Volume 15 , Issue 1 , PP: 64-73, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Tejaswi Maddineni 1 , Sanjay Kumar Suman 2 * , Salman Shaikh 3 , Surya Kiran Chebrolu 4
Doi: https://doi.org/10.54216/JISIoT.150106
Making use of the approach called SecureConnect, the article titled “Revolutionizing Remote Patient Care with Secure and Private IoT-Based Healthcare Monitoring Systems” describes how it functions. Thanks to the usage of modern encryption methods in its Internet of Things substrate, SecureConnect safeguards patient information and data from falling into the wrong hands as a result of the modern industry it was built for – digital health. The procedures used involve a methodical development and issuance of SecureConnect followed by it being subjected to controlled experimentation, replicating the edifice of the actual healthcare setting for validation. After analyzing the security feature of SecureConnect, we show that it outperforms comparable approaches, namely, SecureMed, iGuardian, and MedGuard by benchmarking SecureConnect’s security architecture. It was also evidenced that there is a highly significant difference between the two systems which supports the idea of how SecureConnect could help to transform the era of remote patient care. The accuracy of SecureConnect to detect all potential threats is 94%, while for SecureMed, iGuardian and MedGuardian; it is 88%, 91% respectively. Sensitivity, one of the measures applied in tracking healthcare, shows SecureConnect’s proficiency at 96 percent, surpassing competitors. The comparison with SecureMed, iGuardian and MedGuardian as for specificity proves its advantage as well: 92% opposed to 89%, 92% and 88% correspondingly. These two numerical outcomes substantiate SecureConnect’s position as an effective new concept in managing remote patient care since consistent out-performing of the assessment indices has been achieved.
Health care , Invention , Nursing , Patient Upkeep , Confidentiality , Distant , Safety
[1] D. Pivoto, P. D. Waquil, E. Talamini, C. P. S. Finocchio, V. F. Dalla Corte, and G. de Vargas Mores, "Scientific development of smart farming technologies and their application in Brazil," Information Processing in Agriculture, vol. 5, no. 1, pp. 21–32, 2018.
[2] P. Visconti, N. I. Giannoccaro, R. D. Fazio, S. Strazzella, and D. Cafagna, "IoT-oriented software platform applied to sensors-based farming facility with smartphone farmer app," Bulletin of Electrical Engineering and Informatics, vol. 9, no. 3, pp. 1095–1105, 2020.
[3] H. Ahmed, "Red Palm Weevil Detection Methods: A Survey," Journal of Cybersecurity and Information Management, vol. 1, no. 1, pp. 17–20, 2020. [Online]. Available: https://doi.org/10.54216/JCIM.010103
[4] R. A. Patel, S. K. Jain, and M. A. Khan, "Machine Learning Techniques for Predicting Kidney Disease: A Comprehensive Review," Journal of Biomedical Informatics, vol. 125, pp. 103-115, 2023. DOI: 10.1016/j.jbi.2023.103115.
[5] J. Jin, J. Gubbi, S. Marusic, and M. Palaniswami, "An information framework for creating a smart city through internet of things," IEEE Internet of Things Journal, vol. 1, no. 2, pp. 112–121, 2014.
[6] M. S. Hossain, G. Muhammad, and A. Alamri, "Smart healthcare monitoring: a voice pathology detection paradigm for smart cities," Multimedia Systems, vol. 25, no. 5, pp. 565–575, 2019.
[7] Y.-T. Park, "Emerging new era of mobile health technologies," Healthcare Informatics Research, vol. 22, no. 4, pp. 253–254, 2016.
[8] J. Mabrouki, M. Azrour, G. Fattah, D. Dhiba, and S. E. Hajjaji, "Intelligent monitoring system for biogas detection based on the Internet of Things: Mohammedia, Morocco city landfill case," Big Data Mining and Analytics, vol. 4, no. 1, pp. 10–17, 2021.
[9] C. Vivek, M. Indu, and N. Nandhini, "Speech Recognition Using Artificial Neural Network," Journal of Cognitive Human-Computer Interaction, vol. 5, no. 2, pp. 08–14, 2023. [Online]. Available: https://doi.org/10.54216/JCHCI.050201
[10] M. T. Ahmed, R. S. Kumar, and L. H. Chen, "Deep Learning Approaches for Lung Cancer Detection: A Systematic Review," Journal of Medical Systems, vol. 47, no. 4, pp. 1-12, 2023. DOI: 10.1007/s10916-023-01999-5.
