2019
DOI: 10.1109/jiot.2019.2893172
|View full text |Cite
|
Sign up to set email alerts
|

Encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(7 citation statements)
references
References 24 publications
0
6
0
1
Order By: Relevance
“…Confidentiality issues is related with unauthorized access of EHRs, integrity is related with unauthorized modification of EHRs during transmission and availability stated unauthorized blocking of HIS services. some of the researches proposed by [52,53,54,55,56,57,58,59,60,61,62,63] provided security framework that focused on maintaining patient's privacy preservation amount fog and other intermediate nodes during data transmission, preservation of network against DDoS attack, role of certification authority to ensure integrity of patient data, access control of EHRs etc. Other than above issues, some study focused on specific diseased by healthcare framework using fog computing infrastructure.…”
Section: Comparison Of Fog Computing With Other Technologies In His G...mentioning
confidence: 99%
“…Confidentiality issues is related with unauthorized access of EHRs, integrity is related with unauthorized modification of EHRs during transmission and availability stated unauthorized blocking of HIS services. some of the researches proposed by [52,53,54,55,56,57,58,59,60,61,62,63] provided security framework that focused on maintaining patient's privacy preservation amount fog and other intermediate nodes during data transmission, preservation of network against DDoS attack, role of certification authority to ensure integrity of patient data, access control of EHRs etc. Other than above issues, some study focused on specific diseased by healthcare framework using fog computing infrastructure.…”
Section: Comparison Of Fog Computing With Other Technologies In His G...mentioning
confidence: 99%
“…Cryptosystems and cryptographic schemes designed, implemented and evaluated using entropy, were used in a variety of platforms, environments, applications and computing paradigms, among which we can mention fog-based IoTs [ 208 ]. In fog-based IoT, a nearby light-weight middleware is used to bridge the gap between IoT deices and the far-away cloud.…”
Section: Entropy and Encryptionmentioning
confidence: 99%
“…Kwasi Boakye-Boateng et al [1] has proposed an Encryption Protocol for Wireless Devices using One Time Pad Encryption. In this paper, an encryption protocol is applied to wireless transmission devices like mobile phones which acts as Fog-node for secure data transmission.…”
Section: Literature Reviewmentioning
confidence: 99%