The Technique of Implementation Security into Clinical Internet of Things

被引:0
|
作者
Bezruk, Valeryi M. [1 ]
Krivenko, Stanislav A. [1 ]
Kryvenko, Liudmyla S. [2 ]
Krivenko, Sergey S. [3 ]
机构
[1] Kharkiv Natl Univ Radio Elect NURE, Informat & Networks Engn Dept, Kharkiv, Ukraine
[2] Kharkiv Natl Med Univ KhNMU, Pediat Dent Dept, Kharkiv, Ukraine
[3] Natl Aerosp Univ KhAI, Dept Informat & Commun Technol, Kharkiv, Ukraine
关键词
Internet of Things (IoT); Clinical Internet of Things; Frequency Domain; Time Domain;
D O I
10.1109/TCSET49122.2020.235515
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An approach for implementation Trust, Identity, Privacy, Protection, Safety, Security into Clinical Internet of Things was proposed. Frequency domain and time domain interoperability with itself for gain safety of information maintenance is considered. The technique uses the coding scheme of the so-called Regular Pulse Excitation Long Term Prediction Linear Predictive Coder for electrocardiograms processing. The proposed approach illustrates a linkage between direct attacker motivations and implied motivations. Each direct motivation, or technical objective, is mapped to one or more implied motivations, or business impact that differs it's from the existing ones. The Spearman correlation coefficient 0.86 has been achieved on examination.
引用
收藏
页码:664 / 669
页数:6
相关论文
共 50 条
  • [21] Ethereum for Internet of Things security
    Aparna Raj
    Kavita Maji
    Sujala D. Shetty
    [J]. Multimedia Tools and Applications, 2021, 80 : 18901 - 18915
  • [22] Security in the Internet of Things (IoT)
    Ahmed, Israr
    Saleel, A. P.
    Beheshti, Babak
    Khan, Zahoor Ali
    Ahmad, Imtiaz
    [J]. 2017 FOURTH HCT INFORMATION TECHNOLOGY TRENDS (ITT), 2017, : 84 - 90
  • [23] Ethereum for Internet of Things security
    Raj, Aparna
    Maji, Kavita
    Shetty, Sujala D.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (12) : 18901 - 18915
  • [24] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [25] An Overview of Security in Internet of Things
    Jose, Deepa V.
    Vijyalakshmi, A.
    [J]. 8TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2018), 2018, 143 : 744 - 748
  • [26] A Security Framework for Internet of Things
    Bouij-Pasquier, Imane
    Abou El Kalam, Anas
    Ouahman, Abdellah Ait
    De Montfort, Mina
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 19 - 31
  • [27] Security and Privacy on Internet of Things
    Ren, Zejun
    Liu, Xiangang
    Ye, Runguo
    Zhang, Tao
    [J]. PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 140 - 144
  • [28] Security challenges in the internet of things
    Chasaki, Danai
    Mansour, Christopher
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (03) : 141 - 149
  • [29] A Survey on the Internet of Things Security
    Zhao, Kai
    Ge, Lina
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 663 - 667
  • [30] Security and privacy for the Internet of Things
    Rullo, Antonino
    Ianni, Michele
    Serra, Edoardo
    [J]. FRONTIERS IN COMPUTER SCIENCE, 2023, 5