Lightweight Security and Provenance for Internet of Health Things

Submission Deadline: 31 October 2020

IEEE Access invites manuscript submissions in the area of Lightweight Security and Provenance for Internet of Health Things.

As an extension of the Internet of Things (IoT), the Internet of Health Things (IoHT), play an important role in the remote exchange of data of different physical processes such as patient monitoring, treatment progress, observation and consultation. In IoHT, the connectivity, integration, computation and interoperability are enabled through various sensors, actuators, and controllers, thereby providing seamless connectivity with efficient utilization of resources. In emergency situations, when a patient is being shifted to a hospital, seamless connectivity between Ambulance to Hospital (A2H), Hospital to Hospital (H2H) and Hospital to Ambulance (H2A), is very critical. With advances in tele-medicine, telesurgery, and other health-care applications, streaming has become an essential part of IoHT. The data traffic in IoHT applications, such as interactive multimedia streaming, traffic generated from faulty sensors, and vital signs, can tolerate packet loss but have stringent delay requirements. On the other hand, video streaming applications cannot tolerate jitter. Similarly, the low-power devices are sensitive to packet loss, and the periodic physiological traffic of medical traffic can tolerate delay, or jitter, but not packet loss.  Routing data in different IoHT applications has varying quality of service (QoS) requirements in terms of delay, packet loss, jitter, and throughput. Most of the algorithms used today to secure the data and cryptography techniques in IoHT contain high computational complexities with high energy consumption. However, due to the energy limitations of low-power embedded devices, traditional cryptographic solutions are not viable for most of the IoHT applications. Less computational complexity, less space acquisition and energy-efficient security primitives are key building blocks for end-to-end content protection, user authentication, and consumer confidentiality in the IoHT.  Once the data is gathered from different applications, it must be accurate and information about its origin should also be known. Due to scalability, tiny devices installed in IoHT are not usually physically protected. Data security and provenance therefore serve as the backbone for implementing IoHT applications.

This Special Section targets original technical articles with novel contributions on the improvement of security of IoHT, in particular by finding the correct lightweight solution. Review articles of high quality that provide thorough overview of the subject will also be considered. The topics of interest include, but are not limited to:

  • Lightweight security for IoHT
  • Low energy IoHT systems
  • Low energy security algorithms for A2H, H2H, and H2A in IoHT
  • Lightweight solutions for data forensics in IoHT
  • Lightweight routing algorithms for data provenance in IoHT
  • Secure lightweight protocols for A2H, H2H, and H2A in IoHT
  • Security framework and architecture for IoHT
  • Lightweight video streaming mechanism for IoHT

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility and downloads of articles.


Associate Editor:  Muhammad Tariq, FAST National University of computer & Emerging Sciences, Pakistan and Princeton University, USA


Guest Editors:

    1. Takuro Sato, Waseda University, Waseda University, Tokyo, Japan
    2. Gautam Srivastava, Brandon University, Canada
    3. Vuk Marojevic, Mississippi State University, USA
    4. Mario Goldenbaum, Bremen University, Bremen, Germany


Relevant IEEE Access Special Sections:

  1. Secure Communication for the Next Generation 5G and IoT Networks
  2. Deep Learning: Security and Forensics Research Advances and Challenges
  3. Emerging Approaches to Cyber Security

IEEE Access Editor-in-Chief:
  Prof. Derek Abbott, University of Adelaide

Article submission: Contact Associate Editor and submit manuscript to:

For inquiries regarding this Special Section, please contact: