1 Introduction

There occurred abrupt changes in all spheres of life since the cameo of COVID-19. Due to COVID-19 pandemic limitations, medical organizations had shifted at online telecare health systems. This critical phase of novel corona virus had allowed us to opt for remote online services. Different E-health applications had tremendously supported the medical systems throughout the world. Patients can get their treatments benefits through such remote services. To reduce the redundant costs likes of traveling costs and others, and noscomial infections, a larger section of the populations had underwent the Telecare Health services in terms of their check-ups, regular follow-ups, and expert treatment views, etc. The Internet facilities have fueled the telecare health system amidst COVID-19 [1, 2]. Such online telecare health systems mainly deal with the patients’ private medical reports and data. It includes E-prescriptions, clinical and pathological reports, CT and MRI scan images, ECG, NCV, etc. These data must be protected against the middle way attackers in the open channel. To deal with the data security and privacy, cryptographic engineering can be used to make such confidential data more secure.

Certainly, there are plenty of patients’ data security related alarming issues in the telemedicine systems. The disclosures of the patients’ data to the intruders can lead to several major hazards such as patient embarrassment, loss of reputation, legal consequences, loss of trust, financial loss. The patients may not be able to claim their legal treatment bills and appropriate legal steps. Once such patients’ confidential data are available to the intruders they can withstand the entire data or partial data. It can result to very poor quality of treatment in the telemedicine services, legal faults, and economic loss to the patients. Intentionally, the intruders will modify the patients’ medical reports and hence wrong treatment of the patients can happen along with poor management of the system. Partial treatments can also occur in such data damage done by the intruders. Telecare health systems enable the non-invasive and non-critical patients to interact with their physicians from distant places [1, 2]. During the COVID-19 lockdown phase, telemedicine was the safest method adopted to treat the non-critical patients from the remote locations. Cryptographic scientists are continuously endeavoring to develop stronger system with stronger security features. In Diffe—Hellman key exchange protocol, there is an exchange of session key between the users for symmetric key cryptographic functions. There exist some problems likes of it lacks the authentication part of the users applied only on the symmetric key cryptography which can lead to many vulnerabilities inside the wireless networks [3]. Also this protocol is a bit more expensive. Eavesdroppers can guess the orientation of the session key. They can do it by feeding the fetched data into numerous parallel existing ANNs of different topological configurations.

This paper deals with implementation of Priority based Neural Machine (PANM) at the user levels of the Telemedicine to generate state-of-the-art session key. Artificial Neural Networks (ANNs) are inspired from neural processing of the human brain. ANN is a mathematical model to optimize various problems using the machine learning language. It is an adaptive model having the input, hidden and output neurons. Tree Parity Machine (TPM) is a type of ANN in which two TPMs establish a common session key after synchronization. The purpose of the TPM is to have synchronized their synaptic links through iterative simulations without exchanging the vectors. Hebbian learning rule has been stated at the following Eq. 1, which has been used here. Thus, the session key that needs not to be transported through the public medium. Although the architecture of both the TPMs must be equivalent. The learning rule of TPM has been mentioned below with respect to this proposed scheme [4]. The author had implemented adaptive TPM based on configuration as PANM in this paper Eq. (1)–Hebbian Rule.

$$w_{i}^{ + } = f \left( {w_{i} + \sigma_{i} x_{i} {\uptheta } (\sigma_{i} \tau \, ){\uptheta }\left( {\tau^{A} * \tau^{B} } \right)} \right)$$
(1)

In the above equation number 1, the term theta function ‘θ’ will provide + 1 when its inputs are all positive values, else 0 will be provided. And the function ‘f’ is a function which will bound the maximum or minimum boundary of the weight vectors [5].

$${\text{f(w) = }}\left\{ {\begin{array}{*{20}l} {\text{Signum(w)*L}} \hfill & {;\left| {\text{w}} \right|{\text{L}}} \hfill \\ {\text{w}} \hfill & {\text{; else}} \hfill \\ \end{array} } \right.$$
(1.1)

The definition of Signum function has been provided in the next section.

