2016
DOI: 10.1016/j.future.2016.02.020
|View full text |Cite
|
Sign up to set email alerts
|

End-to-end security scheme for mobility enabled healthcare Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
108
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 242 publications
(109 citation statements)
references
References 29 publications
0
108
0
1
Order By: Relevance
“…Secure end-to-end communication, a smart gateway with the help of robust mobility models and fortified authorization and integrity between IoT devices that are projected by Moosavi et al [28]. In their method, without necessitating any reconfiguration at the device layer, the fog layer succor's ubiquitous mobility.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure end-to-end communication, a smart gateway with the help of robust mobility models and fortified authorization and integrity between IoT devices that are projected by Moosavi et al [28]. In their method, without necessitating any reconfiguration at the device layer, the fog layer succor's ubiquitous mobility.…”
Section: Related Workmentioning
confidence: 99%
“…Under such instance, proper scheduling of energy utilization is required especially when the sensors are distantly connected [16][17]. Numerous nodes transfer multiple data from node to the base station about the same event, which leads to transfer redundant data [18][19]. Thus, the consumption of energy associated with the network become high.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, satisfying security requirements such as data authenticity, data confidentiality and access control are essentials in IoT-based systems (Sicari et al 2015). In this regard, various models or schemes have been introduced to ensure security in the IoTbased systems; e.g., Vucinic et al (2015) propose a model (OSCAR) for end-to-end security in the IoT systems, Moosavi et al (2016) also present an end-to-end security scheme for mobility enabled healthcare IoT systems and Neisse et al (2015) offer a model to provide security for data protection in IoT systems.…”
Section: Iot-based System Architecturementioning
confidence: 99%
“…One such service is remote medical monitoring and care [1,2]. At the same time, governments have formulated new policies in order to respond to the healthcare requirements of aging populations.…”
Section: Introductionmentioning
confidence: 99%
“…Previously, while researchers proposed schemes based on the IoT environment, these schemes were either not for healthcare environments [2,4] or lacked the comprehensive security required for healthcare environments [1,3]. Jr. et al [2] proposed a session-key establishment scheme between an initiator and a responder for the IoT environment, but they did not mention how the initiator and responder would authenticate each other’s legality.…”
Section: Introductionmentioning
confidence: 99%