2016 11th International Design &Amp; Test Symposium (IDT) 2016
DOI: 10.1109/idt.2016.7843009
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security of IoT in the context of eHealth and clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…Security attacks on IoT‐based eHealth systems can be classified according to the targeted layer in the typical three‐layered IoT architecture such in References 3,17,24,25. Attacks on device layer are related to hardware vulnerabilities.…”
Section: Taxonomy Of Ehealth Security Threatsmentioning
confidence: 99%
“…Security attacks on IoT‐based eHealth systems can be classified according to the targeted layer in the typical three‐layered IoT architecture such in References 3,17,24,25. Attacks on device layer are related to hardware vulnerabilities.…”
Section: Taxonomy Of Ehealth Security Threatsmentioning
confidence: 99%
“…Researchers also discuss cryptographic algorithms for security purposes and concluded that the Rivest-Shamir-Adleman (RSA) model outperforms the Advanced Encryption Standard (AES) and Data Encryption Standard (DES) algorithms. Vulnerabilities exist in security pertaining to electronic health within the cloud [ 62 ]. Using a security architecture that is distributed and cloud application layers may help circumvent security issues.…”
Section: Related Workmentioning
confidence: 99%
“…An important requirement is how to provide appropriate authorization rules and policies while ensuring that only permitted users have access to the sensitive data and only authorized devices are sending correct information. Moreover, there is a challenge of data privacy as public key cryptography cloud is not applied to all layers because of the processing power constraints imposed by IoT objects [20].…”
Section: Vital Signs Monitoring In Smart Hospital Contextmentioning
confidence: 99%