3,219 Hits in 2.9 sec

An IoT-Based Body Area Network in Medical Care System: Related Challenges and Issues

However, the increased use of IoT facilities in e-health applications, particularly in the insurance field, has resulted in increased security and privacy issues.  ...  Medical applications are prone to data violations and widening security problems due to the increase in access points to sensitive data through electronic medical records and the increasing popularity of wearable  ...  It uses User Authentication and User Anonymity Scheme with Provably Security. 5 Authors in, [22] The user authentication system presented is extremely useful method for providing access with more secure  ... 
doi:10.35940/ijitee.l2545.119119 fatcat:y4esyoy4mncuxermdpf27xmxle

Opportunistic Multi-Modal User Authentication for Health-Tracking IoT Wearables [article]

Alexa Muratyan, William Cheung, Sayanton V. Dibbo, Sudip Vhaduri
2021 arXiv   pre-print
These results show promise in using SpO2 along with other biometrics to develop implicit continuous authentications for wearables.  ...  data, such as gait and heart rate, collected by the wearables to authenticate a wearable user implicitly with a limited accuracy due to sensing and computing constraints of wearables.  ...  While the IoT wearables are helping us with a wide range of services [6] , these wearables also have the potential to authenticate a user implicitly and thereby secure the user's access to other IoT objects  ... 
arXiv:2109.13705v2 fatcat:utxzvembkjdyxp5rbdml7u6zry

Secure Non-public Health Enterprise Networks [article]

Mona Ghassemian, Max Smith-Creasey, Maziar Nekovee
2020 arXiv   pre-print
The biometric collection can be done using ambient or IoT sensors as well as wearable or implantable devices to monitor the patient unobtrusively.  ...  We present the three tier architecture model describing continuous authentication mechanisms based on biometric collection as well as the dynamic network solutions in the healthcare domain.  ...  Continuous Authentication Whilst our review of related continuous authentication literature found applicable studies that could be used to authenticate the IoT devices that medical professionals use to  ... 
arXiv:2004.13085v1 fatcat:wgbhkz5lovcojkfcrhmar7wqni

Health Care Monitor with Emergency Support

K. Ratna, G. Shruthi, R. Sorna Manjari | S. Suryakala | V. Rathinapriya
2018 International Journal of Trend in Scientific Research and Development  
Remote health monitoring can be best utilized provided the device is wearable to facilitate continuous self monitoring.  ...  In this paper, we propose a system for monitoring of pulse rate, body temperature and oxygen level in blood (vital body parameters) of the person with dedicated sensors along with electrodes using arduino  ...  It is an active approach that continuously monitors the user and fails authentication only when the user readiness status is deemed to be weak.  ... 
doi:10.31142/ijtsrd10802 fatcat:mcwaygroenc3dd2yjyujyln5ai

You Walk, We Authenticate: Lightweight Seamless Authentication based on Gait in Wearable IoT Systems

Pratik Musale, Duin Baek, Nuwan Werellagama, Simon S. Woo, Bong Jun Choi
2019 IEEE Access  
INDEX TERMS User authentication, gait, wearable device, Internet of Things, machine learning.  ...  Interestingly, some of these activities exhibit distinct patterns for each individual, which can provide an opportunity to extract useful features for user authentication.  ...  ALTERNATIVE AUTHENTICATION USING WEARABLES Yoon et al. [22] utilized the ambient light sensor for users to type PIN code in user authentication.  ... 
doi:10.1109/access.2019.2906663 fatcat:3ltqnp4sdrhydh4cznozhv7auu

A Survey Study of the Current Challenges and Opportunities of Deploying the ECG Biometric Authentication Method in IoT and 5G Environments

Ahmed Younes Shdefat, Nour Mostafa, Louai Saker, Ahmet Topcu
2021 Indonesian Journal of Electrical Engineering and Informatics (IJEEI)  
that must be addressed and resolved in any future related research. 120 During the COVID-19 pandemic, IoT devices such as smartphones with embedded sensors using machine learning techniques have intelligently  ...  In addition, vocal features may be used in voice biometric authentication.  ...  These numbers show that the demand for wearable IoT devices will continue increasing sharply in the coming years.  ... 
doi:10.52549/ijeei.v9i2.2890 fatcat:cvfkcwspvbf2hdcawv4xbxpm34

Wearable Sensors and Systems in the IoT

Subhas Mukhopadhyay, Nagender Suryadevara, Anindya Nag
2021 Sensors  
Wearable smart devices are widely used to determine various physico-mechanical parameters at chosen intervals.  ...  Acknowledgments: Guest editors of this Special Issue would like to thank all authors who have submitted their manuscripts for considering the Sensors journal, and the reviewers for their hard work during  ...  Using the IoT gateway as an intermediate hub between the wearable devices and the IoT server, bidirectional communication between the end user and medics can be established in real time Haghi et al.  ... 
doi:10.3390/s21237880 pmid:34883879 fatcat:jyir2emkv5divo4bhxz7briz5q

