Proceedings ArticleDOI
A Simple Approach for Securing IoT Data Transmitted over Multi-RATs
Rida Diba,Elias Yaacoub,Mohammed Al-Husseini,Hassan N. Noura,Khalid Abualsaud,Tamer Khattab,Mohsen Guizani +6 more
- pp 249-254
Reads0
Chats0
TLDR
The presented approach consists of benefiting of the presence of multi-RATs in order to exchange the secrecy information more efficiently while optimizing the transmission time.Abstract:
In an mHealth remote patient monitoring scenario, usually control units/data aggregators receive data from the body area network (BAN) sensors then send it to the network or “cloud” The control unit would have to transmit the measurement data to the home access point (AP) using WiFi for example, or directly to a cellular base station (BS), eg, using the long-term evolution (LTE) technology, or both (eg, using multi- homing to transmit over multiple radio access technologies (Multi-RATs) Fast encryption or physical layer security techniques are needed to secure the data In fact, during normal conditions, monitoring data can be transmitted using best effort transmission However, when real-time processing detects an emergency situation, the current monitoring data should be transmitted real-time to the appropriate medical personnel in emergency response teams In this paper, a fast and secure approach for transmitting monitoring data over multi-RATs is proposed The presented approach consists of benefiting of the presence of multi-RATs in order to exchange the secrecy information more efficiently while optimizing the transmission timeread more
Citations
More filters
Journal ArticleDOI
Cyber-Physical Systems Security: Limitations, Issues and Future Trends
TL;DR: The main aspects of CPS and the corresponding applications, technologies, and standards are surveyed and the existing security measures are presented and analyzed while identifying their main limitations.
Journal ArticleDOI
Multi-Connectivity as an Enabler for Reliable Low Latency Communications—An Overview
TL;DR: This survey provides a definition for MC, identifies main scheduling categories, compares different network architectures and considers different layers for implementing MC, and suggests further research directions such as the OSI Layer where separation and aggregation of the different paths for MC is performed.
Journal ArticleDOI
Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study
TL;DR: Results suggest that the existing research on security and privacy of m/uHealth systems primarily focuses on select group of control families (compliant with NIST800-53), protection of systems and information, access control, authentication, individual participation, and privacy authorisation.
Dissertation
DAWWSEN a defense mechanism against wormhole attacks in wireless sensor networks - by Rouba Zakaria El Kaissi
El Kaissi,Rouba Zakaria +1 more
TL;DR: Thesis (M.E.) as discussed by the authors, American University of Beirut, Dept. of Electrical and Computer Engineering, 2005;"Advisor: Dr. Ayman Kayssi, Professor, Electrical & Computer Engineering; member of Committee: Dr Ali Chehab, Assistant Professor, electrical and computer engineering;
Journal ArticleDOI
Secure mHealth IoT Data Transfer from the Patient to the Hospital: A Three-Tier Approach
TL;DR: The proposed methods range from physical layer security techniques designed for low portable sensors deployed at the patient's home or body, to combining traditional encryption methods with additional security procedures at the cloud data center where the medical records are stored.
References
More filters
Journal ArticleDOI
The Internet of Things for Health Care: A Comprehensive Survey
TL;DR: An intelligent collaborative security model to minimize security risk is proposed; how different innovations such as big data, ambient intelligence, and wearables can be leveraged in a health care context is discussed; and various IoT and eHealth policies and regulations are addressed to determine how they can facilitate economies and societies in terms of sustainable development.
Journal ArticleDOI
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
Pardeep Kumar,Hoon-Jae Lee +1 more
TL;DR: The security and privacy issues in healthcare application using WMSNs are discussed, some popular healthcare projects using wireless medical sensor networks are highlighted, and their security is discussed, and a summary of open security research issues that need to be explored for future healthcare applications using W MSNs are explored.
Proceedings ArticleDOI
Security of mobile health (mHealth) systems
TL;DR: This survey discusses the security and privacy issues in current mHealth systems and their impact, and discusses the latest threats, attacks and proposed countermeasures that could support secure sensitive m health systems.
Book
Wireless body area network
TL;DR: The objective of this research was to establish a standards-based approach to antenna and radio propagation that addressed the challenges faced by existing systems in the rapidly changing environment.
Journal ArticleDOI
An optimized approach to video traffic splitting in heterogeneous wireless networks with energy and QoE considerations
TL;DR: Results show the performance effectiveness of the proposed traffic splitting approach in terms of throughput, delay, queue stability, energy consumption and quality of user experience by monitoring the frequency and lengths of video stalls.