An end-to-end secure key management protocol for e-health applications

MR Abdmeziem, D Tandjaoui - Computers & Electrical Engineering, 2015 - Elsevier
Key distribution is required to secure e-health applications in the context of Internet of Things
(IoT). However, resources constraints in IoT make these applications unable to run existing …

Secrecy aware key management scheme for Internet of Healthcare Things

C Trivedi, UP Rao - The Journal of Supercomputing, 2023 - Springer
Abstract The Internet of Things (IoT) is becoming an essential aspect of digital healthcare
information; the goal is to monitor various health parameters regularly to make healthcare …

Secure End-to-End key establishment protocol for resource-constrained healthcare sensors in the context of IoT

MA Iqbal, M Bayoumi - 2016 international conference on high …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT) is an ubiquitous concept where physical objects are connected over
the internet and are provided with unique identifiers to enable their self-identification to other …

Reliable and secure data transfer in IoT networks

SP Gochhayat, C Lal, L Sharma, DP Sharma, D Gupta… - Wireless …, 2020 - Springer
With the rapid technological improvements in mobile devices and their inclusion in Internet
of Things (IoT), secure key management becomes mandatory to ensure security of …

A cooperative end to end key management scheme for e-health applications in the context of internet of things

MR Abdmeziem, D Tandjaoui - Ad-hoc Networks and Wireless: ADHOC …, 2015 - Springer
In the context of Internet of Things where real world objects will automatically be part of the
Internet, e-health applications have emerged as a promising approach to provide …

Lightweight collaborative key establishment scheme for the Internet of Things

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computer Networks, 2014 - Elsevier
This work addresses new security issues in the Internet of Things (IoT). The heterogeneous
nature of IoT communications and imbalance in resource capabilities between IoT entities …

Real-time-based E-health systems: Design and implementation of a lightweight key management protocol for securing sensitive information of patients

S Iqbal, MLM Kiah, AA Zaidan, BB Zaidan… - Health and …, 2019 - Springer
Group-based systems, such as e-health systems, have been introduced since the last few
decades. E-health systems can be used anytime and anywhere for patient monitoring …

Internet of Things: Security in the keys

S Sicari, A Rizzardi, D Miorandi… - Proceedings of the 12th …, 2016 - dl.acm.org
Security threats may hinder the large scale adoption of the emerging Internet of Things (IoT)
technologies. Besides efforts have already been made in the direction of data integrity …

Proxy-based end-to-end key establishment protocol for the Internet of Things

P Porambage, A Braeken, P Kumar… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) drives the world towards an always connected paradigm by
interconnecting wide ranges of network devices irrespective of their resource capabilities …

A robust and efficient vector-based key management scheme for IoT networks

S Bettayeb, ML Messai, SM Hemam - Ad Hoc Networks, 2023 - Elsevier
Abstract Information and communication security is a critical concern in the rapid growth of
Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key …