A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
An IoT-Based Body Area Network in Medical Care System: Related Challenges and Issues
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
However, the increased use of IoT facilities in e-health applications, particularly in the insurance field, has resulted in increased security and privacy issues. ...
Medical applications are prone to data violations and widening security problems due to the increase in access points to sensitive data through electronic medical records and the increasing popularity of wearable ...
It uses User Authentication and User Anonymity Scheme with Provably Security.
5 Authors in, [22] The user authentication system presented is extremely useful method for providing access with more secure ...
doi:10.35940/ijitee.l2545.119119
fatcat:y4esyoy4mncuxermdpf27xmxle
Opportunistic Multi-Modal User Authentication for Health-Tracking IoT Wearables
[article]
2021
arXiv
pre-print
These results show promise in using SpO2 along with other biometrics to develop implicit continuous authentications for wearables. ...
data, such as gait and heart rate, collected by the wearables to authenticate a wearable user implicitly with a limited accuracy due to sensing and computing constraints of wearables. ...
While the IoT wearables are helping us with a wide range of services [6] , these wearables also have the potential to authenticate a user implicitly and thereby secure the user's access to other IoT objects ...
arXiv:2109.13705v2
fatcat:utxzvembkjdyxp5rbdml7u6zry
Secure Non-public Health Enterprise Networks
[article]
2020
arXiv
pre-print
The biometric collection can be done using ambient or IoT sensors as well as wearable or implantable devices to monitor the patient unobtrusively. ...
We present the three tier architecture model describing continuous authentication mechanisms based on biometric collection as well as the dynamic network solutions in the healthcare domain. ...
Continuous Authentication Whilst our review of related continuous authentication literature found applicable studies that could be used to authenticate the IoT devices that medical professionals use to ...
arXiv:2004.13085v1
fatcat:wgbhkz5lovcojkfcrhmar7wqni
Health Care Monitor with Emergency Support
2018
International Journal of Trend in Scientific Research and Development
Remote health monitoring can be best utilized provided the device is wearable to facilitate continuous self monitoring. ...
In this paper, we propose a system for monitoring of pulse rate, body temperature and oxygen level in blood (vital body parameters) of the person with dedicated sensors along with electrodes using arduino ...
It is an active approach that continuously monitors the user and fails authentication only when the user readiness status is deemed to be weak. ...
doi:10.31142/ijtsrd10802
fatcat:mcwaygroenc3dd2yjyujyln5ai
You Walk, We Authenticate: Lightweight Seamless Authentication based on Gait in Wearable IoT Systems
2019
IEEE Access
INDEX TERMS User authentication, gait, wearable device, Internet of Things, machine learning. ...
Interestingly, some of these activities exhibit distinct patterns for each individual, which can provide an opportunity to extract useful features for user authentication. ...
ALTERNATIVE AUTHENTICATION USING WEARABLES Yoon et al. [22] utilized the ambient light sensor for users to type PIN code in user authentication. ...
doi:10.1109/access.2019.2906663
fatcat:3ltqnp4sdrhydh4cznozhv7auu
A Survey Study of the Current Challenges and Opportunities of Deploying the ECG Biometric Authentication Method in IoT and 5G Environments
2021
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
that must be addressed and resolved in any future related research. 120 During the COVID-19 pandemic, IoT devices such as smartphones with embedded sensors using machine learning techniques have intelligently ...
In addition, vocal features may be used in voice biometric authentication. ...
These numbers show that the demand for wearable IoT devices will continue increasing sharply in the coming years. ...
doi:10.52549/ijeei.v9i2.2890
fatcat:cvfkcwspvbf2hdcawv4xbxpm34
Wearable Sensors and Systems in the IoT
2021
Sensors
Wearable smart devices are widely used to determine various physico-mechanical parameters at chosen intervals. ...
Acknowledgments: Guest editors of this Special Issue would like to thank all authors who have submitted their manuscripts for considering the Sensors journal, and the reviewers for their hard work during ...
Using the IoT gateway as an intermediate hub between the wearable devices and the IoT server, bidirectional communication between the end user and medics can be established in real time Haghi et al. ...
doi:10.3390/s21237880
pmid:34883879
fatcat:jyir2emkv5divo4bhxz7briz5q
On the security of consumer wearable devices in the Internet of Things
2018
PLoS ONE
This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. ...
Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission ...