1.1 Author’s contributions

State-of-the-art session key synchronization is the main objective of this paper in the Telemedicine domain. In this paper, the best fitted hidden neuron of the proposed PANM can be selected by the proposed technique to have its efficacy in the telemedicine system. The inputs were kept tightly hidden from the external agents and the intruders. To reinforce data security on the patients’ data, it has been proposed so. The correlation cannot be determined by the intruders during the patients’ data transmission phase. Thus, the neural machines at the patient’s end and the doctor’s end are adaptive in configurations. All the hidden neurons do not participate in the contribution of the Tree Parity Machine’s (TPM) output. So, the time complexity of the TPMs synchronization can be made lower. With the change in its weight system, the best fitted hidden neuron can be changed with the adaptive nature. Lesser iterations were found for proposed TPM synchronization when compared with existing TPM on the same data. In the later phase, an authentication protocol has also being added in the proposed algorithm. Only partial state-of-the-art session key bits were passed in the public medium in two way communication. Thus, the users’ authenticity can be examined in the Telemedicine system.

1.2 The Composition

This paper has been composed as follows. Section 1 has the introduction segment. Section 2 contains the background knowledge. Section 3 presents the review of literature. Section 4 describes the present constraints in functioning of telemedicine. Section 5 contains the proposed solution. Section 6 gives the proposed research methodology in details. The experimental results were mentioned in Sect. 7 with detailed explanations. Section 8 has the conclusions, limitations, and future scope. Acknowledgement, Funding Statement, Ethical Statements, and References are added then.

2 Background Knowledge

In the crucial phase of COVID-19 pandemic, telemedicine support was the main stream of treatment procedures in case of non-emergency, non-invasive, and non-critical patients. The cameo of COVID-19 had rapidly accelerated the digital healthcare transformations with better patients’ management capacity. Telemedicine was the safest way to interact between the patients and the doctors. In case of chronic cardiac patients, the patients can remotely be monitored through IoT based telemedicine. Patients’ cardiac related data can be made in live sensing mode, so that the cardiologists may monitor those cardiac signals. It may include ECG, Holter Monitoring, BP, etc. Psychiatric patients can be treated through telepsychiatry. General patients can get the treatment services by using this telemedicine. Virtual consultations with doctors will terminate the traveling hazards and can be fitted easily into the patients’ daily schedule. Not only it reduces the time consumption but also the overall treatment costs of the patients. The registered medical practitioners can provide diverse treatment services through computerized mode of telemedicine. The telemedicine venture was almost initiated with emergency with the rise in corona virus positive patients. Through this venture, the patients can transmit their medical data in secure way. Different laboratory reports, prescriptions, etc. can be shared between the patients and the physicians in a more protected manner. It is matter of high confidentiality that the patients’ data should not be available to the external intruding agents. It must be made secure during the phase of online transmission inside the open medium. To prevent the data security breaches of conduct, cryptographic science is the most suitable thing to protect the patients’ private data [6, 7]. The most common techniques that could widely be used in the healthcare domain are data encryption and data decryption. Adaptive artificial neural networks can be arranged to get more stronger and efficient cryptographic functions. Encrypting the patients’ data is the way to hide from external entities in any phase of its transmission cycle [8]. It could be from Key Distribution Centre, doctor’s terminals, patient’s terminals, management’s terminals, etc. It protects the data sniffing of medical packets. Decryption is the inverse process of the encryption technique. In symmetric key encryption, it is strongly based on the same key at the doctor’s terminal and patient’s terminal and the key can be generated through mathematical algebraic theory [9, 10]. The similar key is the symmetric session key which needs to be highly robust in terms of true randomness. The problem in such case is the session key exchange between the nodes which is a challenging issue in this era. The probable solution to this problem in the healthcare domain is the neural cryptographic science. In neural cryptographic science, the common secret key can be formed at the both terminals without exchanging the key. The neural machines kept at the patient’s terminal and the doctor’s terminal can be made auto synchronized to form the unique secret key. It is extremely difficult to intervene the secret key in such neural cryptographic science by the intruders. The architecture of those neural networks is known to the intruders too. Tree Parity Machine (TPM) is also a special type of multilayer neural machine that can be placed at both the users of the telemedicine system. Such TPMs will be topologically equivalent in their functioning. Both the users can tune their TPMs to generate the similar weight vectors. They initialize random weight vectors and random inputs were fed into them. The input vectors are made secret from external agents for the security issues. Both the TPMs can generate their outputs and they share between themselves followed by weight adjustments. Such procedure can be repeated until both the TPMs get similar weight vectors. The following Figure 1 displays the basic Tree Parity Machine.

