2018
DOI: 10.1504/ijsnet.2018.090462
|View full text |Cite
|
Sign up to set email alerts
|

Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things

Abstract: E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstances. However, due to limited resources available in such systems and data privacy concerns, security issues constitute a major obstacle to their safe deployment. To secure e-health communications, key management protocols play a vital role in the security process. Nevertheless, current e-health systems are unable to run existing standardiz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Under this type of attack, what is sought is to collect information from the victim that allows obtaining bank access codes, personal and/or corporate email codes in order to continue climbing to steal sensitive information, images or intimate videos that lead to extortion, among others. For example, in 2016 an attack on Europe and North America was used under the DDoS modality [5], using the IoT [6] to disable the DynDNS systems (Dynamic Network Services, Inc.), operated by domain name providers (DNS), this caused the denial of access to internet platforms and services. Also, this type of attack seeks to steal sensitive corporate information to be sold to the competition, destroy it if necessary when there is a contract involved, extort money from the target or destroy critical facilities for terrorist or military purposes.…”
Section: Introductionmentioning
confidence: 99%
“…Under this type of attack, what is sought is to collect information from the victim that allows obtaining bank access codes, personal and/or corporate email codes in order to continue climbing to steal sensitive information, images or intimate videos that lead to extortion, among others. For example, in 2016 an attack on Europe and North America was used under the DDoS modality [5], using the IoT [6] to disable the DynDNS systems (Dynamic Network Services, Inc.), operated by domain name providers (DNS), this caused the denial of access to internet platforms and services. Also, this type of attack seeks to steal sensitive corporate information to be sold to the competition, destroy it if necessary when there is a contract involved, extort money from the target or destroy critical facilities for terrorist or military purposes.…”
Section: Introductionmentioning
confidence: 99%
“…e advantage of this method is to improve the selection time of the traditional multiconstrained shortest path by introducing the potential path of QoS requirements [18]. In reference [19], service composition is modelled as a path search problem of a directed acyclic graph, and heuristic ant colony algorithm is adopted to search the optimal path in a directed acyclic graph under global constraints [20].…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we introduce an extension of our two previous approches (Abdmeziem and Tandjaoui, 2014) (Abdmeziem and Tandjaoui, 2015) to propose a new standard-based cooperative key management scheme. In fact, we design a new distributed hybrid mode for MIKEY protocol combining the Pre-shared key mode with the Public key mode.…”
Section: Introductionmentioning
confidence: 99%