Reference Hub36
Security-Aware Routing on Wireless Communication for E-Health Records Monitoring Using Machine Learning

Security-Aware Routing on Wireless Communication for E-Health Records Monitoring Using Machine Learning

Sudhakar Sengan, Osamah Ibrahim Khalaf, Ganga Rama Koteswara Rao, Dilip Kumar Sharma, Amarendra K., Abdulsattar Abdullah Hamad
Copyright: © 2022 |Volume: 11 |Issue: 3 |Pages: 10
ISSN: 2160-9551|EISSN: 2160-956X|EISBN13: 9781683182597|DOI: 10.4018/IJRQEH.289176
Cite Article Cite Article

MLA

Sengan, Sudhakar, et al. "Security-Aware Routing on Wireless Communication for E-Health Records Monitoring Using Machine Learning." IJRQEH vol.11, no.3 2022: pp.1-10. http://doi.org/10.4018/IJRQEH.289176

APA

Sengan, S., Khalaf, O. I., Rao, G. R., Sharma, D. K., Amarendra K., & Hamad, A. A. (2022). Security-Aware Routing on Wireless Communication for E-Health Records Monitoring Using Machine Learning. International Journal of Reliable and Quality E-Healthcare (IJRQEH), 11(3), 1-10. http://doi.org/10.4018/IJRQEH.289176

Chicago

Sengan, Sudhakar, et al. "Security-Aware Routing on Wireless Communication for E-Health Records Monitoring Using Machine Learning," International Journal of Reliable and Quality E-Healthcare (IJRQEH) 11, no.3: 1-10. http://doi.org/10.4018/IJRQEH.289176

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

An ad hoc structure is self-organizing, self-forming, and system-free, with no nearby associations. One of the significant limits we must focus on in frameworks is leading. As for directions, we can send the packet or communications from the sender to the recipient node. AODV Routing Protocol, a short display that will make the tutorial available on demand. Machine Learning (ML) based IDS must be integrated and perfected to support the detection of vulnerabilities and enable frameworks to make intrusion decisions while ML is about their mobile context. This paper considers the combined effect of stooped difficulties along the way, problems at the medium get-right-of-area to impact layer, or pack disasters triggered by the remote control going off route. The AODV as the Routing MANET protocol is used in this work, and the process is designed and evaluated using Support Vector Machine (SVM) to detect the malicious network nodes.