[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ghubaish et al., 2020 - Google Patents

Recent advances in the internet-of-medical-things (IoMT) systems security

Ghubaish et al., 2020

View PDF
Document ID
6273459897884941115
Author
Ghubaish A
Salman T
Zolanvari M
Unal D
Al-Ali A
Jain R
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to- machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare systems are among these applications …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/04Key management

Similar Documents

Publication Publication Date Title
Ghubaish et al. Recent advances in the internet-of-medical-things (IoMT) systems security
Narwal et al. A survey on security and authentication in wireless body area networks
Sun et al. Security and privacy for the internet of medical things enabled healthcare systems: A survey
Karunarathne et al. Security and privacy in IoT smart healthcare
Zheng et al. Ideas and challenges for securing wireless implantable medical devices: A review
Wu et al. Access control schemes for implantable medical devices: A survey
Zou et al. A survey on secure wireless body area networks
Sawand et al. Toward energy-efficient and trustworthy eHealth monitoring system
Rathore et al. A review of security challenges, attacks and resolutions for wireless medical devices
Challa et al. Authentication protocols for implantable medical devices: Taxonomy, analysis and future directions
US20150089590A1 (en) Methods for secure control of and secure data extraction from implantable medical devices using smartphones or other mobile devices
Altamimi Security and privacy issues in eHealthcare systems: Towards trusted services
Mucchi et al. An overview of security threats, solutions and challenges in wbans for healthcare
Ellouze et al. Powerless security for cardiac implantable medical devices: Use of wireless identification and sensing platform
Siddiqi et al. Attack-tree-based Threat Modeling of Medical Implants.
Zheng et al. From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices
Ellouze et al. Security of implantable medical devices: Limits, requirements, and proposals
Soni et al. New directions for security attacks, privacy, and malware detection in WBAN
Morales et al. Comprehensive security for body area networks: A survey
Arya et al. Data security for WBAN in e-health IoT applications
Kanjee et al. Authentication and key relay in medical cyber‐physical systems
Marin et al. A survey on physiological-signal-based security for medical devices
Mohsen et al. Authentication protocol for real-time wearable medical sensor networks using biometrics and continuous monitoring
Chi et al. e-safe: Secure, efficient and forensics-enabled access to implantable medical devices
Hireche et al. Fault tolerance and security management in IoMT