Sign In to Follow Application
View All Documents & Correspondence

Improved Authentication And Computation Of Medical Data Transmission In The Secure Iot Using Hyperelliptic Curve Cryptography.

Abstract: ABSTRACT Our Invention “Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography” is a Versatile client are expanding dramatically to take on pervasive administrations presented by different areas. This has stood out for a safe correspondence structure to get to e-wellbeing information on cell phones. The wearable sensor gadget is appended to the patient's body which screens the pulse, internal heat level, serum cholesterol, glucose level, and so forth in the proposed secure structure, first, the assignment begins with the patient confirmation, after that the sensors gadget connected to the patient is initiated and the sensor upsides of the patient are sent to the cloud server. The patient's biometrics data has been added as a boundary notwithstanding the client name and secret key. The validation conspire is begat with the SHA-512 calculation that guarantees trustworthiness. To safely send the sensor data, the technique follows two sorts of encryption: Substitution-Ceaser figure and worked on Elliptical Curve Cryptography (IECC). Though in further developed ECC, an extra key (secret key) is created to improve the framework's security. Along these lines, the complexity of the two stages is increased. The computational expense of the plan in the proposed system is 4H + Ec + Dc which is not exactly the current plans. The normal relationship coefficient esteem is around 0.045 which is near zero shows the strength of the calculation. The got encryption and decoding time are 1.032 µs and 1.004µs individually. The general presentation is investigated by contrasting the proposed further developed ECC and existing Rivest–Shamir–Adleman (RSA)and ECC calculations

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
15 December 2021
Publication Number
05/2022
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
dr.bksarkar2003@yahoo.in
Parent Application

Applicants

1. Dr. Kaushik Sekaran (Associate Professor)
Department of Computer Science & Engineering, Mahatma Gandhi Institute of Technology Kokapet (Village), Gandipet (Mandal), Chaitanya Bharathi (PO) Ranga Reddy Dist. HYDERABAD - 500075, TELANGANA. Mobile: +91-8015628957.
2. Dr. K. Mariyappan (Assistant Professor)
Department of computer science and engineering, Faculty of Engineering and Technology, Jain deemed to be university Kanakapura, Bangalore, Pincode: 560082.
3. Dr. Prasanna Seshapu
Department of Electronics and Instrumentation engineering, Vignan Institute of technology and Science, Deshmukhi, Hyderabad, Pincode: 508284.
4. Dr. B.K. Sarkar (International Patent Motivational Speaker)
GEH Research , Bhugaon , Pune- 410021, MH, India.
5. Dr. Reena Singh (CEO- GEH Research )
GEH Research , Bhugaon , Pune- 410021, MH, India.

Inventors

1. Dr. Kaushik Sekaran (Associate Professor)
Department of Computer Science & Engineering, Mahatma Gandhi Institute of Technology Kokapet (Village), Gandipet (Mandal), Chaitanya Bharathi (PO) Ranga Reddy Dist. HYDERABAD - 500075, TELANGANA. Mobile: +91-8015628957.
2. Dr. K. Mariyappan (Assistant Professor)
Department of computer science and engineering, Faculty of Engineering and Technology, Jain deemed to be university Kanakapura, Bangalore, Pincode: 560082.
3. Dr. Prasanna Seshapu
Department of Electronics and Instrumentation engineering, Vignan Institute of technology and Science, Deshmukhi, Hyderabad, Pincode: 508284.
4. Dr. B.K. Sarkar (International Patent Motivational Speaker)
GEH Research , Bhugaon , Pune- 410021, MH, India.
5. Dr. Reena Singh (CEO- GEH Research )
GEH Research , Bhugaon , Pune- 410021, MH, India.

