Data Infrastructures

A special issue of Infrastructures (ISSN 2412-3811).

Deadline for manuscript submissions: closed (31 May 2023) | Viewed by 3564

Special Issue Editors


E-Mail Website
Guest Editor
School of Engineering, Design, and Technology, Division of Product Realization, Mälardalen University, 72123 Eskilstuna, Sweden
Interests: resilient cyber-physical systems; homeland security; performability modeling; safe autonomy; intelligent transportation
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Information Technology, Manipal Institute of Technology, Bangalore 560064, India
Interests: resilient cyber-physical systems; homeland security; performability modeling; safe autonomy; intelligent transportation

Special Issue Information

Dear Colleagues,

Data infrastructure is a grouping of data assets. The purpose of data infrastructures is to supply information services by protecting, preserving, processing, moving, securing, and serving data and the applications that use it. Hardware, software, cloud services, servers, storage, I/O, networking, people, processes, rules, and a variety of tools spanning legacy, software-defined virtual networks, containers, and the cloud are among the technologies that make up data infrastructures.

We are looking for high-caliber, original research articles for this Special Issue that highlight cutting-edge approaches and procedures utilized in the creation, administration, and evaluation of data infrastructures. We encourage theoretical and application articles of the highest technical caliber from all disciplines, promoting awareness of approaches and procedures in one field that can be useful in another. We are looking for high-caliber submissions of original research articles and review articles on all facets of data infrastructure management that could be used in real-world settings.

  • Data management related to healthcare, agriculture, education and power consumption
  • New designs in data infrastructures
  • Data infrastructure safety and security
  • Data reliability and its compliance

Prof. Dr. Francesco Flammini
Dr. H L Gururaj
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Infrastructures is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • data assessment
  • data quality issues
  • data management
  • reliability
  • impact of various factors on agriculture
  • health monitoring
  • automatic transportation

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 2895 KiB  
Article
A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0
by Rajesh Natarajan, Gururaj Harinahallo Lokesh, Francesco Flammini, Anitha Premkumar, Vinoth Kumar Venkatesan and Shashi Kant Gupta
Infrastructures 2023, 8(2), 22; https://doi.org/10.3390/infrastructures8020022 - 02 Feb 2023
Cited by 18 | Viewed by 2697
Abstract
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method of connecting medical equipment and the software that operates on it to the computer networks that are used in healthcare 5.0. The rapid development of smart medical devices on [...] Read more.
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method of connecting medical equipment and the software that operates on it to the computer networks that are used in healthcare 5.0. The rapid development of smart medical devices on IoMT platforms has led to the adoption of major technologies in the modernization of healthcare procedures, the administration of diseases, and the improvement in patient treatment standards. The IoMT offers a variety of cloud-based applications, including data exchange, data screening, patient surveillance, information collection and analysis, and hygienic hospital attention. Wireless sensor networks (WSNs) are responsible for both the gathering and delivery of data. Method: The safety of patients and their right to privacy are the top priorities in the healthcare sector. Anyone may see and modify the patient’s health information because the data from these smart gadgets are sent wirelessly through the airways. Hence, we developed a unique elliptic curve cryptography-based energy-efficient routing protocol (ECC-EERP) to provide a high level of security and energy efficient system for healthcare 5.0. Data can be encrypted using the key-based method ECC-EERP. It employs pairs of public and private keys to decrypt and encrypts web traffic and reducse the amount of energy needed by a WSN in aggregate. Result and Discussion: The efficiency of the suggested method was evaluated in comparison with that of a variety of existing methods. The suggested method was evaluated with the use of many parameters such as security, encryption throughput, energy efficiency, network lifetime, communication overload, computation time, and implementation cost. The results showed that the proposed technique provides enhanced security and energy efficiency. Full article
(This article belongs to the Special Issue Data Infrastructures)
Show Figures

Figure 1

Back to TopTop