International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2 | Views: 290 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper | Computer Science | Zimbabwe | Volume 12 Issue 6, June 2023 | Popularity: 5.2 / 10


     

The Development of an AI-Based Network Security Algorithm for an IoT Healthcare Platform

Keith Lungile Ncube, Mainford Mutandavari


Abstract: The Internet of things is made up of all IPv6-capable hardware that is linked to and communicates with one another via the Internet. Our civilization uses this common phenomenon on a daily basis. Two of the main obstacles in large-scale IoT installations are data privacy and security. This is especially true for important applications like Industry 4.0 and e-healthcare. Securing the IoT-cloud ecosystem for healthcare data is one of the hardest and tough issues of today. The IoT Cloud infrastructure is particularly susceptible to flaws and attacks because of the numerous sensors utilized to produce enormous amounts of data. This can make the network less secure. The finest technology for healthcare applications is artificial intelligence (AI), as it provides the best method for enhancing data security and reliability. The IoT cloud framework already uses a number of AI-based security mechanisms. Significant flaws in existing algorithms include complicated algorithm design and ineffective data processing. Additionally, they are unsuitable for analyzing unstructured data, which raises the price of IoT sensors. In order to improve the security and privacy of healthcare data stored in IoT clouds, this study introduces Probabilistic Super Learning (PSL) and Random Hashing (RH), two AI-based intelligence feature learning mechanisms. This research also employs the suggested learning approach to reduce the price of IoT sensors. The initial assault is discovered using this training model. The attack's properties are then changed in order to learn how attacks operate. Additionally, the data matrix's hash values are used to generate the random key. Elliptic Curve Cryptography is linked with this method for data security. The upgraded ECC-RH technique uses randomly generated hash keys to encrypt and decode data. Performance evaluation compares and validates the outcomes of various methodologies. A secure network layer is provided for IoT apps connected across 5G networks and beyond in the context of the final analysis of bio-inspired algorithms.


Keywords: Cloud Computing, Healthcare System, 5th Generation Network; Artificial Intelligence; Biological; Internet of Things (IoT); Network layer; Security; Wireless Sensor Networks


Edition: Volume 12 Issue 6, June 2023


Pages: 297 - 306



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Keith Lungile Ncube, Mainford Mutandavari, "The Development of an AI-Based Network Security Algorithm for an IoT Healthcare Platform", International Journal of Science and Research (IJSR), Volume 12 Issue 6, June 2023, pp. 297-306, https://www.ijsr.net/getabstract.php?paperid=SR23602005041



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science, India, Volume 11 Issue 7, July 2022

Pages: 1564 - 1568

Performance Evaluation of Intrusion Detection System for Smart Devices using Neural Network Classifiers

Gopala B, Hanumanthappa M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science, China, Volume 12 Issue 3, March 2023

Pages: 713 - 720

Multi-Job Scheduling and Optimization Model for Cloud Computing

Dzikunu Andrews Dodzi Kobla, Kenneth Owusu, Amos Peprah, Koukoyi Ebenezer

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science, India, Volume 12 Issue 8, August 2023

Pages: 2125 - 2131

Enhancing Cloud Security: A Novel Approach to Intrusion Detection Using Feed Forward Neural Networks and Optimization Algorithm

Dr. N. Rajkumar, Dr. S. Megala

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science, India, Volume 7 Issue 11, November 2018

Pages: 2013 - 2018

Comprehensive Review of Diabetic Retinopathy: Epidemiology, Risk Factors, Screening, Treatment, and Long-Term Outcomes

Manjunatha H. R., Shashidhara B.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science, United States of America, Volume 13 Issue 11, November 2024

Pages: 1306 - 1310

The Evolution of Healthcare EDI: Unlocking the Potential of Cloud-Based Solutions

Jaganmohan S. Kankipati

Share this Article



Top