The research shows that it is possible to use a wrist wearable health sensor called the Shimmer sensor to uniquely identify a user through their physiological signals [9] . ...
doi:10.1371/journal.pone.0195487
pmid:29668756
pmcid:PMC5905955
fatcat:c3vy5ed4yjbjllm22pb4mfuz4u
Biometric-Based Wearable User Authentication During Sedentary and Non-sedentary Periods
[article]
2018
arXiv
pre-print
In this paper, we present an implicit wearable device user authentication mechanism using combinations of three types of coarse-grained minute-level biometrics: behavioral (step counts), physiological ...
Therefore, there is a need for a burden-free (implicit) authentication mechanism for wearable device users based on easily obtainable biometric data. ...
Existing wearable device authentication mechanisms include knowledge-based regular PIN locks or pattern locks [2] , which suffer from scalability concerns [6] , since in the IoT world users are flooded ...
arXiv:1811.07060v1
fatcat:27p5igrkqbhdpfqcznuge2wsre
Technological Features of Internet of Things in Medicine: A Systematic Mapping Study
2020
Wireless Communications and Mobile Computing
It was found that IoT studies, with a publication rise between 2015 and 2018, predominantly dealt with the following IoT features: (a) wearable sensor types of chiefly accelerometer and ECG placed on 16 ...
consumption and costs, and finally uncovering the security methods, usually used in IoT applications, in order to make other applications more trustworthy. ...
Wearable IoT devices are used in medicine as sensors attached to the body to monitor the health of the patients [16] . ...
doi:10.1155/2020/9238614
fatcat:hj7x2pqxybh27ochjm3hi7mbru
Authentication with What You See and Remember in the Internet of Things
2018
Symmetry
Authentication in IoT involves not only shifting intelligent access control down to the end smart objects, but also user identification and verification. ...
In the proposed system, we use a commercially available brainwave headset to collect brainwave data from participants for use in the proposed authentication system. ...
, sensors, wearable healthcare devices, and so on. ...
doi:10.3390/sym10110537
fatcat:mxn2czzi5jafffe4vefqbfs7ky
HIAuth: A Hierarchical Implicit Authentication System for IoT Wearables Using Multiple Biometrics
2021
IEEE Access
are not only burdensome for users in the age of the internet of things (IoT) when the users are already flooded with so many passwords. ...
Unfortunately, due to various limitations, most of the market-wearables either do not have any user authentication or have a knowledge-based authentication, such as passwords, PINs, or pattern locks, which ...
.
3) Wearable Authentication Wearables, such as smartwatches, are continuously used compared to other IoT objects, such as smartphones. ...
doi:10.1109/access.2021.3105481
fatcat:7lowhpd2jncn7dymm3nfkkibhq
Identifying Users with Wearable Sensors based on Activity Patterns
2020
Procedia Computer Science
Three machine learning classifiers have been used to discover the activity patterns of users given the data captured from wearable sensors. ...
Three machine learning classifiers have been used to discover the activity patterns of users given the data captured from wearable sensors. ...
Wearable sensors are attached to the body unobtrusively and can continuously authenticate users based on their behavioral biometrics [15] . ...
doi:10.1016/j.procs.2020.10.005
fatcat:t7p3c2v5lvgljiub7ek5ofgbri
Securing Communication in the IoT- Based Power Constrained Devices in Health Care System
2021
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
To make sensors wearable and wireless, it should be small in dimensions and also the energy, memory, and processing power available also matters. ...
The core part of IoT constitutes sensors and various devices for diagnosis and imaging. Now-a-days sensors are becoming smaller, allowing them to be worn without interfering with daily activities.. ...
Privacy protection of users and anonymous authentication of users and privacy access control .It ensures that the sensitive information of users is not disclosed. ...
doi:10.35940/ijitee.g9034.0510721
fatcat:lbyr6aznxfeozdsjbk4pgrupqa
WSNs and IoT Their Challenges and applications for Healthcare and Agriculture: A Survey
2020
Iraqi Journal for Electrical And Electronic Engineering
Sensor networks emerge as an attractive technology with great promise for the future. ...
These aspects are the challenges of network construction in which authentication, confidentiality, availability, integrity, network development. ...
Then the user authentication ensures that only licensed users access data from the sensor node. ...
doi:10.37917/ijeee.sceeer.3rd.6
fatcat:pnd6ugts75dpxo4ek2yj3lacam
« Previous
Showing results 1 — 15 out of 3,224 results