Fig. 1
figure 1

Sample TPM Structure

In Fig. 1, the TPM has three layers, namely input layer, hidden layer, and output layer. In the input layer (N) it has four neurons, and three hidden neurons (K) and one neuron is present in the output layer. The range of the weight vectors are [− L, + L]. N number of input neurons with input vector as \(x_{ij} \in \left\{ { - 1, 0, + 1} \right\},\) the weight vectors are generated in between \(- L\) & \(+ L\). The output of the hidden unit can be calculated as the weighted sum with the input vectors. It is given in the following Eq. 2.

$$H_{i} = \mathop \sum \limits_{i = 1}^{N} ( w_{i} * x_{i} )$$
(2)

The intermediate output of the ith hidden neuron (K) can be found through Eq. 3.

$$\sigma_{i} = Signum \left( {H_{i} } \right)$$
(3)

Signum is a very simple linear function which can return 1,0, or −1.

If (\(Signum\left(t\right)\) > 0) then.

Return (+ 1).

Else if (\(Signum\left(t\right)\) < 0) then.

Return (−1).

Else.

Return (0).

End if.

The output of the TPM can be calculated as the product of the hidden neurons. It has been represented in the following Eq. 3.

$$\tau^{TPM} = \mathop \prod \limits_{i = 1}^{K} \sigma_{i}$$
(4)

The TPM of patient (P) and TPM of doctor (D) will receive get random weight vectors \(w_{i}^{P/D}\). The input vectors are randomly fed into the TPMs. And the TPMs’ output bits \(\tau^{P/D}\) and \(\tau^{D/P}\) were generated in every iteration. These outputs of both the TPMs will be shared between themselves. If they are unequal then \(\tau^{P} \ne \tau^{D}\), the weights will not be adjusted. Else the learning rules for weight vector synchronization will be used in every iteration. Any one of the following three rules can be applied on the neural TPMs Hebbian Rule [4]–Eq. (5), Anti-Hebbian Rule [10]–Eq. (6), Random Walk [11]–Eq. (7).

$$w_{i}^{ + } = f \left( { w_{i} + \sigma_{i} x_{i} {\uptheta } \left( {\sigma_{i } {\tau }} \right){\uptheta }\left( {\tau^{P} * \tau^{D} } \right)} \right){ }$$
(5)
$$w_{i}^{ + } = f \left( { w_{i} - \sigma_{i} x_{i} {\uptheta } \left( {\sigma_{i} {\tau }} \right){\uptheta }\left( {\tau^{P} * \tau^{D} } \right)} \right){ }$$
(6)
$$w_{i}^{ + } = f \left( { w_{i} + x_{i} {\uptheta } \left( {\sigma_{i} {\tau }} \right){\uptheta }\left( {\tau^{P} * \tau^{D} } \right)} \right)$$
(7)

In the above equation numbers 5–7, the term theta function ‘θ’ will provide + 1 when its inputs are all positive values, else 0 will be provided. And the function ‘f’ is a function which will bound the maximum or minimum boundary of the weight vectors [5].

