
author | Malmurugan, N. Nelson, S. Christalin Altuwairiqi, Majid Alyami, Hashem Gangodkar, Durgaprasad Abdul Zahra, Musaddak Maher Asakipaam, Simon Atuah |
author_facet | Malmurugan, N. Nelson, S. Christalin Altuwairiqi, Majid Alyami, Hashem Gangodkar, Durgaprasad Abdul Zahra, Musaddak Maher Asakipaam, Simon Atuah |
author_sort | Malmurugan, N. |
collection | PubMed |
description | Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from one another, it can be used to monitor physical and environmental conditions in the surrounding environment. In addition to the built-in sensor on the exterior of a pipeline and sensors positioned to support bridge structures, wireless sensor networks have a range of other applications. Other uses include robotics, healthcare, environmental monitoring, and a variety of other areas of technology. It is feasible to use wireless sensor networks to monitor temperature and pressure, as well as leak detection and transmission line sabotage, among other applications. There are several different sorts of attacks that can be launched against wireless sensor networks. When it comes to information security in wireless sensor networks, cryptographic approaches play a critical role in ensuring the integrity of the data. Different types of cryptographic algorithms are now available for use in order to maintain network security. Specific difficulties must be addressed, though, and these are as follows: To strengthen the power of these algorithms, a unique hybrid encryption approach for monitoring energy transmission lines and increasing the security of wireless sensor networks is created in this study. While wireless sensor networks are being used to monitor transmission pipelines, the proposed hybrid encryption method ensures that data is transferred securely and promptly. The proposed method must follow three cryptographic principles: integrity, secrecy, and authenticity. All of the subtleties and underlying principles of the algorithm are explained in detail so that the algorithm can be put into action immediately after it is introduced. |
format | Online Article Text |
id | pubmed-9283022 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-92830222022-07-15 Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning Malmurugan, N. Nelson, S. Christalin Altuwairiqi, Majid Alyami, Hashem Gangodkar, Durgaprasad Abdul Zahra, Musaddak Maher Asakipaam, Simon Atuah Comput Intell Neurosci Research Article Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from one another, it can be used to monitor physical and environmental conditions in the surrounding environment. In addition to the built-in sensor on the exterior of a pipeline and sensors positioned to support bridge structures, wireless sensor networks have a range of other applications. Other uses include robotics, healthcare, environmental monitoring, and a variety of other areas of technology. It is feasible to use wireless sensor networks to monitor temperature and pressure, as well as leak detection and transmission line sabotage, among other applications. There are several different sorts of attacks that can be launched against wireless sensor networks. When it comes to information security in wireless sensor networks, cryptographic approaches play a critical role in ensuring the integrity of the data. Different types of cryptographic algorithms are now available for use in order to maintain network security. Specific difficulties must be addressed, though, and these are as follows: To strengthen the power of these algorithms, a unique hybrid encryption approach for monitoring energy transmission lines and increasing the security of wireless sensor networks is created in this study. While wireless sensor networks are being used to monitor transmission pipelines, the proposed hybrid encryption method ensures that data is transferred securely and promptly. The proposed method must follow three cryptographic principles: integrity, secrecy, and authenticity. All of the subtleties and underlying principles of the algorithm are explained in detail so that the algorithm can be put into action immediately after it is introduced. Hindawi 2022-07-07 /pmc/articles/PMC9283022/ /pubmed/35845910 http://dx.doi.org/10.1155/2022/7348488 Text en Copyright © 2022 N. Malmurugan et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Malmurugan, N. Nelson, S. Christalin Altuwairiqi, Majid Alyami, Hashem Gangodkar, Durgaprasad Abdul Zahra, Musaddak Maher Asakipaam, Simon Atuah Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning |
title | Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning |
title_full | Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning |
title_fullStr | Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning |
title_full_unstemmed | Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning |
title_short | Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning |
title_sort | hybrid encryption method for health monitoring systems based on machine learning |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9283022/ https://www.ncbi.nlm.nih.gov/pubmed/35845910 http://dx.doi.org/10.1155/2022/7348488 |
work_keys_str_mv | AT malmurugann hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning AT nelsonschristalin hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning AT altuwairiqimajid hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning AT alyamihashem hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning AT gangodkardurgaprasad hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning AT abdulzahramusaddakmaher hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning AT asakipaamsimonatuah hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning |