Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning.
N MalmuruganS Christalin NelsonMajid AltuwairiqiHashem AlyamiDurgaprasad GangodkarMusaddak Maher Abdul ZahraAsakipaam Simon AtuahPublished in: Computational intelligence and neuroscience (2022)
Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from one another, it can be used to monitor physical and environmental conditions in the surrounding environment. In addition to the built-in sensor on the exterior of a pipeline and sensors positioned to support bridge structures, wireless sensor networks have a range of other applications. Other uses include robotics, healthcare, environmental monitoring, and a variety of other areas of technology. It is feasible to use wireless sensor networks to monitor temperature and pressure, as well as leak detection and transmission line sabotage, among other applications. There are several different sorts of attacks that can be launched against wireless sensor networks. When it comes to information security in wireless sensor networks, cryptographic approaches play a critical role in ensuring the integrity of the data. Different types of cryptographic algorithms are now available for use in order to maintain network security. Specific difficulties must be addressed, though, and these are as follows: To strengthen the power of these algorithms, a unique hybrid encryption approach for monitoring energy transmission lines and increasing the security of wireless sensor networks is created in this study. While wireless sensor networks are being used to monitor transmission pipelines, the proposed hybrid encryption method ensures that data is transferred securely and promptly. The proposed method must follow three cryptographic principles: integrity, secrecy, and authenticity. All of the subtleties and underlying principles of the algorithm are explained in detail so that the algorithm can be put into action immediately after it is introduced.