Ghubaish et al., 2020 - Google Patents
Recent advances in the internet-of-medical-things (IoMT) systems securityGhubaish et al., 2020
View PDF- Document ID
- 6273459897884941115
- Author
- Ghubaish A
- Salman T
- Zolanvari M
- Unal D
- Al-Ali A
- Jain R
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to- machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare systems are among these applications …
- 238000000034 method 0 abstract description 100
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/04—Key management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ghubaish et al. | Recent advances in the internet-of-medical-things (IoMT) systems security | |
Narwal et al. | A survey on security and authentication in wireless body area networks | |
Sun et al. | Security and privacy for the internet of medical things enabled healthcare systems: A survey | |
Karunarathne et al. | Security and privacy in IoT smart healthcare | |
Zheng et al. | Ideas and challenges for securing wireless implantable medical devices: A review | |
Wu et al. | Access control schemes for implantable medical devices: A survey | |
Zou et al. | A survey on secure wireless body area networks | |
Sawand et al. | Toward energy-efficient and trustworthy eHealth monitoring system | |
Rathore et al. | A review of security challenges, attacks and resolutions for wireless medical devices | |
Challa et al. | Authentication protocols for implantable medical devices: Taxonomy, analysis and future directions | |
US20150089590A1 (en) | Methods for secure control of and secure data extraction from implantable medical devices using smartphones or other mobile devices | |
Altamimi | Security and privacy issues in eHealthcare systems: Towards trusted services | |
Mucchi et al. | An overview of security threats, solutions and challenges in wbans for healthcare | |
Ellouze et al. | Powerless security for cardiac implantable medical devices: Use of wireless identification and sensing platform | |
Siddiqi et al. | Attack-tree-based Threat Modeling of Medical Implants. | |
Zheng et al. | From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices | |
Ellouze et al. | Security of implantable medical devices: Limits, requirements, and proposals | |
Soni et al. | New directions for security attacks, privacy, and malware detection in WBAN | |
Morales et al. | Comprehensive security for body area networks: A survey | |
Arya et al. | Data security for WBAN in e-health IoT applications | |
Kanjee et al. | Authentication and key relay in medical cyber‐physical systems | |
Marin et al. | A survey on physiological-signal-based security for medical devices | |
Mohsen et al. | Authentication protocol for real-time wearable medical sensor networks using biometrics and continuous monitoring | |
Chi et al. | e-safe: Secure, efficient and forensics-enabled access to implantable medical devices | |
Hireche et al. | Fault tolerance and security management in IoMT |