Please use this identifier to cite or link to this item: https://hdl.handle.net/11499/47334
Full metadata record
DC FieldValueLanguage
dc.contributor.authorUğur, Alper-
dc.date.accessioned2023-01-09T21:23:59Z-
dc.date.available2023-01-09T21:23:59Z-
dc.date.issued2021-
dc.identifier.isbn9783030774448-
dc.identifier.issn2367-3370-
dc.identifier.urihttps://doi.org/10.1007/978-3-030-77445-5_48-
dc.identifier.urihttps://hdl.handle.net/11499/47334-
dc.description10th Computer Science Online Conference, CSOC 2021 -- 1 April 2021 through 1 April 2021 -- 262879en_US
dc.description.abstractAuthentication is one of the emerging mechanisms required for a reliable IoT system. In health care environment, this became critical due to the nature of data carried and tasks of the system. There are various proposed schemes for authentication. Password based, cryptography based, hardware based, and behavioral are the extensive approaches with different characteristics. However, as in other IoT environments, the devices in healthcare are vary widely with their hardware limitations. The sensitive data they are responsible for is another case. Therefore, accomplishing the desired cooperation between diverse devices is limited in applications. In emergency, the healthcare IoT devices must be available and coordinate to share vital data to the emergency systems in need. Software design patterns are known to enable integration of software objects and modules in a reusable way. In this paper we described emergency authentication cases and proposed a design pattern for dynamic changing environment of the IoT. As on software paradigm, the pattern is convenient for heterogeneity of healthcare IoT system to adapt and implement its authentication task and priority of human health. The security of the data access is provided with applied restrictions. Achievements and shortcomings are also discussed. © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.en_US
dc.language.isoenen_US
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.relation.ispartofLecture Notes in Networks and Systemsen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAuthenticationen_US
dc.subjectDesign patternsen_US
dc.subjectEmergencyen_US
dc.subjectHealthcareen_US
dc.subjectIoTen_US
dc.titleEmergency Locksmith: A Restricted Dynamic Device Authentication Design Pattern for the Healthcare IoTen_US
dc.typeConference Objecten_US
dc.identifier.volume229en_US
dc.identifier.startpage518en_US
dc.identifier.endpage526en_US
dc.identifier.doi10.1007/978-3-030-77445-5_48-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.authorscopusid35759637400-
dc.identifier.scopus2-s2.0-85115881187en_US
dc.identifier.scopusqualityQ4-
item.languageiso639-1en-
item.openairetypeConference Object-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
crisitem.author.dept10.10. Computer Engineering-
Appears in Collections:Mühendislik Fakültesi Koleksiyonu
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Show simple item record



CORE Recommender

Page view(s)

30
checked on May 27, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.