Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-based eHealth Systems
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 1
Abstract
IoT-based systems have considerable dynamic behavior and heterogeneous technology participants. The corresponding threats and security operations are also complex to handle. Traditional security solutions may not be appropriate and effective in such ecosystems as they recognize and assess a limited context, they work well only with high-end and specific computing platforms, and implement manual response mechanisms. We have identified the security objectives of a potential IoT-eHealth system and have proposed a security model that can efficiently achieve them. The proposed model is a context-aware and self-adaptive security management model for IoT, in eHealth perspective that will monitor, analyze, and respond to a multitude of security contexts autonomously. As these operations are planned at the gateway level, the model exploits the advantages of computing in the Fog Layer. Moreover, the proposed model offers flexibility and open connectivity to allow any smart device or thing to be managed irrespective of their native design. We have also explained how our model can establish and serve the essential security objectives of an IoT-based environment.
Authors and Affiliations
Waqas Aman, Firdous Kausar
A Method for Segmentation of Vietnamese Identification Card Text Fields
The development of deep learning in computer vision has motivated researches in related fields, including Op-tical Character Recognition (OCR). Many proposed models and pre-trained models in the literature demonstrate th...
A Model of an E-Learning Web Site for Teaching and Evaluating Online.
This research is endeavoring to design an e-learning web site on the internet having the course name as "Object Oriented Programming" (OOP) for the students of level four at Computer Science Department (CSD). This course...
Process Capability Indices under Non-Normality Conditions using Johnson Systems
Process capability indices (PCIs) quantify the ability of a process to produce on target and within specifications performances. Basic indices designed for normal processes gives flawed results for non-normal process. Nu...
Data Mining in Education
Data mining techniques are used to extract useful knowledge from raw data. The extracted knowledge is valuable and significantly affects the decision maker. Educational data mining (EDM) is a method for extracting useful...
A Robust Algorithm of Forgery Detection in Copy-Move and Spliced Images
The paper presents a new method to detect forgery by copy-move, splicing or both in the same image. Multiscale, which limits the computational complexity, is used to check if there is any counterfeit in the image. By app...