Infrastructures (Feb 2023)

A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0

  • Rajesh Natarajan,
  • Gururaj Harinahallo Lokesh,
  • Francesco Flammini,
  • Anitha Premkumar,
  • Vinoth Kumar Venkatesan,
  • Shashi Kant Gupta

DOI
https://doi.org/10.3390/infrastructures8020022
Journal volume & issue
Vol. 8, no. 2
p. 22

Abstract

Read online

Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method of connecting medical equipment and the software that operates on it to the computer networks that are used in healthcare 5.0. The rapid development of smart medical devices on IoMT platforms has led to the adoption of major technologies in the modernization of healthcare procedures, the administration of diseases, and the improvement in patient treatment standards. The IoMT offers a variety of cloud-based applications, including data exchange, data screening, patient surveillance, information collection and analysis, and hygienic hospital attention. Wireless sensor networks (WSNs) are responsible for both the gathering and delivery of data. Method: The safety of patients and their right to privacy are the top priorities in the healthcare sector. Anyone may see and modify the patient’s health information because the data from these smart gadgets are sent wirelessly through the airways. Hence, we developed a unique elliptic curve cryptography-based energy-efficient routing protocol (ECC-EERP) to provide a high level of security and energy efficient system for healthcare 5.0. Data can be encrypted using the key-based method ECC-EERP. It employs pairs of public and private keys to decrypt and encrypts web traffic and reducse the amount of energy needed by a WSN in aggregate. Result and Discussion: The efficiency of the suggested method was evaluated in comparison with that of a variety of existing methods. The suggested method was evaluated with the use of many parameters such as security, encryption throughput, energy efficiency, network lifetime, communication overload, computation time, and implementation cost. The results showed that the proposed technique provides enhanced security and energy efficiency.

Keywords