Secure data communication in IoT-based medical health systems using Frobenius rings

Publish Year: 1404
نوع سند: مقاله ژورنالی
زبان: English
View: 55

This Paper With 12 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJNAA-16-1_015

تاریخ نمایه سازی: 14 مرداد 1403

Abstract:

In this paper, we propose using Frobenius rings to increase the security of data communication in medical health systems based on the Internet of Things. Frobenius rings are algebraic structures widely studied in mathematics and have found applications in cryptography and coding theory. We show how Frobenius rings can be used to create efficient encryption and decryption algorithms that can secure communications in IoT-based medical health systems. IoT refers to internet communication between objects and equipment that are in our environment. These devices or objects connected to the Internet can be controlled and managed remotely using software on smartphones, tablets, computers, gadgets, smart watches, televisions, and any other object. Here, an attempt is made to create a safe bridge between the patient with simple medical measuring devices. The doctor who does not have direct access to him and can only receive the medical values measured by the patient through the Internet and give his definitive opinion about them, for example, the devices for measuring the patient's medical quantities can be simple mobile phone apps, and the doctor can be an artificial intelligence for medical measurements or a real doctor. We also present a case study with an example of medical factors such as heart rate, blood pressure, weight, blood sugar, and respiratory rate, which demonstrates the effectiveness of our proposed approach. Our results show that the use of Frobenius rings can significantly improve data communication security in IoT-based medical health systems without compromising system performance. In conclusion, our proposed approach provides a suitable solution for securing data communication in IoT-based medical health systems. The use of Frobenius rings can increase the confidentiality, integrity and availability of sensitive health information, thereby ensuring that patient's privacy is protected while enabling efficient management of their health data.

Authors

Vahid Azizi Nasrabadi

Department of Mathematics, Shahed University, Tehran, Iran

Hamid Haj Seyyed Javadi

Department of Computer Engineering, Shahed University, Tehran, Iran

Ahmad Moussavi

Department of Pure Mathematics, Tarbiat Modares, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • S. Akhbarifar, H. Haj Seyyed Javadi, A. Rahmani, and M. ...
  • J.L. Alperin, R.B. Bell, J.L. Alperin, and R.B. Bell, The ...
  • M. Anzani, H. Haj Seyyed Javadi, and A. Moeni, A ...
  • P. Asghari, A.M. Rahmani, and H. Haj Seyyed Javadi, Internet ...
  • J. Berstel, D. Perrin, and C. Reutenauer, Codes and Automata, ...
  • P. Charpin, A. Pott, and A. Winterhof, Finite Fields and ...
  • J. Ding, A. Miasnikov, and A. Ushakov, A linear attack ...
  • E. Di Angelantonio, S.N. Bhupathiraju, D. Wormser, P. Gao, S. ...
  • Q.F. Hassan, Internet of Things A to Z: Technologies and ...
  • J. Hoffstein, J.H. Silverman, W. Whyte, and Z. Zhang, A ...
  • B.P.U. Ivy, P. Mandiwa, and M. Kumar, A modified RSA ...
  • C. Jost, H. Lam, A. Maximov, and B. Smeets, Encryption ...
  • J. Kapoor and D. Thakur, Analysis of symmetric and asymmetric ...
  • A.V. Kshirsagar, M. Carpenter, H. Bang, S.B. Wyatt, and R.E. ...
  • T.Y. Lam, Frobenius and quasi-Frobenius rings, Lectures on Modules and ...
  • I. Mustafa, H. Mustafa, A.T. Azar, S. Aslam, S.M. Mohsin, ...
  • S. Padmanaban, M. Azimi Nasab, M.E. Shiri, H. Haj Seyyed ...
  • P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, ...
  • L. Qiao and Z. Gao, Joint active device and data ...
  • J. Rosenthal, The Hermann-Martin curve, New Directions and Applications in ...
  • N. Rahman and V. Shpilrain, A matrix action key exchange, ...
  • V. Rudnytskyi, O. Korchenko, N. Lada, R. Ziubina, L. Wieclaw, ...
  • N.H. Shah, D.T. Khan, A.A. Banu, and L.H. Shah, Symmetric ...
  • N. Solari Esfehani and H. Haj Seyyed Javadi, A survey ...
  • نمایش کامل مراجع