2016
DOI: 10.1109/tifs.2015.2472369
|View full text |Cite
|
Sign up to set email alerts
|

PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance

Abstract: Wireless Body Area Networks (WBANs), as a promising health-care system, can provide tremendous benefits for timely and continuous patient care and remote health monitoring. Owing to the restriction of communication, computation and power in WBANs, cloud assisted WBANs, which offer more reliable, intelligent, and timely health-care services for mobile users and patients, are receiving increasing attention. However, how to aggregate the health data multifunctionally and efficiently is still an open issue to the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
80
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(80 citation statements)
references
References 33 publications
0
80
0
Order By: Relevance
“…Because of the convenience and low cost, a number of devices and software services rely heavily on wireless networks, such as WiFi, which are known to be vulnerable to various intrusions including unauthorized router access, man-in-the-middle attacks, spoofing, denial of service attacks, brute-force attacks, and traffic injections [30]. In addition, most free wireless networks in public place, which have not been certified, are untrusted networks [31].…”
Section: Insecure Networkmentioning
confidence: 99%
“…Because of the convenience and low cost, a number of devices and software services rely heavily on wireless networks, such as WiFi, which are known to be vulnerable to various intrusions including unauthorized router access, man-in-the-middle attacks, spoofing, denial of service attacks, brute-force attacks, and traffic injections [30]. In addition, most free wireless networks in public place, which have not been certified, are untrusted networks [31].…”
Section: Insecure Networkmentioning
confidence: 99%
“…Some researchers suggest exploiting differential privacy, a convincing model for providing privacy, to protect aggregated data generated by IoT devices. Han et al in [37] proposed a scheme to provide privacy preserving for health data aggregation. It employs a differential privacy model to resist differential attacks that most existing data aggregation schemes have suffered from.…”
Section: Related Workmentioning
confidence: 99%
“…Since sensor node life (SL) is inversely proportional to CC and CO while EC is directly proportional to CC and CO. [20] High Small Small High Yes High Zhang et al [21] High Small Small High Yes High Therefore Hayouni et al [5] have small SL and high energy consumption (EC). Finster and Baumgart [11] high SL and medium EC.…”
Section: Sensor Node Life and Energy Consumptionmentioning
confidence: 99%
“…Moreover, the algorithms proposed in Refs. [17,19,20] use PKC both for encryption and signature and thus due to their very high computational cost SL is very small and consume a lot of energy ( Table 2).…”
Section: Sensor Node Life and Energy Consumptionmentioning
confidence: 99%