Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Jan 7:2022:2500377.
doi: 10.1155/2022/2500377. eCollection 2022.

Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications

Affiliations

Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications

J Divakaran et al. J Healthc Eng. .

Abstract

Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.

PubMed Disclaimer

Conflict of interest statement

There are no conflicts of interest.

Figures

Figure 1
Figure 1
Simplified 5G network architecture with SDN for medical datasets.
Figure 2
Figure 2
Healthcare security (initial authentication).
Figure 3
Figure 3
Flow of authentication for medical data.
Figure 4
Figure 4
Communication overhead in the medical database.
Figure 5
Figure 5
Space complexity for medical databases.
Figure 6
Figure 6
Handover latency in patients' history.
Figure 7
Figure 7
Executed handover security in the medical Mongo database.

References

    1. Aslam M. M., Du L., Zhang X., Chen Y., Ahmed Z., Qureshi B. Sixth generation (6G) cognitive radio network (CRN) application, requirements, security issues, and key challenges. Wireless Communications and Mobile Computing . 2021;2021:18. doi: 10.1155/2021/1331428.1331428 - DOI
    1. Wang Q., Cheng C., Zuo L. Analysis and improvement of a NTRU-based handover authentication scheme. IEEE Communications Letters . 2019;23(10):1692–1695. doi: 10.1109/lcomm.2019.2927204. - DOI
    1. Mohsan S. A. H., Amjad H. A comprehensive survey on hybrid wireless networks: practical considerations, challenges, applications and research directions. Optical and Quantum Electronics . 2021;53(9):1–56. doi: 10.1007/s11082-021-03141-1. - DOI
    1. Ranaweera P., Jurcut A. D., Liyanage M. Survey on multi-access edge computing security and privacy. IEEE Communications Surveys & Tutorials . 2021;23(2):1078–1124. doi: 10.1109/comst.2021.3062546. - DOI
    1. Zeng Y., Guang H., Li G. Attribute-based anonymous handover authentication protocol for wireless networks. Security and Communication Networks . 2018;2018:9. doi: 10.1155/2018/8470949.8470949 - DOI