IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Internet of Things-Based Authentication Mechanism for E-Health Applications

Internet of Things-Based Authentication Mechanism for E-Health Applications
View Sample PDF
Author(s): Kameswara Rao M. (Annamalai University, India)and S. G. Santhi (Annamalai University, India)
Copyright: 2020
Pages: 15
Source title: Incorporating the Internet of Things in Healthcare Applications and Wearable Devices
Source Author(s)/Editor(s): P. B. Pankajavalli (Bharathiar University, India)and G. S. Karthick (Bharathiar University, India)
DOI: 10.4018/978-1-7998-1090-2.ch007

Purchase

View Internet of Things-Based Authentication Mechanism for E-Health Applications on the publisher's website for pricing and purchasing information.

Abstract

The sturdy advancements of internet of things are being changed into a methodology of associating smart things. E-health applications in this vision are a standout amongst IoT's most energizing applications. Indeed, security concerns were the fundamental boundary to the establishment. The encryption of various interlinked substances and the classification of the swapped information are the real concerns which should be settled for clients. This chapter proposes an e-health application using lightweight verification mechanism. The proposed model utilizes nonces as well as keyed-hash message authentication (KHAC) for checking the validity of verification trades.

Related Content

Sharon L. Burton. © 2024. 25 pages.
Laura Ann Jones, Ian McAndrew. © 2024. 24 pages.
Olayinka Creighton-Randall. © 2024. 14 pages.
Stacey L. Morin. © 2024. 11 pages.
N. Nagashri, L. Archana, Ramya Raghavan. © 2024. 22 pages.
Esther Gani, Foluso Ayeni, Victor Mbarika, Abdullahi I. Musa, Oneurine Ngwa. © 2024. 25 pages.
Sia Gholami, Marwan Omar. © 2024. 18 pages.
Body Bottom