2016
DOI: 10.1109/access.2016.2645904
|View full text |Cite
|
Sign up to set email alerts
|

A Secure System For Pervasive Social Network-Based Healthcare

Abstract: Modern technologies of mobile computing and wireless sensing prompt the concept of pervasive social network (PSN)-based healthcare. To realize the concept, the core problem is how a PSN node can securely share health data with other nodes in the network. In this paper, we propose a secure system for PSN-based healthcare. Two protocols are designed for the system. The first one is an improved version of the IEEE 802.15.6 display authenticated association. It establishes secure links with unbalanced computationa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
136
0
4

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 318 publications
(140 citation statements)
references
References 24 publications
0
136
0
4
Order By: Relevance
“…On the other hand, there are proposals of WSN systems secured with the blockchain technique [14]- [16]. Zhang et al [14] and Dorri et al [15] proposed a secure home network system in order to share secure health data by using pervasive social network nodes, such as smartphones, tablet computers, and personal computers.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, there are proposals of WSN systems secured with the blockchain technique [14]- [16]. Zhang et al [14] and Dorri et al [15] proposed a secure home network system in order to share secure health data by using pervasive social network nodes, such as smartphones, tablet computers, and personal computers.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang et al [14] and Dorri et al [15] proposed a secure home network system in order to share secure health data by using pervasive social network nodes, such as smartphones, tablet computers, and personal computers. Banerjee et al [16] surveyed the existing security approaches in the Internet of Things domain, and categorized and discussed them into two types (reactive and proactive solutions).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This block is periodically updated and reflected on the electronic cash transaction details to share the latest transaction detail block. This process provides security for the transaction of electronic cash and allows the use of a reliable mechanism [7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…This square is occasionally refreshed and pondered the electronic money exchange subtle elements to portion the greatest current conversation feature square. This technique gives refuge to the conversation of automated currency and documents the consumption of a trustworthy organization [7][8][9]. Disseminated calculating has been associated to frequent IT conditions since of its proficiency and convenience.…”
Section: Introductionmentioning
confidence: 99%