Figure 2 - available via license: CC BY-SA
Content may be subject to copyright.
Device initialization protocol in a SSP! Domain 

Device initialization protocol in a SSP! Domain 

Source publication
Article
Full-text available
Rapid development of Internet of Things (IoT) and its whole ecosystems are opening a lot of opportunities that can improve humans’ quality of life in many aspects. One of the promising area where IoT can enhance our life is in the health care sector. However, security and privacy becomes the main concern in the electronic Health (eHealth) systems a...

Context in source publication

Context 1
... the ciphertext than having simply the encry- ption, while it works faster than secure implemen- tation of Hash-based Message Authentication Code (HMAC) that requires two keys for encryp- tion and authentication. The detail protocol of secure device initialization is shown in Fig. 2. Fig. 3 illustrates a scenario that using the propos- ed authentication mechanism with key ...

Similar publications

Article
Full-text available
In recent years, researchers have made tremendous progress to address an important question of how to provide security and privacy in Internet of Things systems. Privacy protection refers to safeguarding leakage of private information of the customers. In the context of Smart Grid, majority of the studies are based on addressing consumer side priva...
Conference Paper
Full-text available
Nowadays, Internet of Things (IoT) is gradually finding its way, into everybody's life. This paper, introduces both the design and the implementation of a privacy framework, for the Internet of Things (IoT). Taking the benefits from it, a privacy platform is developed with a twofold aim: firstly, to train in detail the fundamentals of cryptography...
Article
Full-text available
Security and privacy preservation are important research challenges in Internet of Things (IoT) applications, wherein the information related to customers' habit is seamlessly collected for further analytics. One such IoT application; Smart grid (SG) network uses Information and Communication Technology (ICT) to automate the traditional electricity...

