2014
DOI: 10.1007/978-3-319-08368-1_9
|View full text |Cite
|
Sign up to set email alerts
|

A Pairing Based Authentication and Key Establishment Scheme for Remote Patient Monitoring Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
3

Relationship

3
0

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…The use of information and communication technology for medical care system in hospitals and medical institutions enables medical personnel and patients to perform remote medical services via IoT [1]- [4]. IoT based wireless sensor networks (WSNs) has been getting considerable attention from a variety of applications, especially for medical care system.…”
Section: Introductionmentioning
confidence: 99%
“…The use of information and communication technology for medical care system in hospitals and medical institutions enables medical personnel and patients to perform remote medical services via IoT [1]- [4]. IoT based wireless sensor networks (WSNs) has been getting considerable attention from a variety of applications, especially for medical care system.…”
Section: Introductionmentioning
confidence: 99%
“…Clearly, innovative strategies are needed to tackle the existing problems and to cater to the healthcare needs of an aging population in addition to sustaining the trend towards an independent lifestyle focusing on personalized non-hospital based care [6]. With recent advancements in telecommunication technology however, opportunities exist to improve the current state of the healthcare systems to minimize some of these problems and provide more personalized service [7] [8].…”
Section: Introductionmentioning
confidence: 99%
“…These challenges reach above and beyond the resource limitations that all WBANs face. Specifically, unlike applications in other domains, healthcare applications impose stringent requirements on system reliability, quality of service and particularly privacy and security [3]- [6]. Ensuring complete and a good level of security for such types of WBANs, is not a trivial task.…”
Section: Introductionmentioning
confidence: 99%