Cargando…

Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning

Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from...

Descripción completa

Detalles Bibliográficos
Autores principales: Malmurugan, N., Nelson, S. Christalin, Altuwairiqi, Majid, Alyami, Hashem, Gangodkar, Durgaprasad, Abdul Zahra, Musaddak Maher, Asakipaam, Simon Atuah
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9283022/
https://www.ncbi.nlm.nih.gov/pubmed/35845910
http://dx.doi.org/10.1155/2022/7348488
_version_ 1784747242625695744
author Malmurugan, N.
Nelson, S. Christalin
Altuwairiqi, Majid
Alyami, Hashem
Gangodkar, Durgaprasad
Abdul Zahra, Musaddak Maher
Asakipaam, Simon Atuah
author_facet Malmurugan, N.
Nelson, S. Christalin
Altuwairiqi, Majid
Alyami, Hashem
Gangodkar, Durgaprasad
Abdul Zahra, Musaddak Maher
Asakipaam, Simon Atuah
author_sort Malmurugan, N.
collection PubMed
description Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from one another, it can be used to monitor physical and environmental conditions in the surrounding environment. In addition to the built-in sensor on the exterior of a pipeline and sensors positioned to support bridge structures, wireless sensor networks have a range of other applications. Other uses include robotics, healthcare, environmental monitoring, and a variety of other areas of technology. It is feasible to use wireless sensor networks to monitor temperature and pressure, as well as leak detection and transmission line sabotage, among other applications. There are several different sorts of attacks that can be launched against wireless sensor networks. When it comes to information security in wireless sensor networks, cryptographic approaches play a critical role in ensuring the integrity of the data. Different types of cryptographic algorithms are now available for use in order to maintain network security. Specific difficulties must be addressed, though, and these are as follows: To strengthen the power of these algorithms, a unique hybrid encryption approach for monitoring energy transmission lines and increasing the security of wireless sensor networks is created in this study. While wireless sensor networks are being used to monitor transmission pipelines, the proposed hybrid encryption method ensures that data is transferred securely and promptly. The proposed method must follow three cryptographic principles: integrity, secrecy, and authenticity. All of the subtleties and underlying principles of the algorithm are explained in detail so that the algorithm can be put into action immediately after it is introduced.
format Online
Article
Text
id pubmed-9283022
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-92830222022-07-15 Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning Malmurugan, N. Nelson, S. Christalin Altuwairiqi, Majid Alyami, Hashem Gangodkar, Durgaprasad Abdul Zahra, Musaddak Maher Asakipaam, Simon Atuah Comput Intell Neurosci Research Article Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from one another, it can be used to monitor physical and environmental conditions in the surrounding environment. In addition to the built-in sensor on the exterior of a pipeline and sensors positioned to support bridge structures, wireless sensor networks have a range of other applications. Other uses include robotics, healthcare, environmental monitoring, and a variety of other areas of technology. It is feasible to use wireless sensor networks to monitor temperature and pressure, as well as leak detection and transmission line sabotage, among other applications. There are several different sorts of attacks that can be launched against wireless sensor networks. When it comes to information security in wireless sensor networks, cryptographic approaches play a critical role in ensuring the integrity of the data. Different types of cryptographic algorithms are now available for use in order to maintain network security. Specific difficulties must be addressed, though, and these are as follows: To strengthen the power of these algorithms, a unique hybrid encryption approach for monitoring energy transmission lines and increasing the security of wireless sensor networks is created in this study. While wireless sensor networks are being used to monitor transmission pipelines, the proposed hybrid encryption method ensures that data is transferred securely and promptly. The proposed method must follow three cryptographic principles: integrity, secrecy, and authenticity. All of the subtleties and underlying principles of the algorithm are explained in detail so that the algorithm can be put into action immediately after it is introduced. Hindawi 2022-07-07 /pmc/articles/PMC9283022/ /pubmed/35845910 http://dx.doi.org/10.1155/2022/7348488 Text en Copyright © 2022 N. Malmurugan et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Malmurugan, N.
Nelson, S. Christalin
Altuwairiqi, Majid
Alyami, Hashem
Gangodkar, Durgaprasad
Abdul Zahra, Musaddak Maher
Asakipaam, Simon Atuah
Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning
title Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning
title_full Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning
title_fullStr Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning
title_full_unstemmed Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning
title_short Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning
title_sort hybrid encryption method for health monitoring systems based on machine learning
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9283022/
https://www.ncbi.nlm.nih.gov/pubmed/35845910
http://dx.doi.org/10.1155/2022/7348488
work_keys_str_mv AT malmurugann hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning
AT nelsonschristalin hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning
AT altuwairiqimajid hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning
AT alyamihashem hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning
AT gangodkardurgaprasad hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning
AT abdulzahramusaddakmaher hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning
AT asakipaamsimonatuah hybridencryptionmethodforhealthmonitoringsystemsbasedonmachinelearning