2021
DOI: 10.3390/electronics10060719
|View full text |Cite
|
Sign up to set email alerts
|

Security Framework for IoT Based Real-Time Health Applications

Abstract: The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(8 citation statements)
references
References 44 publications
(59 reference statements)
0
8
0
Order By: Relevance
“…In reality, the handler ensures not have to be suitable in the workaround; nonetheless, instead, the IoT entry is compatible with the user. In specific, this approach can be used in professional conditions, particularly in communities where children are vulnerable to unsafe situations that could jeopardize their safety [ 30 ]. This involves miners, technicians/chemical workers, and heavy-duty manufacturing and construction workers/technicians.…”
Section: Resultsmentioning
confidence: 99%
“…In reality, the handler ensures not have to be suitable in the workaround; nonetheless, instead, the IoT entry is compatible with the user. In specific, this approach can be used in professional conditions, particularly in communities where children are vulnerable to unsafe situations that could jeopardize their safety [ 30 ]. This involves miners, technicians/chemical workers, and heavy-duty manufacturing and construction workers/technicians.…”
Section: Resultsmentioning
confidence: 99%
“…The experimental findings are compared to those obtained using a variety of clustering techniques, including the whale optimization algorithm, innovative chemical reaction optimization, and cuckoo search optimization. In [31], the authors offer a security architecture for real-time health monitoring systems that ensure data confidentiality, integrity, and authenticity via the use of two widely used IoT protocols: the constrained application protocol (CoAP) and message inquiry telemetry transports (MQTT). This security architecture is designed to protect sensor data from security flaws while it is being sent continually between layers, and it accomplishes this goal by using hypertext transfer protocols (HTTPs).…”
Section: Related Workmentioning
confidence: 99%
“…Our proposed approach can be employed in all the classification-related IoT applications, such as smart fire detection, homes, transportation, and health, with the class imbalance problem. In addition, our framework is suitable for securitycritical applications, where the probability of generating new attacks is high [5].…”
Section: Introductionmentioning
confidence: 99%