2015
DOI: 10.4236/ait.2015.53004
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Security Techniques for Internet of Things Healthcare Applications

Abstract: The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It will effect in a large number of applications such as smart living, smart home, healthcare systems, smart manufacturing, environment monitoring, and smart logistics. This paper provides integration, summarizes and surveys some of the security techniques especially hybrid techniques that can be app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…In [10] Yehia et.al have surveyed healthcare applications which are based on Wireless Sensor Networks that aims to be deployed over IoT (Internet of Things) Environment. In this work, they have also discussed about the techniques that were used for handling the security issues that are pertained to health care system.…”
Section: Related Workmentioning
confidence: 99%
“…In [10] Yehia et.al have surveyed healthcare applications which are based on Wireless Sensor Networks that aims to be deployed over IoT (Internet of Things) Environment. In this work, they have also discussed about the techniques that were used for handling the security issues that are pertained to health care system.…”
Section: Related Workmentioning
confidence: 99%
“…Symmetric and asymmetric ciphers combined to form a cryptographic technique called Hybrid Key Cryptography (HKC). Hybrid schemes utilize the benefits of the strengths of both approaches [225]. A great number of researches have shown that the combination of symmetric and asymmetric cryptography utilizes the strengths of both schemes and makes it suitable for IoT networks [42], [226]- [228].…”
Section: Encryption-based Countermeasuresmentioning
confidence: 99%
“…Haider DhiaZubaydi [32] a reviewed that most health care applications are developed on the Ethereum framework. The ECDSA Algorithm [39] is used in blockchain to prevent from hacking and he also proposed Byzantine Fault Tolerance algorithm with IoT devices because it does not require high hashing power.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, authors i.e. Lobna Yehia [39] reviewed about security techniques to be used and applied in IOT devices to provide security for the data as there is a huge amount of information related to health care is stored.…”
Section: Related Workmentioning
confidence: 99%