Please use this identifier to cite or link to this item:
https://hdl.handle.net/11499/47334
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Uğur, Alper | - |
dc.date.accessioned | 2023-01-09T21:23:59Z | - |
dc.date.available | 2023-01-09T21:23:59Z | - |
dc.date.issued | 2021 | - |
dc.identifier.isbn | 9783030774448 | - |
dc.identifier.issn | 2367-3370 | - |
dc.identifier.uri | https://doi.org/10.1007/978-3-030-77445-5_48 | - |
dc.identifier.uri | https://hdl.handle.net/11499/47334 | - |
dc.description | 10th Computer Science Online Conference, CSOC 2021 -- 1 April 2021 through 1 April 2021 -- 262879 | en_US |
dc.description.abstract | Authentication is one of the emerging mechanisms required for a reliable IoT system. In health care environment, this became critical due to the nature of data carried and tasks of the system. There are various proposed schemes for authentication. Password based, cryptography based, hardware based, and behavioral are the extensive approaches with different characteristics. However, as in other IoT environments, the devices in healthcare are vary widely with their hardware limitations. The sensitive data they are responsible for is another case. Therefore, accomplishing the desired cooperation between diverse devices is limited in applications. In emergency, the healthcare IoT devices must be available and coordinate to share vital data to the emergency systems in need. Software design patterns are known to enable integration of software objects and modules in a reusable way. In this paper we described emergency authentication cases and proposed a design pattern for dynamic changing environment of the IoT. As on software paradigm, the pattern is convenient for heterogeneity of healthcare IoT system to adapt and implement its authentication task and priority of human health. The security of the data access is provided with applied restrictions. Achievements and shortcomings are also discussed. © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.relation.ispartof | Lecture Notes in Networks and Systems | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Authentication | en_US |
dc.subject | Design patterns | en_US |
dc.subject | Emergency | en_US |
dc.subject | Healthcare | en_US |
dc.subject | IoT | en_US |
dc.title | Emergency Locksmith: A Restricted Dynamic Device Authentication Design Pattern for the Healthcare IoT | en_US |
dc.type | Conference Object | en_US |
dc.identifier.volume | 229 | en_US |
dc.identifier.startpage | 518 | en_US |
dc.identifier.endpage | 526 | en_US |
dc.identifier.doi | 10.1007/978-3-030-77445-5_48 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.authorscopusid | 35759637400 | - |
dc.identifier.scopus | 2-s2.0-85115881187 | en_US |
dc.identifier.scopusquality | Q4 | - |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
crisitem.author.dept | 10.10. Computer Engineering | - |
Appears in Collections: | Mühendislik Fakültesi Koleksiyonu Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.