On the security of consumer wearable devices in the Internet of Things

Hasan Tahir, Ruhma Tahir, Klaus McDonald-Maier, Kim-Kwang Raymond Choo
2018 PLoS ONE  
This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor.  ...  Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission  ...  The research shows that it is possible to use a wrist wearable health sensor called the Shimmer sensor to uniquely identify a user through their physiological signals [9] .  ... 
doi:10.1371/journal.pone.0195487 pmid:29668756 pmcid:PMC5905955 fatcat:c3vy5ed4yjbjllm22pb4mfuz4u

Biometric-Based Wearable User Authentication During Sedentary and Non-sedentary Periods [article]

Sudip Vhaduri, Christian Poellabauer
2018 arXiv   pre-print
In this paper, we present an implicit wearable device user authentication mechanism using combinations of three types of coarse-grained minute-level biometrics: behavioral (step counts), physiological  ...  Therefore, there is a need for a burden-free (implicit) authentication mechanism for wearable device users based on easily obtainable biometric data.  ...  Existing wearable device authentication mechanisms include knowledge-based regular PIN locks or pattern locks [2] , which suffer from scalability concerns [6] , since in the IoT world users are flooded  ... 
arXiv:1811.07060v1 fatcat:27p5igrkqbhdpfqcznuge2wsre

Technological Features of Internet of Things in Medicine: A Systematic Mapping Study

Ali Behmanesh, Nasrin Sayfouri, Farahnaz Sadoughi
2020 Wireless Communications and Mobile Computing  
It was found that IoT studies, with a publication rise between 2015 and 2018, predominantly dealt with the following IoT features: (a) wearable sensor types of chiefly accelerometer and ECG placed on 16  ...  consumption and costs, and finally uncovering the security methods, usually used in IoT applications, in order to make other applications more trustworthy.  ...  Wearable IoT devices are used in medicine as sensors attached to the body to monitor the health of the patients [16] .  ... 
doi:10.1155/2020/9238614 fatcat:hj7x2pqxybh27ochjm3hi7mbru

Authentication with What You See and Remember in the Internet of Things

Wayne Chiu, Chunhua Su, Chuan-Yen Fan, Chien-Ming Chen, Kuo-Hui Yeh
2018 Symmetry  
Authentication in IoT involves not only shifting intelligent access control down to the end smart objects, but also user identification and verification.  ...  In the proposed system, we use a commercially available brainwave headset to collect brainwave data from participants for use in the proposed authentication system.  ...  , sensors, wearable healthcare devices, and so on.  ... 
doi:10.3390/sym10110537 fatcat:mxn2czzi5jafffe4vefqbfs7ky

HIAuth: A Hierarchical Implicit Authentication System for IoT Wearables Using Multiple Biometrics

Sudip Vhaduri, Sayanton V. Dibbo, William Cheung
2021 IEEE Access  
are not only burdensome for users in the age of the internet of things (IoT) when the users are already flooded with so many passwords.  ...  Unfortunately, due to various limitations, most of the market-wearables either do not have any user authentication or have a knowledge-based authentication, such as passwords, PINs, or pattern locks, which  ...  . 3) Wearable Authentication Wearables, such as smartwatches, are continuously used compared to other IoT objects, such as smartphones.  ... 
doi:10.1109/access.2021.3105481 fatcat:7lowhpd2jncn7dymm3nfkkibhq

Identifying Users with Wearable Sensors based on Activity Patterns

Muhammad Ehatisham-ul-Haq, Maryam Naseer Malik, Muhammad Awais Azam, Usman Naeem, Asra Khalid, Mustansar Ali Ghazanfar
2020 Procedia Computer Science  
Three machine learning classifiers have been used to discover the activity patterns of users given the data captured from wearable sensors.  ...  Three machine learning classifiers have been used to discover the activity patterns of users given the data captured from wearable sensors.  ...  Wearable sensors are attached to the body unobtrusively and can continuously authenticate users based on their behavioral biometrics [15] .  ... 
doi:10.1016/j.procs.2020.10.005 fatcat:t7p3c2v5lvgljiub7ek5ofgbri

Securing Communication in the IoT- Based Power Constrained Devices in Health Care System

Sandhya K N* Sarma, Hemraj Shobharam Lamkuch, E Chandra Blessie
To make sensors wearable and wireless, it should be small in dimensions and also the energy, memory, and processing power available also matters.  ...  The core part of IoT constitutes sensors and various devices for diagnosis and imaging. Now-a-days sensors are becoming smaller, allowing them to be worn without interfering with daily activities..  ...  Privacy protection of users and anonymous authentication of users and privacy access control .It ensures that the sensitive information of users is not disclosed.  ... 
doi:10.35940/ijitee.g9034.0510721 fatcat:lbyr6aznxfeozdsjbk4pgrupqa

WSNs and IoT Their Challenges and applications for Healthcare and Agriculture: A Survey

Mohammed Saleh
2020 Iraqi Journal for Electrical And Electronic Engineering  
Sensor networks emerge as an attractive technology with great promise for the future.  ...  These aspects are the challenges of network construction in which authentication, confidentiality, availability, integrity, network development.  ...  Then the user authentication ensures that only licensed users access data from the sensor node.  ... 
doi:10.37917/ijeee.sceeer.3rd.6 fatcat:pnd6ugts75dpxo4ek2yj3lacam
« Previous Showing results 1 — 15 out of 3,219 results