3 Review of literature

Francke J.A. et al. [12] had surveyed a group of patients who took telehealth treatments during the COVID-19. It had provided healthcare services in the critical hours. Alonso S.G. et al. [13] had reviewed the benefits of telemedicine applications during the COVID-19 era to cure the patients from remote locations. It had helped to resist the transmission of corona virus. Telemedicine had served the mankind a lot. Ghosh A. et al. [14] had given suggestions for the diabetic patients during the national lockdown of COVID-19. They had given certain guidelines to be followed by the diabetic patients for their well-being. Abo-Zahhad M. et al. [15] had reviewed emergency telemedicine applications which can monitor the patients’ health conditions. Hatcher-Martin J.M. et al. [16] had discussed the importance of telemedicine in the field of neurology. They had reviewed the pivotal role played by telemedicine to treat neurological problems except brain stroke. Norman S. [17] had explained the use of telemedicine supports in the field of psychiatric treatments. Psychiatric patients can be treated easily through digital media. Tresenriter M. et al. [18] had stated the fruitful implementation of telehealth on emergency medicine in the phase of corona virus pandemic. Plenty of patients were successfully treated through this approach. Bokolo A. et al. [19] had explored the adoption of virtual platform based online treatments for the outpatients in the period of COVID-19. Yang L. et al. [20] had stated that video consultations had accelerated the treatment process for the ambulatory neurological patients in COVID-19. Chauhan V. et al. [21] had leveraged telemedicine to optimize the corona virus transmission and patients’ exposures. Due to prolonged lockdown and quarantine protocols, patients could be managed through telehealth services in case on non-invasiveness during the COVID-19 period. Jnr Bokolo A. [22] had used the telemedicine to treat the patients remotely in the hours of COVID-19 pandemic. Dey J. et al. [23] had proposed a wireless telehealth secure system through amino acids oriented harder encryption. Sarkar A. et al. [24] had designed a new secure transmission system on the intraoral data through electronic health. They had proposed a newer secret sharing method in groups. Rahman S. et al. [25] had viewed the impact of corona virus and telehealth on mental well-being in Bangladesh. Dash S. et al. [26] had discussed the telemedicine novelties during COVID-19 along with its challenges. It is recommended to address those challenges.

Lei X. et al. [27] had designed two-layer feed-forward artificial neural network model for neural cryptography purpose. Synchronization speeds were found to be better in their study with respect to other TPMs. Allam A. M. et al. [28] had described an authenticated session key exchange mechanism in the neural cryptography. Dey L. et al. [29] had developed a machine learning method to detect interactions between the human proteins and SARS-CoV-2 virus. Their technique had shown efficient and accurate results. Jeong S. et al. [30] had proposed vector-value based TPM for the key exchanges in the real life. Their protocol had shown higher degree of data security. Mislovaty R. et al. [31] had considered a combined neural synchronization model which can transmit secret keys in open medium. To transmit the session keys through the public medium was a big challenge. Rosen M. et al. [32] had reviewed various TPM synchronization methods, so that the discrete weights get synchronized equally after the iterations. The synchronization of discrete parity machines was done to have an ephemeral key-exchange mechanism in the public channel. Dolecki M. et al. [33] had stated the impact of tree parity machine’s weight distribution on Neural Netwirk synchronization period. Ruttor A. et al. [34] had proposed synchronization of artificial neural networks in public medium for bidirectional weight vectors. They had designed attractive and repulsive forces to make the neural vectors unique in both ends. Neural cryptography has been designed to make the Brute-force attack non-feasible. M. Volkmer et al. [35] had generated fast key generation by TPMs in the symmetric key cryptography. They had reduced the cost when compared to others. Santhanalakshmi S. et al. [36] had developed neural network synchronization with the genetic approach for the purpose of secure key generation protocol. Han Y. L. et al. [37] had designed an improved technique for neural key synchronization. Their objective was to evaluate the synchronization time needed in the artificial neural networks.

4 Present constraints in functioning

In web-based telemedicine frameworks, the serious issue is the safe conveyance of the secret key between the patients and the doctors inside the open medium. At the hour of trade of the secret key over open channel, gatecrashers can intercede that key by various possible phishing assaults. This specific issue must be tended to in this vital period of COVID-19 pandemic. Positively, there are huge loads of patients' information security related disturbing issues in the telemedicine frameworks. When such patients' secret information is free to the interlopers they can endure the whole information or halfway information. It can result to extremely low quality of treatment in the telemedicine administrations, lawful deficiencies, and monetary misfortunes, etc. to the various categories of patients. Deliberately, the gatecrashers will change the patients' clinical reports and henceforth remote treatments through telemedicine can occur alongside unfortunate administration of the framework. Halfway treatments can likewise happen in such information harm done by the gatecrashers. Different kinds of attacks or noxious activity could spoil activity of the clinical reports and information and upset the correspondence art of the telecare frameworks. An ordinary method for attack incorporates adjusting or changing of the messages or reports. The clinical data and information which are to be conveyed online is very touchy and fundamental for the patients' medicines. So any enemy assaults on such data or information will causes risk for the patients protection and security. Progressed stages on different COVID-19 telecare frameworks were used without having patients' suitable security. Same transmission or session key is used for each various gatherings to abridge the key generative costs. Through phishing attacks, the employees of the telehealth organization may click to unknown links and thus their credentials are automatically leaked to the intruders [38]. Thus, all the medical data are available to the intruders, and now the patient will bring charges against the telehealth organization for not providing proper data security to them [39]. Ransomware attacks were very much common in this COVID-19 pandemic.

