Author : K.Ilakkya 1
Date of Publication :23rd March 2018
Abstract: The body sensor sort out (BSN) development is a champion among the most fundamental headways used as a piece of IoT-based present day human administrations system. In this Procedure, at first we address the few security requirements in BSN based present day human administrations system. By then, we propose a safe IoT based social protection structure using BSN, called BSN-Care, which can guarantee to successfully complete those requirements.BSN configuration made out of wearable and implantable sensors. Each sensor center is composed with bio-sensors, for instance, Electrocardiogram (ECG)Electromyography (EMG), Electroencephalography (EEG), Circulatory strain (BP), et cetera. These sensors accumulate the physiological parameters and forward them to a facilitator called Nearby Handling Unit (LPU).The LPU goes about as a switch between the BSN center points and the central server called BSN-Care server, using the remote correspondence mediums, for instance, compact frameworks 3G/CDMA/GPRS. In addition, when the LPU perceives any varieties from the standard then it gives provoke alert to the person that wearing the bio-sensors. In this wander, we delineate the key security necessities in IoT based social protection system using BSN
Reference :
-
- L. Atzori, A. Iera, and G. Morabito, ‘‘The Internet of Things: A survey,’’ Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
- J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, ‘‘Internet of Things (IoT): A vision, architectural elements, and future directions,’’ Future Generat. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013.
- D. Dolev and A. Yao, ‘‘On the security of public key protocols,’’ IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198–208, Mar. 1983.
- T. S. Messerges, E. A. Dabbish, and R. H. Sloan, ‘‘Examining smart-card security under the threat of power analysis attacks,’’ IEEE Trans. Comput., vol. 51, no. 5, pp. 541–552, May 2002.
- P. Kocher, J. Jaffe, and B. Jun, ‘‘Differential power analysis,’’ in Advances in Cryptology, vol. 1666. Berlin, Germany: Springer-Verlag, 1999, pp. 388–397.
- N. Koblitz, ‘‘Elliptic curves cryptosystems,’’ Math. Comput., vol. 48 , pp. 203–209, Sep. 1987.
- T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, ‘‘DTLS based security and two-way authentication for the Internet of Things,’’ Ad Hoc Netw., vol. 11, no. 8, pp. 2710–2723, Sep. 2013.
- D. Liu, P. Ning, S. Zhu, and S. Jajodia, ‘‘Practical broadcast authentication in sensor networks,’’ in Proc. 2nd Annu. Int. Conf. Mobile Ubiquitous Syst. Netw. Serv. (MobiQuitous), San Diego, CA, USA, 2005, pp. 118–129