2021 IEEE Bombay Section Signature Conference (IBSSC) 2021
DOI: 10.1109/ibssc53889.2021.9673462
|View full text |Cite
|
Sign up to set email alerts
|

Reliable and Secure Data Transmission in Smart Healthcare Application of Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…On one hand, social relationships between network nodes and corresponding trust management can be exploited to route information through a secure path towards the destination, as suggested by [84]. Another relevant approach is that in [85], where trust is exploited in combination with lightweight cryptography to reduce routing computational complexity and overhead, thus leading to an overall secure and low-latency scheme. On the other hand, if RPL is considered, several threats are possible [86], [87] and, therefore, various secure approaches to counter-act them, either reactive or proactive, can be applied.…”
Section: ) Low-latency Communicationsmentioning
confidence: 99%
“…On one hand, social relationships between network nodes and corresponding trust management can be exploited to route information through a secure path towards the destination, as suggested by [84]. Another relevant approach is that in [85], where trust is exploited in combination with lightweight cryptography to reduce routing computational complexity and overhead, thus leading to an overall secure and low-latency scheme. On the other hand, if RPL is considered, several threats are possible [86], [87] and, therefore, various secure approaches to counter-act them, either reactive or proactive, can be applied.…”
Section: ) Low-latency Communicationsmentioning
confidence: 99%
“…In the real world, safe and secure connections are primary challenges due to the heterogeneity of IoT tools, and the shortage of resources, while some of the resources connected to the internet protocol (IP) hosts are powerful. Furthermore, IoT-connected devices must be secure with authentications like end-to-end (E2E) connections [9]- [11]. Like other networks, IoT security is dependent on confidentiality and trust.…”
Section: Introductionmentioning
confidence: 99%