2018 Systems and Information Engineering Design Symposium (SIEDS) 2018
DOI: 10.1109/sieds.2018.8374726
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of an IoT system used for indoor localization in healthcare facilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(27 citation statements)
references
References 21 publications
0
26
0
1
Order By: Relevance
“…All the other attacks considered for future implementations. Authors of [9], develops the IoT based system for healthcare for the location of patients in healthcare facilities. Paper demonstrated the DoS attack on the healthcare IoT system using Kali Linux and hydra tool.…”
Section: Related Workmentioning
confidence: 99%
“…All the other attacks considered for future implementations. Authors of [9], develops the IoT based system for healthcare for the location of patients in healthcare facilities. Paper demonstrated the DoS attack on the healthcare IoT system using Kali Linux and hydra tool.…”
Section: Related Workmentioning
confidence: 99%
“…Authors [10] understand the problem of RPL protocol that the protocol is unable to provide protection for DODAG hence they had proposed VeRA the version number and rank authentication scheme, which uses the one-way hash, chain, however, authors failed to provide the details of the energy consumption or CPU consumption values. To prevent the DAG inconsistency caused by version number attack, the authors [11] put forth the rank authentication mechanism. They proposed the Trust Anchor Interconnection Loop (TRAIL), where the root node acted as an anchor node and the root node must validate the rank value.…”
Section: Literature Surveymentioning
confidence: 99%
“…Furthermore, the medical sensor nodes are used in e-healthcarebased applications in which the patient's vital data is communicated to the healthcare providers over wireless networks. Bradley et al [121] have described the adoption of IoT technology in healthcare and pointed out the impact of SCA in the healthcare-IoT environment.…”
Section: Case Study: Sca Security Of Medical Sensor Nodementioning
confidence: 99%
“…Bradley et al . [121] have described the adoption of IoT technology in healthcare and pointed out the impact of SCA in the healthcare‐IoT environment.…”
Section: Side‐channel Security Of Intelligent Sensor Networkmentioning
confidence: 99%