| Literature DB >> 35035816 |
J Divakaran1, S K Prashanth2, Gouse Baig Mohammad3, Dr Shitharth4, Sachi Nandan Mohanty3, C Arvind5, K Srihari6, Yasir Abdullah R7, Venkatesa Prabhu Sundramurthy8.
Abstract
Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.Entities:
Mesh:
Year: 2022 PMID: 35035816 PMCID: PMC8759874 DOI: 10.1155/2022/2500377
Source DB: PubMed Journal: J Healthc Eng ISSN: 2040-2295 Impact factor: 2.682
Figure 1Simplified 5G network architecture with SDN for medical datasets.
Figure 2Healthcare security (initial authentication).
Figure 3Flow of authentication for medical data.
Figure 4Communication overhead in the medical database.
Figure 5Space complexity for medical databases.
Figure 6Handover latency in patients' history.
Figure 7Executed handover security in the medical Mongo database.