Internet of Things-Based Authentication Mechanism for E-Health Applications

Internet of Things-Based Authentication Mechanism for E-Health Applications

Kameswara Rao M., S. G. Santhi
DOI: 10.4018/978-1-7998-1090-2.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The sturdy advancements of internet of things are being changed into a methodology of associating smart things. E-health applications in this vision are a standout amongst IoT's most energizing applications. Indeed, security concerns were the fundamental boundary to the establishment. The encryption of various interlinked substances and the classification of the swapped information are the real concerns which should be settled for clients. This chapter proposes an e-health application using lightweight verification mechanism. The proposed model utilizes nonces as well as keyed-hash message authentication (KHAC) for checking the validity of verification trades.
Chapter Preview
Top

Authentication is by all accounts a urgent procedure that goes back to the early improvement of the Internet. Standard nearby system and Internet validation regularly meddles to halfway controlled authentication servers just as identity providers(El Maliki et al., 2007). Such experiences by and large have such a high vitality cost just as require some registering ability in which diverse articles that make up the setting of the Internet of Things were restricted to such assets. Such impediments are the principle issue of a few research works that endeavour to recommend inventive answers for the sending of IoT-adjusted authentication protocols. A few validations chips away at the internet of things are being referenced (Sicari et al., 2015 and Atzori et al., 2010).

Complete Chapter List

Search this Book:
Reset