Specification

Claims:WE CLAIMS

1) Our Invention “Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography” is a Versatile client are expanding dramatically to take on pervasive administrations presented by different areas. This has stood out for a safe correspondence structure to get to e-wellbeing information on cell phones. The wearable sensor gadget is appended to the patient's body which screens the pulse, internal heat level, serum cholesterol, glucose level, and so forth in the proposed secure structure, first, the assignment begins with the patient confirmation, after that the sensors gadget connected to the patient is initiated and the sensor upsides of the patient are sent to the cloud server. The patient's biometrics data has been added as a boundary notwithstanding the client name and secret key. The validation conspire is begat with the SHA-512 calculation that guarantees trustworthiness. To safely send the sensor data, the technique follows two sorts of encryption: Substitution-Ceaser figure and worked on Elliptical Curve Cryptography (IECC). Though in further developed ECC, an extra key (secret key) is created to improve the framework's security. Along these lines, the complexity of the two stages is increased. The computational expense of the plan in the proposed system is 4H + Ec + Dc which is not exactly the current plans. The normal relationship coefficient esteem is around 0.045 which is near zero shows the strength of the calculation. The got encryption and decoding time are 1.032 µs and 1.004µs individually. The general presentation is investigated by contrasting the proposed further developed ECC and existing Rivest–Shamir–Adleman (RSA)and ECC calculations.
2) According to claim1# the invention is to provide a “Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography” is a Versatile client are expanding dramatically to take on pervasive administrations presented by different areas.
3) According to claim1,2,3# the invention is to provide a has stood out for a safe correspondence structure to get to e-wellbeing information on cell phones and also The wearable sensor gadget is appended to the patient's body which screens the pulse, internal heat level, serum cholesterol, glucose level, and so forth in the proposed secure structure, first, the assignment begins with the patient confirmation, after that the sensors gadget connected to the patient is initiated.
4) According to claim1,2,3# the invention is to provide a sensor upsides of the patient are sent to the cloud server and also The patient's biometrics data has been added as a boundary notwithstanding the client name and secret key. The validation conspire is begat with the SHA-512 calculation that guarantees trustworthiness.
5) According to claim1,2,3,4# the invention is to provide a safely send the sensor data, the technique follows two sorts of encryption: Substitution-Ceaser figure and worked on Elliptical Curve Cryptography (IECC). Though in further developed ECC, an extra key (secret key) is created to improve the framework's security.
6) According to claim1,2,3,4# the invention is to provide a these lines, the complexity of the two stages is increased. The computational expense of the plan in the proposed system is 4H + Ec + Dc which is not exactly the current plans and the normal relationship coefficient esteem is around 0.045 which is near zero shows the strength of the calculation.
7) According to claim1,2,3,4,5# the invention is to provide a got encryption and decoding time are 1.032 µs and 1.004µs individually. The general presentation is investigated by contrasting the proposed further developed ECC and existing Rivest–Shamir–Adleman (RSA)and ECC calculations.
, Description:DESCRIPTION OF THE INVENTION
To start with, the sensor esteems from the IoT sensor gadget are encoded using straightforward replacement figure. The replacement figure is essentially an encryption method by which plain message is traded with ciphertext in cryptography. In the proposed method, plain replacement figure is used. The replacement of single letters is completed freely. Straightforward replacement can be exhibited by composing the letter set in a specific request to connote the replacement.

This is marked as a replacement letter set. The code letters in order may be turned around or moved or, in all likelihood mixed in an exceptionally multifaceted manner and is then called a blended or disturbed letters in order. After replacement figure is played out, the encoded text is again encoded using Caesar figure. The result of replacement figure is given to Caesar figure. It is a kind of replacement figure in which each letter in the plain text is moved to a specific spot in the letter set.

For example, with a shift of one, a would be traded with B, B would become C, etc. In Caesar figure, a key is utilized to move the message. Here, the key is just the quantity of characters by which the code letter set is moved as displayed in condition. Subsequent to performing replacement and Caesar figure, the encoded data is scrambled using the further developed ECC calculation and shipped off the cloud server.

Documents

Application Documents

# Name Date
1 202141058582-FORM 1 [15-12-2021(online)].pdf 2021-12-15
2 202141058582-DRAWINGS [15-12-2021(online)].pdf 2021-12-15
3 202141058582-COMPLETE SPECIFICATION [15-12-2021(online)].pdf 2021-12-15
4 202141058582-FORM-9 [04-01-2022(online)].pdf 2022-01-04
5 202141058582-FORM-26 [04-01-2022(online)].pdf 2022-01-04
6 202141058582-Proof of Right [05-09-2024(online)].pdf 2024-09-05