Purpose The purpose of this paper is to identify coronavirus contact using internet of things. The disease is said to be highly contagious with the contact of infected persons. Feared to be air-borne, droplets of body fluids can transmit the disease in a matter of hours. The predominant symptoms of the COVID-19 are high fever, cough, breathing problem, etc. Recent studies have demonstrated the evolution of the disease to hide its symptoms. As it is highly transmissible, this disease might spread at an exponential rate costing the lives of thousands of people. The chain of transmission has to be detected with utmost priority through early detection and isolation of infected people. Automated internet of things (IoT) devices can be used in design and implementation of a prediction scheme for reporting the health-care risks of the patients with various parameters such as temperature, humidity and blood pressure. Design/methodology/approach IoT is a configuration of multiple autonomous and embedded wireless devices for serving a purpose. Every object possesses an individual identity and will serve to register critical events as entries for future learning and decisions. IoT plays an inevitable role in medical industries, detection of vital signs of diseases and monitoring. Among other life-threatening diseases, a new pandemic is on rise among world nations. COVID-19, a novel severe acute respiratory syndrome virus originated from animals in December 2019 and is becoming a serious menace to Governments, despite serious measures of lockdowns. Findings In this paper, the authors defined an architecture of an IoT system to predict the Covid-19 disease by getting the data from the human through sensors and send the data to the doctor using mobile, computer, etc. The main goal is early health surveillance by predicting COVID-19. Accordingly, the authors are able to identify both symptomatic and asymptomatic patients, which will help in the early prediction of disease. Originality/value Using the proposed method, the authors can save the time of both patient and doctor by ensuring timely medical treatment and contribute toward breaking the transmission chain. In so doing, the method also contributes toward avoiding unnecessary expenses and saving human lives.
Group key management in multicast networks plays a crucial role in data communication environment. Also, key management deals with distribution of keys among group members and maintaining the keys. The lack of security services, communication overhead, computation overhead, etc. Enables us to concentrate on creating new innovative ideas. A key distribution algorithm in the reviewed protocols does not provide much security in group communication networks. The contribution of this research is to investigate all the available key management schemes and to design the secure and efficient key management scheme in multicast network for achieving a secure communication between the group members. The proposed scheme, dynamic architecture and performance analysis of secure and efficient key management scheme, provides a secure variable UID-based key management scheme which protects non-group members from the access of data and generation of static group key which reduces computation cost at any change in the multicast network. The periodic renewal of group key using proactive secret sharing scheme provides greater security during communication. The proposed authentication process ensures data integrity and confidentiality during communication and the encryption mechanism used in dynamic architecture and performance analysis of secure and efficient key management scheme completely eliminates the communication, computation overhead, and network traffics. The analysis shows that the proposed key management scheme comprises of the most reliable methods for key generations and key distributions and provides better performance in terms of security requirements and other services.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.