Hybrid Security Techniques for Internet of Things Healthcare Applications


The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It will effect in a large number of applications such as smart living, smart home, healthcare systems, smart manufacturing, environment monitoring, and smart logistics. This paper provides integration, summarizes and surveys some of the security techniques especially hybrid techniques that can be applied with healthcare applications in IoT environment.

Share and Cite:

Yehia, L. , Khedr, A. and Darwish, A. (2015) Hybrid Security Techniques for Internet of Things Healthcare Applications. Advances in Internet of Things, 5, 21-25. doi: 10.4236/ait.2015.53004.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Vermesan, O. and Friess, P. (2014) Internet of Things Applications—From Research and Innovation to Market Deployment (River Publishers Series in Communications).
[2] Tyagi, S., Darwish, A. and Khan, M.Y. (2014) Managing Computing Infrastructure for IoT Data. Advances in Internet of Things, 4, 29-35.
[3] Ashton, K. (2009) That “Internet of Things” Thing. RFiD Journal, 22, 97-114.
[4] Darwish, A., Tyagi, S. and Agarwal, A. (2015) A New Model for IoT Based Healthcare Systems Using Cloud Computing. (Under Publication)
[5] Tarouco, L.M.R., Bertholdo, L.M., Granville, L.Z. and Arbiza, L.M.R. (2012) Internet of Things in Healthcare: Interoperatibility and Security Issues. 2012 IEEE International Conference on Communications (ICC), Ottawa, 10-15 June 2012, 621-6125.
[6] Kayarkar, H. (2012) Classification of Various Security Techniques in Databases and Their Comparative Analysis. ACTA Technica Corviniensis, 5, 135-138.
[7] Yu, S. (2013) IEEE Standards Association to Exhibit at 2013, International Consumer Electronics Show and Highlight Enabling Consumer Connectivity through Consensus Building.
[8] Schonfeld, E. (2010) Costolo: Twitter Now Has 190 Million Users Tweeting 65 Million Times a Day.
[9] Li, W.C., Yi, P., Wu, Y., Pan, L. and Li, J.H. (2014) A New Intrusion Detection Application Based on KNN Classification Algorithm in Wireless Sensor Network. Journal of Electrical and Computer Engineering, 2014, Article ID: 240217.
[10] Gupta, R.K. and Singh, P. (2013) A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network. International Journal of Emerging Technology and Advanced Engineering, 3, 2250-2459.
[11] Yu, L.L., Wang, Z.J. and Wang, W.F. (2012) The Application of Hybrid Encryption Algorithm in Software Security. 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN), Mathura, 3-5 November 2012, 762-765.
[12] Kessler, G.C. (2013) An Overview of Cryptography.
[13] RSA Laboratories—Chryptographic Tools. Section 2.1.5. (Unpublished)
[14] Malan, D., Jones, T.F., Welsh, M. and Moulton, S. (2004) CodeBlue: An Ad-Hoc Sensor Network Infrastructure for Emergency Medical Care. Proceedings of the MobiSys 2004 Workshop on Applications of Mobile Embedded Systems, Boston, 6-9 June 2004.
[15] Kumar, P. and Lee, H.-J. (2012) Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey. Sensors, 12, 55-91.
[16] Karulf, E. (2008) Body Area Networks (BAN). A Survey Paper Written under Guidance of Prof. Raj Jain.
[17] Kumar, P., Lee, S.-G. and Lee, H.-J. (2012) E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks. Sensors, 12, 1625-1647.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.