5 research outputs found

    Transition from IPv4 to IPv6 Network in IoT Security Based Upon Transition Methods

    Get PDF
    While deployments of IPv6 networks have increased over recent years, especially in IoT Paradigm. Today there are two types of internet protocol versions that are currently working in the global internet to transfer data from one electronic device to another.IPv4 which consists of 32 bits long addresses and IPv6 which consists of 128bits long addresses which is more effective as it can handle billions of devices and can assign each device different IP address. This paper will present an overview of the main migration technologies that can be used to transition from an IPv4 network to an IPv6 network, this paper will also research on finding and comparing the effects of IPv6 transition methods such as Dual Stack, Tunneling and Network Address Translation-Protocol Translation will be compared on variant parameters to find the best performing transition method in IoT Network in terms of security

    Exploring a new security framework for future healthcare systems

    Get PDF
    The Internet of Things is driving impactful and significant changes in healthcare systems across the globe. The use of mobile and wireless technologies to support healthcare environments has enormous potential to transform healthcare. For example, healthcare data, which is considered to be very sensitive, must be securely accessed, processed and stored. However, digital healthcare IT platforms are increasingly coming under attack by malware such as Ransomware. In addition, there is now a need to integrate eHealth and mHealth mechanisms into national healthcare systems. New technologies, such as blockchain, are being used to address these issues. What is needed is a new framework which can use these technologies to secure healthcare. This paper proposes a new security framework that responds to these security concerns. The framework is then used to design an implementation framework with new mechanisms including Capabilities, Secure Remote Procedure Calls and a Service Management Framework

    Exploring a new security framework for future healthcare systems

    Get PDF
    The Internet of Things is driving impactful and significant changes in healthcare systems across the globe. The use of mobile and wireless technologies to support healthcare environments has enormous potential to transform healthcare. For example, healthcare data, which is considered to be very sensitive, must be securely accessed, processed and stored. However, digital healthcare IT platforms are increasingly coming under attack by malware such as Ransomware. In addition, there is now a need to integrate eHealth and mHealth mechanisms into national healthcare systems. New technologies, such as blockchain, are being used to address these issues. What is needed is a new framework which can use these technologies to secure healthcare. This paper proposes a new security framework that responds to these security concerns. The framework is then used to design an implementation framework with new mechanisms including Capabilities, Secure Remote Procedure Calls and a Service Management Framework

    Securing future healthcare environments in a post-COVID-19 world: moving from frameworks to prototypes

    Get PDF
    The deployment of Internet of Things platforms as well as the use of mobile and wireless technologies to support healthcare environments have enormous potential to transform healthcare. This has also led to a desire to make eHealth and mHealth part of national healthcare systems. The COVID-19 pandemic has accelerated the requirement to do this in order to reduce the number of patients needing to attend hospitals and General Practitioner surgeries. This direction however has resulted in a renewed need to look at security of future healthcare platforms including information and data security as well as network and cyber-physical security. There have been security frameworks that were developed to address such issues. However, it is necessary to develop a security framework with a combination of security mechanisms that can be used to provide all the essential security requirements for healthcare systems. In addition, there is now a need to move from frameworks to prototypes which is the focus of this paper. Several security frameworks for eHealth and mHealth are first examined. This leads to a new reference model from which an implementation framework is developed using new mechanisms such as Capabilities, Secure Remote Procedure Calls and a Service Management Framework. The prototype is then evaluated against practical security requirements

    A Comparison of Internet Protocol (IPv6) Security Guidelines

    No full text
    The next generation of the Internet Protocol (IPv6) is currently about to be introduced in many organizations. However, its security features are still a very novel area of expertise for many practitioners. This study evaluates guidelines for secure deployment of IPv6, published by the U.S. NIST and the German federal agency BSI, for topicality, completeness and depth. The later two are scores defined in this paper and are based on the Requests for Comments relevant for IPv6 that were categorized, weighted and ranked for importance using an expert survey. Both guides turn out to be of practical value, but have a specific focus and are directed towards different audiences. Moreover, recommendations for possible improvements are presented. Our results could also support strategic management decisions on security priorities as well as for the choice of security guidelines for IPv6 roll-outs
    corecore