Abstract
The Internet of Medical Things (IoMT) is a revolutionary technique for integrating the IT infrastructure of healthcare organisations with medical apps and equipment. Rapid advancements in this approach in recent years have resulted in game-changing improvements in the healthcare system, illness management, and patient care standards. Both achievements have been made possible by the Internet of Medical Things. People can use the IoMT to access a variety of cloud-based services, including file sharing, patient monitoring, data collection, information gathering, and hospital cleaning. Wireless sensor networks (WSNs), which collect and transmit data, are critical to system operation. In the healthcare system, patients’ privacy and security must be preserved at all costs. Wireless data transmission from these cutting-edge devices may have been intercepted and manipulated without consent. The hybrid and improved (Elliptic Curve Cryptography ECC) Energy-Efficient Routing Protocol (EERP) method, which is based on the elliptic curve encryption protocol, may provide enough protection for sensitive information. ECC-EERP uses pairs of public and private keys known only to each other to decode and encrypt data delivered across a network. As a result, the energy needed to sustain WSNs has dropped. To assess the efficacy of the recommended plan, we did an extensive study and compared our findings to the many other viable courses of action. We did the analysis while taking a variety of aspects into account. The study's findings and conclusion all point to the strategy's ability to significantly increase energy efficiency and security. ECC-EERP is a novel encryption method that increases data security while consuming less energy. Because of its efficacy in improving the whole healthcare system, this strategy has a lot of potential for the future of patient care, illness management, and healthcare delivery in general.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Journal of Cybersecurity and Information Management
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.