A Novel Approach to use Deep Dyna Q Learning for Enhancing Selection and Performace of Encryption and Hashing Techniques in Remote Healthcare Environment

Publish Year: 1404
نوع سند: مقاله ژورنالی
زبان: English
View: 14

This Paper With 13 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJE-38-1_007

تاریخ نمایه سازی: 2 مهر 1403

Abstract:

This paper introduces a novel approach that adeptly navigates this trade-off, significantly enhancing the deployment efficiency of remote healthcare systems. The existing methodologies in remote healthcare networks typically face challenges in balancing robust security measures with the need for high-speed data transmission. This model meticulously selects from a pool of encryption methods — AES, RSA, ECC, DSA, Blowfish, TwoFish — and hashing methods — Argon۲, SHA۱, SHA۲۵۶, SHA۵۱۲, MD۵, Bcrypt — to tailor a solution that upholds high security while enhancing speed. The rationale behind employing GCN lies in its ability to efficiently handle the complex, non-linear relationships among different encryption and hashing techniques, while Deep Dyna Q Learning dynamically adjusts hyperparameters to optimize for speed without compromising security.The results were compelling, showcasing an ۸.۵% improvement in energy efficiency, a ۴.۹% increase in speed, an ۸.۳% rise in throughput, a ۵.۹% enhancement in packet delivery ratio, and a ۳.۹% boost in communication consistency compared to existing methods. Notably, this enhanced performance was maintained even under various security threats, including Sybil, masquerading, spoofing, and spying attacks.

Authors

G. R. Bhagwatrao

School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India

R. Lakshmanan

School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Condry MW, Quan XI. Remote patient monitoring technologies and markets. ...
  • Al-Nbhany WA, Zahary AT, Al-Shargabi AA. Blockchain-IoT healthcare applications and ...
  • Liu J, Jiang W, Sun R, Bashir AK, Alshehri MD, ...
  • Shaikh E, Al-Ali A-R, Muhammad S, Mohammad N, Aloul F. ...
  • Mahmood K, Obaidat MS, Ghaffar Z, Alzahrani BA, Shamshad S, ...
  • Baucas MJ, Spachos P, Plataniotis KN. Federated learning and blockchain-enabled ...
  • Zaidan A, AlSattar HA, Qahtan S, Deveci M, Pamucar D, ...
  • Soni P, Pradhan J, Pal AK, Islam SH. Cybersecurity attack-resilience ...
  • Deng L, Wang B, Gao Y, Chen Z, Li S. ...
  • Lakhan A, Mohammed MA, Nedoma J, Martinek R, Tiwari P, ...
  • Das S, Namasudra S, Deb S, Ger PM, Crespo RG. ...
  • Cristina S, Despotovic V, Pérez-Rodríguez R, Aleksic S. Audio-and Video-Based ...
  • Xu S, Ning J, Li Y, Zhang Y, Xu G, ...
  • Baucas MJ, Spachos P. Improving Remote Patient Monitoring Systems Using ...
  • Yang C-L, Tampubolon H, Setyoko A, Hua K-L, Tanveer M, ...
  • Han B, Jhaveri RH, Wang H, Qiao D, Du J. ...
  • Ali M, Sadeghi M-R, Liu X, Vasilakos AV. Anonymous aggregate ...
  • Lakhan A, Mohammed MA, Nedoma J, Martinek R, Tiwari P, ...
  • Chen X, He D, Khan MK, Luo M, Peng C. ...
  • Shihab S, AlTawy R. Lightweight authentication scheme for healthcare with ...
  • Gupta M, Kumar BS. Lightweight secure session key protection, mutual ...
  • Bian M, He G, Feng G, Zhang X, Ren Y. ...
  • Irshad A, Mallah GA, Bilal M, Chaudhry SA, Shafiq M, ...
  • Aljohani TH, Zhang N. Secure, ID privacy and inference threat ...
  • Puneeth R, Parthasarathy G. Security and Data Privacy of Medical ...
  • Dhingra S, Raut R, Naik K, Muduli K. Blockchain technology ...
  • Singh A, Chatterjee K, Singh AK, Kumar N. Secure smart ...
  • Puneeth RP, Parthasarathy G. Blockchain-Based Framework for Privacy Preservation and ...
  • Ramzan S, Aqdus A, Ravi V, Koundal D, Amin R, ...
  • Wazid M, Thapliyal S, Singh DP, Das AK, Shetty S. ...
  • Muis A, Sunardi S, Yudhana A. Cnn-based approach for enhancing ...
  • Fallahi A, Pourghazi A, Mokhtari H. A Multi-product Humanitarian Supply ...
  • Bhagwatrao GR, Lakshmanan R. Automated patient activity identification in cyber-physical ...
  • Nilchi AN, Vafaei A, Hamidi H, editors. Evaluation of security ...
  • Hamidi H, Vafaei A, Monadjemi A. Algorithm based fault tolerant ...
  • نمایش کامل مراجع