Interlopers catching the clinical reports or medicines in the patients and the doctors and attempt to snatch all the data sending from double closures. Diffie-Hellman key trade procedure [40] experiences this kind of issues. Gatecrashers can reenact as the clients of the COVID-19 Telecare frameworks and all the while and attempt to re-establish the session key at the hour of trading key inside the public medium. At the point when it gets compromised then all clinical data of that session will be theft by the gatecrashers. Consequently, the cipher code text is outstandingly disposed to the center way attacks. In case the public transmission ways get compromised, any clinical data going through that association will be taken by the clowns. Subsequently, the patient and the expert are presumably going to be affected generally in all respect. It might prompt phony clinical cases too. Thus, an expedited secret key synchronization between the patient and the doctor should be designed intelligently. It is an urgent approach to design a secure key agreement system which may resist Brute force attacks and Man-In-The-Middle attacks. Patients' clinical data security will be hampered enormously. More to say that, patients' treatment strategies will be in danger as it was edited to accept data correspondence.

5 Proposed solution

The above-stated constraints in the earlier section were being addressed in this proposed solution approach. The biggest constraint in Telemedicine was the transfer of session key between the users. In this proposed method, we have tried to develop state-of-the-art session key with the help of Priority based Adaptive Neural Machine (PANM). Soft computing has been generously accessed to generate the state-of-the-art session key. Soft computing method used is artificial neural network. Soft computing can be regarded as one of the cutting-edge technologies of the present day. So the proposed key generation technique can be fitted as state-of-the-art session key generation. Only the best fitted neuron can be selected which will participate in the formation of the neural output. The correlation between the sum of weight vectors and the hidden neurons’ output will be calculated. The most suited hidden neuron will contribute to the overall TPM output here. So after the synchronization process, both the patient TPM and the doctor TPM will have the same value as the proposed session key. In contrast, the normal TPM synchronization techniques take more time to auto synchronize their weight vectors. The weight vector has been synchronized after several iterations in latter cases. But the problem was noted in the verification of the identical bits inside the weights of the patient TPM and doctor TPM in existing models. When the entire vector is transferred through the open channel then it can be captured by the wrong intruders. This problem has also been addressed in this strategy. A novel session key validation has been proposed through partial validation. Half of the state-of-the-art session key will be shared to the destination TPM. Then it will be authenticated through the proposed mathematical functions. In the next way, the remaining of state-of-the-art session key will be authenticated. The Man-In-The-Middle attacks inside the Telemedicine can be ignored by this proposed strategy. Thus, the patients’ privacy can be preserved in an efficient way.

6 Proposed research methodology

This paper deals to generate state-of-the-art session key in less time along with the session key validation procedure in the public channel of telemedicine. The term state-of-the-art reflects the modern scientific tools used in this methodology. The author had used soft computing to generate the state-of-the-art session key. Soft computing includes artificial neural networks and mathematical calculations done in this method here. Priority has been assigned to all the hidden neurons based on the correlation value. Correlation coefficient (r) was checked between sum of weights and hidden neuron outputs. The most acceptable correlation with closed to zero value could be selected. Thus, that neuron will directly contribute to the TPM output. The partial validation procedure has been proposed on the proposed state-of-the-art session keys. The authentication was done to resist different types of attacks inside the open medium. Intruders are staying silently for the phishing attacks. The proposed state-of-the-art session key generation method can be very much relevant in respect to the telemedicine systems in this pandemic era.

6.1 Proposed block diagram

In the following Fig. 2, the proposed block diagram has been shown.

Fig. 2
figure 2

Proposed flow diagram

In Fig. 2, the flow model can be understood. In telemedicine, both the patient neural machine and doctor neural machine will receive the same inputs and random weight vectors. Since the author had used adaptive neural machines, so the best sited neuron in the hidden layer will be active in the neural output formation. By using Hebbian rule, best fitted neuron will be selected as described below [4]. After the complete synchronization, both the machines will have the same session key. Lastly, the author had given an authentication protocol on the proposed state-of-the-art session key.

