2017
DOI: 10.3390/app7101069
|View full text |Cite
|
Sign up to set email alerts
|

Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT

Abstract: Internet-of-Things (IoT) include a large number of devices that can communicate across different networks. Cyber-Physical Systems (CPS) also includes a number of devices connected to the internet where wearable devices are also included. Both systems enable researchers to develop healthcare systems with additional intelligence as well as prediction capabilities both for lifestyle and in hospitals. It offers as much persistence as a platform to ubiquitous healthcare by using wearable sensors to transfer the inf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 43 publications
0
14
0
Order By: Relevance
“…It provides secure and anonymity based remote conversation between authenticated patient and healthcare professional. This research work provides a platform for privacy preserved and secure healthcare based data transmission [58]. In lightweight data aggregation schemes, security is an essential need for the deployment of e-healthcare applications.…”
Section: B Secure Healthcare Data Aggregationmentioning
confidence: 99%
See 1 more Smart Citation
“…It provides secure and anonymity based remote conversation between authenticated patient and healthcare professional. This research work provides a platform for privacy preserved and secure healthcare based data transmission [58]. In lightweight data aggregation schemes, security is an essential need for the deployment of e-healthcare applications.…”
Section: B Secure Healthcare Data Aggregationmentioning
confidence: 99%
“…In these schemes, only SAPS [58], HMAC [59], AVISPA [60], PCDA [61] analyzed metrics while comparing with other schemes, four of them present metrics for communication costs. Low computation and storage costs are explored in [58], low computational cost and energy consumption in [59], [60], minimum energy consumption with high computation cost in [61], anonymous and secure transaction of healthcare data in [62], [63]. Section-III elaborates eight different schemes based on secure data aggregation schemes using Fog computing in healthcare.…”
Section: Comparative Analysismentioning
confidence: 99%
“…It is important to realize that many IoT devices, such as a smart coffee maker, for example, only contain an embedded processor and, as a rule, do not have general-purpose compute capabilities. Being ubiquitous and pervasive, IoT systems are expected to see a wide adoption in industrial applications [101,102], healthcare [103][104][105][106] and, more broadly, to be incorporated in the fabric of a Smart City or Smart Community [59,98,[107][108][109].…”
Section: The Internet Of Thingsmentioning
confidence: 99%
“…These challenges need to be addressed before IoTs are to see the predicted phenomenal adoption rate. For example, the problem of IoT system security and privacy is becoming significant in the context of Smart Cities and Smart Communities [103,[110][111][112].…”
Section: The Internet Of Thingsmentioning
confidence: 99%
“…In [18], Mahmood et al proposed a secure authentication and prescription safety protocol to facilitate secure communication between patients and caregivers remotely. The protocol is validated via formal modeling using Rubin logic and via simulation using NS-2.…”
Section: Health Itmentioning
confidence: 99%