42 research outputs found
Securing Communication in the IoT-based Health Care Systems
Rapid development of Internet of Things (IoT) and its whole ecosystems are opening a lot of opportunities that can improve humans' quality of life in many aspects. One of the promising area where IoT can enhance our life is in the health care sector. However, security and privacy becomes the main concern in the electronic Health (eHealth) systems and it becomes more challenging with the integration of IoT. Furthermore, most of the IoT-based health care system architecture is designed to be cross-organizational due to many different stakeholders in its overall ecosystems – thus increasing the security complexity. There are several aspects of security in the IoT-based health care system, among them are key management, authentication and encryption/decryption to ensure secure communication and access to health sensing information. This paper introduces a key management method that includes mutual authentication and secret key agreement to establish secure communication between any IoT health device with any entity from different organization or domain through Identity-Based Cryptography (IBC)
Securing Communication in the IoT-based Health Care Systems
Rapid development of Internet of Things (IoT) and its whole ecosystems are opening a lot of opportunities that can improve humans’ quality of life in many aspects. One of the promising area where IoT can enhance our life is in the health care sector. However, security and privacy becomes the main concern in the electronic Health (eHealth) systems and it becomes more challenging with the integration of IoT. Furthermore, most of the IoT-based health care system architecture is designed to be cross-organizational due to many different stakeholders in its overall ecosystems – thus increasing the security complexity. There are several aspects of security in the IoT-based health care system, among them are key management, authentication and encryption/decryption to ensure secure communication and access to health sensing information. This paper introduces a key management method that includes mutual authentication and secret key agreement to establish secure communication between any IoT health device with any entity from different organization or domain through Identity-Based Cryptography (IBC)
THE LOST LOWANO PALACE
The Lost Lowano Palace adalah kegiatan penelitian pada sebuah Keraton
yang bernama Keraton Lowano yang berada di desa Lowano, kecamatan Lowano,
Purworejo, Jawa Tengah. Penelitian keraton tersebut bertujuan untuk membuat
sebuah catatan sejarah tentang keraton tersebut. Belum adanya catatan sejarah
tentang keraton tersebut dan belum banyak orang tahu tentang keraton tersebut
adalah alasan mengapa kita ingin meneliti Keraton Lowano. Padahal tempat
tersebut mempunyai banyak potensi untuk menjadi tempat wisata ataupun menjadi
bahan penelitian, karena tempatnya yang strategis dan banyak menyimpan sejarah
yang belum banyak orang mengetahuinya.
Hal yang cukup ditekankan dalam kegiatan penelitian keraton ini adalah
memelihara dan menjaga warisan budaya Jawa yang belum banyak orang
mengetahuinya dan belum adanya perhatian khusus dari pemerintah terhadap
keraton tersebut. Mengaitkan mitos dengan fakta yang ada di masyarakat juga
menjadi titik berat kita dalam melakukan penelitian ini. Lalu dilanjutkan dengan
pembukuan hasil penelitian.
Kegiatan ini diawali dengan mewawancarai masyarakat sekitar, juru kunci,
dan pemerintah daerah tentang mitos yang beredar di masyarakat dan bagaimana
cerita sejarah dari keraton tersebut. Lalu peneliti mencari fakta-fakta yang ada di
masyarakat dan mengkaitkannya dengan mitos yang beredar tersebut. Mencatat
cerita sejarah menjadi sebuah catatan sejarahdan dibukukan