Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Security

Theses

Theses/Dissertations

2022

Authenticated key establishment

Articles 1 - 1 of 1

Full-Text Articles in Computer Sciences

Authenticated Key Establishment Protocol For Constrained Smart Healthcare Systems Based On Physical Unclonable Function, Abdalla Saleh Elkushli Apr 2022

Authenticated Key Establishment Protocol For Constrained Smart Healthcare Systems Based On Physical Unclonable Function, Abdalla Saleh Elkushli

Theses

Smart healthcare systems are one of the critical applications of the internet of things. They benefit many categories of the population and provide significant improvement to healthcare services. Smart healthcare systems are also susceptible to many threats and exploits because they run without supervision for long periods of time and communicate via open channels. Moreover, in many implementations, healthcare sensor nodes are implanted or miniaturized and are resource-constrained. The potential risks on patients/individuals’ life from the threats necessitate that securing the connections in these systems is of utmost importance. This thesis provides a solution to secure end-to-end communications in such …