Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) 2020
DOI: 10.1201/9780429270567-3
|View full text |Cite
|
Sign up to set email alerts
|

The Future of Privacy and Trust on the Internet of Things (IoT) for Healthcare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…Nowadays, the Internet of Things (IoT) interlinks the Internet World Wide Web with sensors and a plethora of devices, predominantly using IPbased connectivity. Undeniably, the principal benefit of the IoT visualization is the extreme implications it will carry on several sectors of daily life and traits of candidate users, from the private and public sector to our personal life domain [5].…”
Section: B the Iot Vision: Background And Architecture Overviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Nowadays, the Internet of Things (IoT) interlinks the Internet World Wide Web with sensors and a plethora of devices, predominantly using IPbased connectivity. Undeniably, the principal benefit of the IoT visualization is the extreme implications it will carry on several sectors of daily life and traits of candidate users, from the private and public sector to our personal life domain [5].…”
Section: B the Iot Vision: Background And Architecture Overviewmentioning
confidence: 99%
“…Clearly, from an architecture angle, Internet-of-Things (IoT) leverages several layers, as shown in Figure 2. The two minor layers commit to data apprehension and acquisition, whereas the two superior layers are mainly accountable for data usage in most applicability scenarios [5].…”
Section: B the Iot Vision: Background And Architecture Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…That information included the device's model, screen size, language, and, in some cases, sensitive user information such as gender, geo-location, running routes, sleeping patterns, or even eating habits. It is by no doubt that activity and health tracking applications collect and manage sensitive data by design [56], therefore the security and privacy requirements defined by data protection laws, such as the General Data Protection Regulation (GDPR) in the EU, as well as security issues from a technological point of view have to be researched.…”
Section: Security and Privacy Vulnerability Issues In Fitness Tracking Devicesmentioning
confidence: 99%