2020
DOI: 10.17485/ijst/v13i28.861
|View full text |Cite
|
Sign up to set email alerts
|

IoT-based Secure and Energy Efficient scheme for E-health applications

Abstract: Background/objectives: This study presents a secure and energy-efficient scheme of patient's data transmission from wearable IoT sensors (WIS) to base station (BS). IoT sensors are widely used in the healthcare domain for realtime data collection and transmission. However, these sensors are resourceconstrained in terms of computational power and storage due to which chances of security breaches and threats increase. Moreover, with time the energy level of IoT sensors also degrade that sometimes leads towards l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 24 publications
(6 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…We're likely to see these actions globally depending on the duration of the lockdown. But it is also likely that certain student occupations will profit from interruptions [23]. In higher education, several universities and colleges are replacing standardized tests with electronic evaluation instruments; this is a different environment for both teachers and students, so evaluations are expected to contain a larger measuring error than average.…”
Section: Discussionmentioning
confidence: 99%
“…We're likely to see these actions globally depending on the duration of the lockdown. But it is also likely that certain student occupations will profit from interruptions [23]. In higher education, several universities and colleges are replacing standardized tests with electronic evaluation instruments; this is a different environment for both teachers and students, so evaluations are expected to contain a larger measuring error than average.…”
Section: Discussionmentioning
confidence: 99%
“…Before investigating the network traffic dataset, understanding the type of network traffic data is crucial. Humayun et al [7,8] have clearly summarized and compared these data categories. And since network traffic plays an important role in wireless intrusion detection design, the remaining sections focus on the types and techniques to analyze wireless traffic.…”
Section: Network Traffic Analysismentioning
confidence: 99%
“…Considering sensing infrastructure different standards and protocols have been adopted for HEMS (Avancini et al, 2019;Sharma and Saini, 2017;Hu and Li, 2013;Humayun et al, 2020c). Major of which are Power Line Communication (PLC) (Saha et al, 2016), ZigBee (IEEE 802.15.4) (Avancini et al, 2019), Bluetooth (Hu and Li, 2013), WiFi (IEEE 802.11) (Humayun et al 2020c), along with humanmachine interface Systems (Sharma and Saini, 2017). Authors in Saha et al (2016) suggested using PLC in conjunction with smart meters as it is more appealing to preserve electricity on the demand side.…”
Section: Communication Infrastructurementioning
confidence: 99%
“…• PLC (Saha et al, 2016) • ZigBee (Avancini et al, 2019) • Human-Machine Interface Systems (Sharma and Saini, 2017) • Bluetooth (Hu and Li, 2013) • WiFi (Humayun et al 2020c) • BACnet, Z-wave, etc.…”
Section: Communication Infrastructurementioning
confidence: 99%