2021
DOI: 10.51201/jusst/21/07162
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Model to Protect Healthcare IoT System from Version Number and Rank Attack

Abstract: Recently the entire world is witnessing a pandemic outbreak of COVID-19. Resultantly, the healthcare sector battles the challenges like inadequacy of staff members, feeble patient monitoring services, etc. IoT technology provides complete digitization. However, this healthcare IoT falls prey to various attacks and security threats. The main cause of the attacks is the IoT communication and routing protocols. Routing protocol for low power lossy network (RPL) provides the potent routing mechanism in the 6LoWPAN… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…VeRA incorporates a hash-based, minimally time-consuming authentication method. VeRA's resistance to circumvention is a noteworthy trait except for rank fabrication and replay attacks [59].…”
Section: A Secure Protocol-based Mechanismsmentioning
confidence: 99%
“…VeRA incorporates a hash-based, minimally time-consuming authentication method. VeRA's resistance to circumvention is a noteworthy trait except for rank fabrication and replay attacks [59].…”
Section: A Secure Protocol-based Mechanismsmentioning
confidence: 99%