loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Neila Mekki 1 ; Mohamed Hamdi 2 ; Taoufik Aguili 1 and Tai-Hoon Kim 3

Affiliations: 1 National Engineering School of Tunis, (ENIT), University of Tunis El Manar and (UTM), Tunisia ; 2 Higher School of Communication of Tunis, Sup'Com and University of Carthage, Tunisia ; 3 University of Tasmania, Australia

Keyword(s): Healthcare, Internet of Things, Scenario, Security Requirements

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Engineering ; Data Integrity ; Data Protection ; Databases and Data Security ; Identification, Authentication and Non-Repudiation ; Information and Systems Security ; Information Assurance ; Network Security ; Risk Assessment ; Wireless Network Security

Abstract: The Internet of Things (IoT) is one of the revolutionary technologies for healthcare. However, this flourishing still faces too many challenges including security and privacy preservation information. To address these problems, our contribution is to present a scenario of diabetes disease assume a matching between the situation of the patient and the relevant data from monitoring point view. This scenario describes how a patient can collect enormous of vital sign and activity. Wireless Body Sensor Networks (WBSN) is one of the IoT building blocks in which a patient can be monitored using a collection of sensor nodes to improve the patients quality of life. This technology in healthcare applications should not ignore security requirements. The aim of this paper is, (1) to design a healthcare architecture for a patient monitoring system, and (2) to explore the major security requirements in WBSN.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.81.79.135

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Mekki, N.; Hamdi, M.; Aguili, T. and Kim, T. (2017). Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT; ISBN 978-989-758-259-2; ISSN 2184-3236, SciTePress, pages 554-559. DOI: 10.5220/0006473005540559

@conference{secrypt17,
author={Neila Mekki. and Mohamed Hamdi. and Taoufik Aguili. and Tai{-}Hoon Kim.},
title={Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT},
year={2017},
pages={554-559},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006473005540559},
isbn={978-989-758-259-2},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT
TI - Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System
SN - 978-989-758-259-2
IS - 2184-3236
AU - Mekki, N.
AU - Hamdi, M.
AU - Aguili, T.
AU - Kim, T.
PY - 2017
SP - 554
EP - 559
DO - 10.5220/0006473005540559
PB - SciTePress