2017
DOI: 10.5120/ijca2017913548
|View full text |Cite
|
Sign up to set email alerts
|

Data Security on Patient Monitoring for Future Healthcare Application

Abstract: Many researches in the past ignore the need to encrypt the data for security perspective. However in recent years, researchers have given top priority for data security for smooth transmission of data over network by incorporating many encryption strategies along with actual data. In this paper, we consciously discuss the need to secure the data for patient monitoring using various algorithms and plug out the one which is best suit for inbound data security for future healthcare application. As the fields of I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…By using CLOSA -IPv6 based PIN algorithm Vinoth Kumar et. al., [10] imagine the use of object identification in healthcare sector to monitor the health conditions of patient and identify patient. Each type of disease diagnosis is surely monitored because separate sensors are connected to the patient's body.…”
Section: Literature Surveymentioning
confidence: 99%
“…By using CLOSA -IPv6 based PIN algorithm Vinoth Kumar et. al., [10] imagine the use of object identification in healthcare sector to monitor the health conditions of patient and identify patient. Each type of disease diagnosis is surely monitored because separate sensors are connected to the patient's body.…”
Section: Literature Surveymentioning
confidence: 99%
“…The application of the SPECK/SIMON cipher is suggested in [4], where the authors proposed faster algorithms implementation using the architecture of the 64bit Intel AVX2 microcontroller. Comparison of the suitability of the use of cryptography algorithms in the area of healthcare is in [5]. The SPECK/SIMON encryption algorithm is covered in several publications.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it is impossible to remember the order of the last used encryption key. Encryption key selection is described in relationship (5).…”
Section: +1 +2 +3mentioning
confidence: 99%
See 1 more Smart Citation