Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Information Security

Edith Cowan University

2021

IoT

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Biometrics For Internet‐Of‐Things Security: A Review, Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, Craig Valli Jan 2021

Biometrics For Internet‐Of‐Things Security: A Review, Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, Craig Valli

Research outputs 2014 to 2021

The large number of Internet‐of‐Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric‐based authentication systems for IoT are discussed and classified based on different biometric …


An Energy-Efficient And Secure Data Inference Framework For Internet Of Health Things: A Pilot Study, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, Paul Haskell-Dowland, Xi Zheng Jan 2021

An Energy-Efficient And Secure Data Inference Framework For Internet Of Health Things: A Pilot Study, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, Paul Haskell-Dowland, Xi Zheng

Research outputs 2014 to 2021

© 2021 by the authors. Licensee MDPI, Basel, Switzerland. Privacy protection in electronic healthcare applications is an important consideration, due to the sensitive nature of personal health data. Internet of Health Things (IoHT) networks that are used within a healthcare setting have unique challenges and security requirements (integrity, authentication, privacy, and availability) that must also be balanced with the need to maintain efficiency in order to conserve battery power, which can be a significant limitation in IoHT devices and networks. Data are usually transferred without undergoing filtering or optimization, and this traffic can overload sensors and cause rapid battery consumption …