2015
DOI: 10.1016/j.procs.2015.05.013
|View full text |Cite
|
Sign up to set email alerts
|

SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways

Abstract: In this paper, a secure and efficient authentication and authorization architecture for IoT-based healthcare is developed. Security and privacy of patients' medical data are crucial for the acceptance and ubiquitous use of IoT in healthcare. Secure authentication and authorization of a remote healthcare professional is the main focus of this work. Due to resource constraints of medical sensors, it is infeasible to utilize conventional cryptography in IoT-based healthcare. In addition, gateways in existing IoTs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
90
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 229 publications
(91 citation statements)
references
References 18 publications
1
90
0
Order By: Relevance
“…User names and passwords, biometric(finger, iris, face ,ECG etc), HIPPA policies, ABE(attribute based encryption) on patient health record, kerberos server authentication, SEA(Secure and efficient authentication using smart gateways [7] User names and passwords can be easily hacked. Biometrics guarantees high levels of security compared to traditional user names and passwords.…”
Section: Security Challenges In Cloud Health Carementioning
confidence: 99%
“…User names and passwords, biometric(finger, iris, face ,ECG etc), HIPPA policies, ABE(attribute based encryption) on patient health record, kerberos server authentication, SEA(Secure and efficient authentication using smart gateways [7] User names and passwords can be easily hacked. Biometrics guarantees high levels of security compared to traditional user names and passwords.…”
Section: Security Challenges In Cloud Health Carementioning
confidence: 99%
“…Rahimi et al [29,30] introduced a more secure and powerful user authentication and key agreement technique for fitness-IoT structures which requires considerable processing power. It exploits the property of a sensible gateway in fog computing for critical and security services-associated organization.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Other conceivable assaults are participant impersonation attacks, brute-force attacks, or dictionary assaults. Furthermore, an illegal participant may misuse the other participant's personal information to conduct various login sessions and follow participant's exercises by phishing techniques [30]. Also, the breaching of user privacy and their routine activities may likewise encourage an unapproved user to follow the participant's login history and even their current location.…”
Section: Security Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, in the paper the authors propose a technical solution to protect data in distributed systems [12]. The paper is devoted to the issue of authorization and authentication in medical systems data [13]. The technical solutions how to protect data in the energy consumption system [14] and "smart" city [15] are described.…”
Section: Introductionmentioning
confidence: 99%