42 research outputs found

    Securing Communication in the IoT-based Health Care Systems

    Get PDF
    Rapid development of Internet of Things (IoT) and its whole ecosystems are opening a lot of opportunities that can improve humans' quality of life in many aspects. One of the promising area where IoT can enhance our life is in the health care sector. However, security and privacy becomes the main concern in the electronic Health (eHealth) systems and it becomes more challenging with the integration of IoT. Furthermore, most of the IoT-based health care system architecture is designed to be cross-organizational due to many different stakeholders in its overall ecosystems – thus increasing the security complexity. There are several aspects of security in the IoT-based health care system, among them are key management, authentication and encryption/decryption to ensure secure communication and access to health sensing information. This paper introduces a key management method that includes mutual authentication and secret key agreement to establish secure communication between any IoT health device with any entity from different organization or domain through Identity-Based Cryptography (IBC)

    Access Control in IoT/M2M - Cloud Platform

    Get PDF

    Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    Get PDF

    Securing Communication in the IoT-based Health Care Systems

    Get PDF
    Rapid development of Internet of Things (IoT) and its whole ecosystems are opening a lot of opportunities that can improve humans’ quality of life in many aspects. One of the promising area where IoT can enhance our life is in the health care sector. However, security and privacy becomes the main concern in the electronic Health (eHealth) systems and it becomes more challenging with the integration of IoT. Furthermore, most of the IoT-based health care system architecture is designed to be cross-organizational due to many different stakeholders in its overall ecosystems – thus increasing the security complexity. There are several aspects of security in the IoT-based health care system, among them are key management, authentication and encryption/decryption to ensure secure communication and access to health sensing information. This paper introduces a key management method that includes mutual authentication and secret key agreement to establish secure communication between any IoT health device with any entity from different organization or domain through Identity-Based Cryptography (IBC)

    Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    Get PDF

    QoS-Guaranteed Admission Control for OFDMA-based Systems

    Get PDF

    THE LOST LOWANO PALACE

    Get PDF
    The Lost Lowano Palace adalah kegiatan penelitian pada sebuah Keraton yang bernama Keraton Lowano yang berada di desa Lowano, kecamatan Lowano, Purworejo, Jawa Tengah. Penelitian keraton tersebut bertujuan untuk membuat sebuah catatan sejarah tentang keraton tersebut. Belum adanya catatan sejarah tentang keraton tersebut dan belum banyak orang tahu tentang keraton tersebut adalah alasan mengapa kita ingin meneliti Keraton Lowano. Padahal tempat tersebut mempunyai banyak potensi untuk menjadi tempat wisata ataupun menjadi bahan penelitian, karena tempatnya yang strategis dan banyak menyimpan sejarah yang belum banyak orang mengetahuinya. Hal yang cukup ditekankan dalam kegiatan penelitian keraton ini adalah memelihara dan menjaga warisan budaya Jawa yang belum banyak orang mengetahuinya dan belum adanya perhatian khusus dari pemerintah terhadap keraton tersebut. Mengaitkan mitos dengan fakta yang ada di masyarakat juga menjadi titik berat kita dalam melakukan penelitian ini. Lalu dilanjutkan dengan pembukuan hasil penelitian. Kegiatan ini diawali dengan mewawancarai masyarakat sekitar, juru kunci, dan pemerintah daerah tentang mitos yang beredar di masyarakat dan bagaimana cerita sejarah dari keraton tersebut. Lalu peneliti mencari fakta-fakta yang ada di masyarakat dan mengkaitkannya dengan mitos yang beredar tersebut. Mencatat cerita sejarah menjadi sebuah catatan sejarahdan dibukukan
    corecore