Proceedings of the 7th International Conference on Body Area Networks 2012
DOI: 10.4108/icst.bodynets.2012.250241
|View full text |Cite
|
Sign up to set email alerts
|

Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 39 publications
(16 citation statements)
references
References 0 publications
0
16
0
Order By: Relevance
“…2) Threats to eHealth IoT Devices: Biomedical Sensor Network (BSN) is a specialized case of WSN in which sensors are used to monitor patients' health and also facilitate chronic disease self-care [41]. BSN has dynamic network topology due to mobile nodes, power constraints and low bandwidth IoT communication protocols.…”
Section: Generalized Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…2) Threats to eHealth IoT Devices: Biomedical Sensor Network (BSN) is a specialized case of WSN in which sensors are used to monitor patients' health and also facilitate chronic disease self-care [41]. BSN has dynamic network topology due to mobile nodes, power constraints and low bandwidth IoT communication protocols.…”
Section: Generalized Threatsmentioning
confidence: 99%
“…Similarly, the threats to the availability of the network/services are; hello flood attack, selective forwarding, Sybil attack, wormhole attack, blackhole attack [10] and storage attacks [8]. DoS Attacks can also be launched by sending fake/false messages to a node, server [41] or a gateway device [88].…”
Section: Semantics Layermentioning
confidence: 99%
“…Most of the threats arises from the gap in authentication and integrity. Some of the most common attacks other than ransomware are Denial of Service (DoS) attack [88], Unapproved Access of data and gateway attacks [89]. The network can get compromised while transmitting the data leading to problems.…”
Section: Scope For Future Researchmentioning
confidence: 99%
“…It focuses on security metrics such as security control,its correctness, effectiveness and efficiency. This approach can be further extended for calculating detailed analysis and specification of security metrics and adaptive decision making algorithm [19].…”
Section: Implication Of Iot In Ehealthmentioning
confidence: 99%