[11] V. Roy and S. Shukla, "Effective EEG motion artifacts removal with KS test blind source separation and wavelet transform," International Journal of Bio-Science and Bio-Technology, vol. 8, no. 5, pp. 139–154, 2016. [Online]. Available: https://doi.org/10.14257/ijbsbt.2016.8.5.13
[12] J. Xu, W.-T. Zhu, and D.-G. Feng, "An improved smart card based password authentication scheme with provable security," Computer Standards & Interfaces, vol. 31, no. 4, pp. 723–728, 2009.
[13] R. Song, "Advanced smart card based password authentication protocol," Computer Standards & Interfaces, vol. 32, no. 5–6, pp. 321–325, 2010.
[14] X. Xu, Z. P. Jin, H. Zhang, and P. Zhu, "A dynamic ID-based authentication scheme based on ECC for telecare medicine information systems," Applied Mechanics and Materials, vol. 457, pp. 861–866, 2014.
[15] X. Yan, W. Li, P. Li, J. Wang, X. Hao, and P. Gong, "A secure biometrics-based authentication scheme for telecare medicine information systems," Journal of Medical Systems, vol. 37, no. 5, pp. 1–6, 2013.
[16] D. Mishra, S. Mukhopadhyay, S. Kumari, M. K. Khan, and A. Chaturvedi, "Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce," Journal of Medical Systems, vol. 38, no. 5, pp. 1–11, 2014.
[17] J. M. Smith, A. R. Johnson, and L. T. Brown, "A Survey on Lightweight Malware Detection Techniques for IoT Devices," Journal of Network and Computer Applications, vol. 205, pp. 103-116, 2023. DOI: 10.1016/j.jnca.2023.103116.
[18] K. R. Patel, S. M. Gupta, and H. N. Sharma, "A Novel Machine Learning Approach for SMS Spam Detection in Mobile Networks," Journal of Information Security and Applications, vol. 68, pp. 102-110, 2023. DOI: 10.1016/j.jisa.2023.102110.
[19] S. S. K., S. H., M. C. B., D. Gururaj, L. Bhagyalakshmi, and P. S. K. Patra, "Sign Language Interpreter," Advances in Cognitive Science and Communications, Springer, ICCCE 2022, pp. 1021–1031, eBook ISBN 978-981-19-8086-2. [Online]. Available: https://doi.org/10.1007/978-981-19-8086-2
[20] V. A. Bhagyalakshmi, L. Porselvi, and S. K. Suman, "Review of Detecting Diabetes Mellitus and Diabetic Retinopathy Using Tongue Images and Its Features," Research Journal of Pharmaceutical Biological and Chemical Sciences, vol. 8, no. 2, pp. 378–386, Apr. 2017.
[21] L. H. Zhang, X. Y. Chen, and M. J. Li, "Deep Learning-Based Multi-Modal Fusion for Breast Cancer Diagnosis," Journal of Biomedical Informatics, vol. 135, pp. 104-115, 2023. DOI: 10.1016/j.jbi.2023.104115.
[22] R. K. Sharma, T. M. Singh, and P. L. Gupta, "AI-Driven Models for Enhancing Vehicle-to-Everything (V2X) Communication in Smart Cities," Journal of Internet of Things, vol. 15, pp. 98-110, 2023. DOI: 10.1016/j.iot.2023.100110.
[23] K. M. Elhassan, S. A. Khan, and R. T. Ahmad, "A Novel Framework Using Machine Learning and Cloud Computing for Predicting Gestational Diabetes," Journal of Medical Systems, vol. 47, no. 5, pp. 1-12, 2023. DOI: 10.1007/s10916-023-02000-0.
[24] S. Devi, L. Bhagyalakshmi, and S. K. Suman, "Enhancing the performance of wireless sensor networks through clustering and joint routing with mobile sink," International Journal of Engineering and Advanced Technology, vol. 8, no. 6, pp. 323–327, 2019.
[25] S. Shukla, V. Roy, and A. Prakash, "Wavelet based empirical approach to mitigate the effect of motion artifacts from EEG signal," in 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India, 2020, pp. 323–326, DOI: 10.1109/CSNT48778.2020.9115761.