6.2 Proposed research techniques

An adaptive neural machine has been used in this paper. Priority based Adaptive Neural Machines (PANM) were designed at the terminals’ of telemedicine system. In existing TPMs, all the neurons of the hidden layer can participate to the formation of TPM output. But in this case, only the best suitable hidden neuron of TPM will be activated, and the corresponding neural output will be created. The best suitability of the hidden unit can be determined by the statistical correlation between the sum of weights and hidden output. Same input vector will be inserted into both the neural machines of the patient TPM and doctor TPM. It has been done to foster the patients’ data privacy. This proposed technique also validates the state-of-the-art session key. Partial bits of the state-of-the-art session key are transmitted for validation in first step. And in the next step, the rest of the bits of session key are transmitted and then validated accordingly.

figure a

The above-mentioned algorithm authenticates the proposed state-of-the-art session key in a novel bidirectional way. It is two way validations. Both the patient TPM and doctor TPM will participate in its way to make sure regarding the authenticity of the session key. If any one way fails, then the entire authentication gets failed.

figure b
figure c
figure d
figure e

7 Experimental results

In this paper, Priority based Adaptive Neural Machine (PANM) has been proposed at the patient and the doctor. As we all know that the strength of the session key determines the scalability of any cryptographic engineering techniques. The configuration of the author’s computing device is: Intel processor (i3), 8 GB RAM, 1 TB SSG, and Windows 10 (64 bits). High level language (C) was used in this paper to synchronize the PANM of the patient and the doctor in telemedicine. The reason behind selecting C in this paper was its flexibility and easy to develop the programs. Also C language provides a lot of variations in the data types. MS Office Excel (version 10) was also used to have different statistical calculations. Patients’ data security was main the main focus in this newer method of neural machines synchronization. In this segment, we have performed numerous mathematical tests on the derived state-of-the-art session keys. The following tests were primarily carried out to prove the efficacy of the proposed technique.

7.1 Statistical test

NIST Test Suite [41] is a measurements tool that involved fifteen (15) statistical tests. Its goal is to decide the randomness of the proposed session key. The indexing of these tests can be found in the following Table 1. Robustness attribute can be evaluated through those tests. The p-values observed were noted in the following table based on the size of the session key. The first ten tests were considered under proposed technique with better efficacy.

Table 1 Acronym of NIST

The proposed session keys that were generated through the TPMs kept at the both ends. The efficacy of those keys in the ray of robustness can be found in the following Tables 2, 3, 4, 5 and 6.

Table 2 NIST on proposed State-of-the-art Session Key Length 56bits
Table 3 NIST on proposed State-of-the-art Session Key Length 128 bits
Table 4 NIST on proposed State-of-the-art Session Key Length 256 bits
Table 5 NIST on proposed State-of-the-art Session Key Length 512 bits
Table 6 NIST on proposed State-of-the-art Session Key Length 1024 bits

In the above-presented Tables 2, 3, 4, 5 and 6, the significant p-value is ≤ 0.05 under 5% significance levels. The obtained p-values were greater than 0.05 i.e., rejecting the null hypothesis, and the proposed session keys were totally random in nature.

7.2 Derived value based function

In this sub-section, the derived value which is based on a proposed function has been analyzed in details. It has been mentioned in the following Eq. 8.

$${\text{DV}}_{{{\text{Len}}}}^{{\text{Key }}} = f\left( { {\text{Mean of Randomness Test}}} \right)$$
(8)

In Eq. 1, \({\mathrm{DV}}_{\mathrm{Len}}^{\mathrm{Key}}\) denotes the required data value in terms of the proposed state-of-the-art session key. It has been presented in the following Table 7. The function ‘f’ is a user-defined function that determines the average p-values segregated with the session key lengths. This function adds all the obtained p-values and divides the result by fifteen to obtain the \({\mathrm{DV}}_{\mathrm{Len}}^{\mathrm{Key}}\). The same procedure has been carried out in the entire above individual Tables 2 to 6.

