2019
DOI: 10.1109/jiot.2019.2923261
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Aggregation of Lightweight E-Healthcare IoT Devices With Fair Incentives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 96 publications
(43 citation statements)
references
References 40 publications
0
42
0
Order By: Relevance
“…With the spread of IoT applications, smart health is becoming an attractive paradigm. As it deals with user information and sensitive medical information, the security and mutual authentication of medical sensor devices for personal information protection, encryption, and real-time monitoring are key elements [125,[170][171][172][173][174][175][176][177][178][179][180][181].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…With the spread of IoT applications, smart health is becoming an attractive paradigm. As it deals with user information and sensitive medical information, the security and mutual authentication of medical sensor devices for personal information protection, encryption, and real-time monitoring are key elements [125,[170][171][172][173][174][175][176][177][178][179][180][181].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…ComptCost(mJ) = cpu 32768 ×1.8mA×3V (13) The total power consumption by the sensor node for EPPDA scheme is estimated with the follow in equation: TotalEnergy(mJ)=EnergyComm+EnergyCompt (14) Figure 12 shows that the energy consumption by EPPDA is lower than that of two other schemes. The reason is that the RESDA and LSDA schemes generate too many unnecessary messages for providing integrity and privacy in data aggregation.…”
Section: Energy Consumptionmentioning
confidence: 99%
“…In addition, it can be extended the life of the network [13]. The data aggregation scheme also faces many security challenges [10][11][12][13][14][15][16][17][18][19][20]. Sensor nodes are often deployed in hostile environments with low bandwidth and unsecured communication channels.…”
Section: Introductionmentioning
confidence: 99%
“…Other issue is that the identity of the user can be impersonated for uploading the malicious data. In [32] mainly focused on the preserving the privacy of health data from the various source by providing the fair incentives, here advanced method of cryptographic schemes were used in order to support the data confidentiality while the data transmission takes place. Moreover to achieve the fair incentive , ID-based signature were used which detects the replay attacks and guarantee the privacy.…”
Section: Literature Surveymentioning
confidence: 99%