The Second International Conference on Availability, Reliability and Security (ARES'07) 2007
DOI: 10.1109/ares.2007.135
|View full text |Cite
|
Sign up to set email alerts
|

Securing Medical Sensor Environments: The CodeBlue Framework Case

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(29 citation statements)
references
References 8 publications
0
29
0
Order By: Relevance
“…But, so far their proposed solution has not been implemented yet. Kambourakis et al discuss some attack models and security threats concerning the CodeBlue project: denial-of-service attack, snooping attack, grey-hole attack, sybil attack, and masquerading attacks 15 . To establish an interoperable network security between end-peers from independent network domains, variants of conventional end-to-end security protocols have been recently proposed among which Datagram Transport Layer Security (DTLS) is one of the most relevant protocols 17 .…”
Section: Iot-based Healthcare Securitymentioning
confidence: 99%
“…But, so far their proposed solution has not been implemented yet. Kambourakis et al discuss some attack models and security threats concerning the CodeBlue project: denial-of-service attack, snooping attack, grey-hole attack, sybil attack, and masquerading attacks 15 . To establish an interoperable network security between end-peers from independent network domains, variants of conventional end-to-end security protocols have been recently proposed among which Datagram Transport Layer Security (DTLS) is one of the most relevant protocols 17 .…”
Section: Iot-based Healthcare Securitymentioning
confidence: 99%
“…And the real-time and continuous triage information must be distributed to health care providers. Light weight and no-intrusive biomedical sensors are easy to be deployed for continuously monitoring the vital signs of a patient and deliver the data to the first responders [2][6] [1]. For example, a wireless infrastructure for emergency response.…”
Section: Introductionmentioning
confidence: 99%
“…Kambourakis et al, in [2] discussed the routing and security issues in the CodeBlue framework. In the CodeBlue the position of a patient can be traced using a decentralized RF-based tracking system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…After the progress of telemedicine in the typical E-Health to M-Health, researchers are progressing towards UHealth. Despite the current efforts in U-Healthcare, due to its shortcomings, it has not been adopted completely [2].…”
Section: Introductionmentioning
confidence: 99%