Citations

... Security breaches to IoT devices could pose a significant threat to patients' wellbeing and personal information. Health and electronic devices linked to the cloud collect, compile, store, and upload health information [32]. Cloud polling, cloning, spoofing, and RF jamming are some vulnerabilities that can be caused in the OSI architecture. ...
Article
Full-text available
Internet of Things (IoT) impacted significant growth in the healthcare sector, from pulse oximeters, blood glucose, or monitors to remote health tracking. From 1999 to 2021, there have been incremental publications and research in this field; thus, the current study provides a longitudinal investigation and bibliometric analysis of the IoT in healthcare and identifies the future vision of this trend for the prosperity of the healthcare sector. Hence, based on this research, a framework for convenient and secure use of IoT and health data by users and hospitals is developed.
... WannaCry and Petya are the two latest malware infections that have influenced clinicians and healthcare establishments all over the world (Jarrett, 2017). The devices used in a healthcare setting are generally for transmitting data or serving as a sensor (Anggorojati & Prasad, 2018). The increase of the IoT devices requests in the healthcare industry and the lack of protection to the devices will make for a dangerous combination. ...
Research
Full-text available
Through the advances in technology, businesses can now utilize IoT devices to improve a variety of tasks from monitoring vitals sings to get real time feedback on activities.
... Privacy and secure transfer and storage of information is the main challenge of electronic health systems and it becomes more onerous with integration of Internet of Things. And to add things into more complication the architecture of IoMT systems are designed to have cross-platform support i.e. supporting different organisation's devices thus increasing the complexity of security [58]. ...
Chapter
Full-text available
With the alarming escalation of COVID infection across the globe, there seems a dire need of upgrading the conventional medical practices and technologies in order to battle the pandemic. There are many technological advancements in the direction of integrating emergent technologies with the current medical practices for efficient treatment of COVID crisis and other therapeutic strategies. The proposed intent is aimed to explain such technological advancements like IoMT (Internet of Medical Things) and mHealth and their combined utilization in combating the COVID-19 pandemic. This chapter highlights the works done in integrating Medical Science with emergent technologies such as Robotics, Cognitive Radio System, Wearable and Ingestible Sensory devices, Mobile phones and their significance in providence of medical facilities at doorstep, and 5G technologies in Medical applications. All these elucidations are followed by highlighting their utilization in combating the COVID pandemic through various approaches. This chapter also discusses their current limitations in practical medical world and future aspects of advancements in the medical science.
... In this section, we present and discuss related works to IoT, cloud computing, and data confidentiality fields. In [7], the authors propose an architecture based on IoT in healthcare environments. Authors introduce a key management method, that includes mutual authentication and secret key agreement. ...
... Moreover, the essential problem in all of those approaches is the absence of self-management. In [7], Identity-based systems have a specific problem in operation. Suppose Alice and Bob are users of such a system. ...
Conference Paper
Full-text available
In this paper, we propose a novel, secure, and intelligent IoT approach based on agent, we have implemented in the health care domain, where we developed an intelligent patient monitoring system for monitoring the patients heart rate automatically. Our system is more intelligent that can anticipate the critical condition before it even happens, send a message to the patient family, doctors, nurses, as well as hospital in-charge personal, and launch an alarm to be assisted by the nearest people in place. Also, our architecture ensures the authentication, authorization, and data sensing confidentiality. Hospitals and medical clinics can utilize our system to monitor their outpatients who are in danger of unpredictable health conditions. The approach presented in the paper can also be applied to other IoT domains.
Chapter
Advancement in technology has led to an exponential growth of Internet of Things (IoT) devices. IoT devices make our lives easier by providing all the advantages in relation to automation, convenience, and efficiency. The only caveats of IoT nodes are that they are resource constrained in terms of computation, energy, storage, and bandwidth. Also, their interaction with humans and Internet connectivity make them vulnerable to various security threats. Hence, security is a fundamental requirement of the IoT design but it should also be efficient in terms of resource usage. Transport layer security (TLS) is a protocol that has substantiated secure communication from one end to the other. TLS uses public key infrastructure or PKI to secure information over the Internet. But it is inefficient to use PKI in resource-constrained devices like IoT due to the need of storing certificates. Identity-based cryptography was introduced to relieve this domain from the overhead of public key certificate storage and management. This paper presents a comprehensive survey of identity-based cryptography in IoT technologies and security issues with a focus on the smart home and healthcare environments.KeywordsIdentity-based cryptographyInternet of ThingsPublic key infrastructureTransport layer security
Chapter
Today it be a necessity to setting off past the thought that IT as a cost center and seeing it as a benefit center, on backing of the improvement and method of the organization. Internet of things can be defined as a propelled standard which make straightforward gadget a shrewdly gadgets which allow transferring simple device an intelligent devices capable of exchanging data over a network without human interaction. It represent a technology that interest research and industry, also serve on transform the way to think, and work. This paper present an overview on Internet of things (IoT), its application areas and its challenges in the aim to give a guideline to future researchers.
Article
Technologies and new standards have converted the traditional networks and systems into new smart cities integrated networks. Different factors are behind to build these new networks in terms of hardware, software, standards, technologies, and infrastructure. Internet of things (IoT) is one of the popular network types based on small and portable devices. Some of the IoT applications are more critical and sensitive like smart healthcare systems wherein time data delivery is needed without any delay. Keeping in view the criticality of such applications, this study proposes a secure storage, processing and transmission (SSPT) technique. This technique is based on two modules named Advanced Encryption Standard (AES) in Electronic Code Book (ECB) mode and AES in Ciphered Message Authentication Code (CMAC) mode. In the first module, the AES is implemented in ECB mode to provide encryption to IoT computer vision data. In the second module, the AES is integrated with the CMAC algorithm to provide encryption, integrity, and authentication. The said modules are implemented in a field programmable gate array (FPGA) device which acts as a secure edge computing device. The SSPT is verified by the test vectors given by international standards such as the National Institute of Standards and Technologies (NIST) and Federal Information Processing Standards (FIPS) which are adaptable, proficient, and vigorous as compared to previous techniques.
Chapter
Full-text available
Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) or novelCoronavirus, responsible for the transmission of Coronavirus disease (COVID- 19), represents the causative agent of a conceivably deadly sickness, and a global public health concern. In December 2019 in China (Wuhan), the spread of SARSCoV- 2 has taken the shape of a pandemic and affects the respiratory system and manifests as pneumonia in humans, influencing more than 216 nations so far. On January 12th, 2020, the World Health Organization (WHO) gave the name “2019- nCoV” for 2019 novel Coronavirus, and the infection further on February 11th, 2020, is authoritatively named as COVID-19. Instead of using various predictive systems and data models, the prevalence of COVID-19 is continuously increasing, affectingmillions of individuals. This chapter focuses on predictive systems and data models utilized from the beginning of COVID-19 outbreak that helped in predicting the cases and deaths qualities of COVID-19 in the desire for giving a reference to future investigations and help in controlling the spread of further epidemics. And also suggest how these data models can help and enable policymakers to plan the regional and national healthcare systems required and designmonitored active plans