Table 7 DV on Proposed Keys

From the above-mentioned Table 7, it can be noted that the derived \({\mathrm{DV}}_{\mathrm{Len}}^{\mathrm{Key}}\) of all corresponding keys were acceptable in nature because all the values under the column heading \({\mathrm{DV}}_{\mathrm{Len}}^{\mathrm{Key}}\) in Table 7 are 0.75. The minimum value was supposed to be 0.05*15 = 0.75. Hence, the proposed function ‘f’ has achieved all the necessary values with respect to key sizes 56 bits, 128 bits, 256 bits, 512 bits, and 1024 bits.

7.3 State-of-the-art key generation example

For example, the author had considered a TPM with input neurons N = 3 and hidden neurons K = 2. The same input vector and a random weight vector had been fed into both the neural machines earlier. In this following example, an arbitrary length of state-of-the-art session key has been developed here for illustration. To increase the complexities, the topological configurations can be modified in both the patient TPM and the doctor TPM. The internal configurations of the TPMs, the inputs and the weights are all kept secret to the intruders. Thus, the exact bit pattern cannot be found by the intruders so easily.

In the last column of Table 8, the first bit of the needed state-of-the-art session key has been generated here. Thus, if the length of session key is 16 bits for example, then altogether 160 iterations (10*16 = 160) were needed. To curtail the length of the paper, only first ten iterations were shown above.

Table 8 Tabular form of exemplary session key generation of data bits

From the above-stated Table 9, the correlation values between the sum of weight vectors and the output of the hidden neural units were derived. Such values are as follows; Corr(Sow1(ij), HNU1) = 0.884985 and Corr(Sow2(ij), HNU2) = 0.15772. The minimum value i.e., 0.15772 has been prioritized to get involved in contributing to the output of the overall TPM. The maximum repeated value in the last column of Table 9 was ‘0’, so ‘0’ is the first bit of the required state-of-the-art session key. In Tables 8 and 9, the author had presented an exemplary of how the proposed state-of-the-art session key (first bit only) has been generated. The rest of the bits can be generated in the same fashion.

Table 9 Sample calculation of Correlation Values

7.4 State-of-the-art key generation time

An integral factor of any telemedicine system depends on the amount of time needed in secret key generation. In this paper, we have proposed an adaptive artificial neural network which works only on the best suited neuron at the hidden layer. Neural synchronization was achieved by the patient TPM and doctor TPM of the users. The proposed synchronization has been made between the patient TPM and doctor TPM upto the key length bits needed. This is a dynamic approach which has no rigidity to generate various session key lengths. In the following Table 10, it has been made a comparison that same key length were derived using the proposed adaptive machines and normal TPMs [42]. The proposed technique has shown better performance over all the key lengths that were considered.

Table 10 State-of-the-art session key generation time comparison

Through the above-mentioned Table 8, it has been observed that the proposed way of session key generation had taken lesser time when compared with the existing TPMs. Moreover, the efficacy can be proved with respect to all the key lengths which were considered under study.

7.5 State-of-the-art session key attacks analysis

To analyze the proposed state-of-the-art session keys’ attacks in the field of Telemedicine was a very sensitive work that has been carried out in this paper. It is very much relevant to analyze the attacks on the session key [43]. The combinations of the internal PANMs were changed in accordance with the priority of the hidden neuron and the amount of time to decode the key was calculated on theoretical approach. The length of the proposed key has been approximated to the nearest boundary value of the range. The minimum modular distance closed to the boundary data were taken into consideration in this section. The following Table 11 will display such approximation.

Table 11 State-of-the-art Session Key Approximation

From the above-stated sixteen simulations, it can be easily found that the time needed to decode the proposed state-of-the-art session keys were nearly not possible by the intruders. The patients’ data privacy concerns can be achieved in telemedicine through the proposed key generation methodology.

