Loading

Trust Negotiation among IoT-based Objects in Critical Healthcare Environment
Raghu Ram Nallani Chakravartula1, V. Naga Lakshmi2
1Raghu Ram Nallani Chakravartula, Head of Information Security and Compliance in Mirra Healthcare, USA.
2Prof. V. Naga Lakshmi, HOD, Department of computer science in GITAM (Deemed to be university), India.

Manuscript received on January 09, 2020. | Revised Manuscript received on January 22, 2020. | Manuscript published on January 30, 2020. | PP: 2756-2760 | Volume-8 Issue-5, January 2020. | Retrieval Number: E6506018520/2020©BEIESP | DOI: 10.35940/ijrte.E6506.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In pervasive environment, the opportunity of unidentified objects involving in malevolent interactions increases due to the lack of centralized services. Traditional authentication and access control rules cannot be applied due to limitations of foot print of the objects used in Internet of Things. The proposed model presents authentication and authorization for an IoT-based ad-hoc objects using human notion of trust. The paper presents testing the proposed model with relevant use-cases in patient monitoring healthcare devices and presents the analysis results used in the critical care areas.
Keywords: Authentication and Authorization, Internet of Things, Fuzzy logic, Objects.
Scope of the Article: Fuzzy logic.