Blog
About

25
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Poster: found
      Is Open Access

      Healthcare security monitoring schemes for detection of node replication attack in wireless sensor networks

        , 1

      ScienceOpen Posters

      ScienceOpen

      Internet security

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Due to the increased growth of elderly people in recent years, healthcare systems face many challenges on the money spent for those people. Both quality and affordability has to be provided by the new technology which is the todays need. When applying WSN technologies, the advantages such as continuous monitoring with alert mechanisms and relative information are to be satisfied. Among the other challenges, due to the deployed environment, security is a key challenge. As gateway connects to the wireless networks, it is the target area for many adversaries to launch various attacks. Initially, attacker launches node compromise attack which leads to node replication attack.

          Related collections

          Author and article information

          Journal
          ScienceOpen Posters
          ScienceOpen
          25 November 2020
          Affiliations
          [1 ] Karunya Institute of Technology and Sciences, Coimbathore, India
          Article
          10.14293/S2199-1006.1.SOR-.PPZFBUI.v1

          This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

          The data that support the findings of this study are available from https://www.sciencedirect.com/science/article/pii/S0263224120308113 but restrictions apply to the availability of these data, which were used under license for the current study, and so are not publicly available. Data are however available from the authors upon reasonable request and with permission of https://www.sciencedirect.com/science/article/pii/S0263224120308113.

          Computer science, Engineering

          Internet security

          Comments

          Comment on this article