7.5.1 Brute-force attacks

Brute-Force attacks are needful to be carried out on any secret keys to verify its strength [41*42]. Contemporary supercomputers have high computational capacity of around 442.3 peta FLOPS i.e., 442.3 * 1015 floating point operations per second. One thousand FLOPS trials are required to complete one checking of any arbitrary message by such supercomputing machines. The total number of seconds in a calendar year may be 3,153,600 s in any non-leap years. Let us assume that intruders will deploy such high speed supercomputing machines in Telemedicine network to decode the state-of-the-art session keys and let S be the size of the proposed keys. The estimated time needed in Brute-Force attacks may be calculated from the following Eq. 9.

$${\text{Time }}\left( {{\text{Brute}} - {\text{Force}}} \right) \, = { 2}^{{\text{S}}} /{ 442}.{3}*{1}0^{{{12}}} *{31536}00$$
(9)

In the following Table 12, the author had presented the estimated time which is required in deciphering the state-of-the-art session key by the Brute-Force attacks [44, 45].

Table 12 Time to decode the state-of-the-art- Session Key

7.6 One bit input mutation

Intruders have used advanced neural machines to detect the state-of-the-art session key in the telemedicine [46]. In this sub-section, the author had mutated a single input vector. A flip in the input bit on different keys had been done. With that effect cumulative key bits will also get altered. The following Fig. 3 will display the same.

Fig. 3
figure 3

Mutation Effect on State-of-the-art Session Key

From the above-mentioned Fig. 3, the author had observed that significant numbers of bits were changed on cumulative basis in the proposed state-of-the-art session keys of various lengths.

7.7 Brief security analysis on state-of-the-art session key

In any Telemedicine Software, the information transmission security should be sufficiently able to oppose the gatecrashers. In this paper, the author had designed state-of-the-art session key on the domain of Telemedicine. State-of-the-art means newer and scientific methods which are very much contemporary in this situation. In this segment, a brief analysis has been made to review the effectiveness of the proposed system against the intruding.

  • Patients’ Information Integrity: In case the patients' information bundles are gotten by encryption strategies with the secret keys. The adversaries cannot have the choice to examine or take data yet at the transmission time. It can add some bogus data or any dangerous malware data in the telemedicine treatment methodology. Strong session key can ensure that the data has not been changed during transmission period by the intruders.

  • Patients’ Data confidentiality: Patients’ data confidentiality has been placed at the top rank of the contemporary issues in the Telemedicine Software. We have designed state-of-the-art session key based on Priority based Adaptive Neural Machine (PANM) and such were tested under of statistical tests, derived value based function, Brute-Force attacks.

  • Session Key Confidential Exchange: In the greater part of the telemedicine cases, the session key is overall freely disseminated to the patient and physician in a public medium. There exists a greatest possibility catching those keys by the rivals. So there should be a gotten instrument for its dissemination. In this technique, we have successfully addressed this issue through session key partial exchange and validation.

  • Adaptation in Neural Machines: A neural machine has been proposed adaptation ability in this paper. Hidden neurons were assigned priority and the best fitted neuron has been selected to generate the neural output. It has been proposed to prevent the intruding in Telemedicine.

  • Fast Functionality: In this technique, we have designed state-of-the-art session key with fast key generation period on different key lengths. This means the time needed to generate the keys will be fast when compared to other similar methods.

7.8 Comparative study

In this sub-section, the author had compared between the proposed method and earlier works on the similar domain. The following Table 13 shows the comparative study in brief.

Table 13 Comparative study with earlier methods

8 Conclusions, limitations, and future scope

As we all know that patients’ data privacy is the biggest threat in the telemedicine. To resist the data breaching, strong cryptographic applications are being developed at rapid pace. This paper has dealt with the state-of-the-art session key generation with the help of adaptive neural machines in telemedicine. Soft computing on ANN was extensively implemented here as it fits with the term state-of-the-art key generation method. Here, the best fitted hidden neuron has been selected to contribute in the neural output. For that minimum correlation was considered under this approach. The notable thing can be found is that by the use of high speed supercomputers are not enough to detect the entire sequence of key by the external intruders inside the network. Lesser iterations were needed in the patient TPM and the doctor TPM synchronization. Thus the key generation time has been shortened here. Statistically, different key lengths of the session keys were tested and accepted. Derived value-based function had yielded successful outcomes too. Partial validations on the session keys had been verified also. Thus, the proposed technique is very good for the novel key generation and authentication in the telemedicine system to preserve data privacy.

One of the main limitations of this technique is that equivalent adaptive neural machines are to be fixed at the patient’s end and the doctor’s end.

The proposed methodology can be implemented in distributed computing which will increase the transaction rates in telemedicine.