Submission Deadline: 31 October 2020
IEEE Access invites manuscript submissions in the area of Lightweight Security and Provenance for Internet of Health Things.
As an extension of the Internet of Things (IoT), the Internet of Health Things (IoHT), play an important role in the remote exchange of data of different physical processes such as patient monitoring, treatment progress, observation and consultation. In IoHT, the connectivity, integration, computation and interoperability are enabled through various sensors, actuators, and controllers, thereby providing seamless connectivity with efficient utilization of resources. In emergency situations, when a patient is being shifted to a hospital, seamless connectivity between Ambulance to Hospital (A2H), Hospital to Hospital (H2H) and Hospital to Ambulance (H2A), is very critical. With advances in tele-medicine, telesurgery, and other health-care applications, streaming has become an essential part of IoHT. The data traffic in IoHT applications, such as interactive multimedia streaming, traffic generated from faulty sensors, and vital signs, can tolerate packet loss but have stringent delay requirements. On the other hand, video streaming applications cannot tolerate jitter. Similarly, the low-power devices are sensitive to packet loss, and the periodic physiological traffic of medical traffic can tolerate delay, or jitter, but not packet loss. Routing data in different IoHT applications has varying quality of service (QoS) requirements in terms of delay, packet loss, jitter, and throughput. Most of the algorithms used today to secure the data and cryptography techniques in IoHT contain high computational complexities with high energy consumption. However, due to the energy limitations of low-power embedded devices, traditional cryptographic solutions are not viable for most of the IoHT applications. Less computational complexity, less space acquisition and energy-efficient security primitives are key building blocks for end-to-end content protection, user authentication, and consumer confidentiality in the IoHT. Once the data is gathered from different applications, it must be accurate and information about its origin should also be known. Due to scalability, tiny devices installed in IoHT are not usually physically protected. Data security and provenance therefore serve as the backbone for implementing IoHT applications.
This Special Section targets original technical articles with novel contributions on the improvement of security of IoHT, in particular by finding the correct lightweight solution. Review articles of high quality that provide thorough overview of the subject will also be considered. The topics of interest include, but are not limited to:
We also highly recommend the submission of multimedia with each article as it significantly increases the visibility and downloads of articles.
Associate Editor: Muhammad Tariq, FAST National University of computer & Emerging Sciences, Pakistan and Princeton University, USA
Relevant IEEE Access Special Sections:
IEEE Access Editor-in-Chief: Prof. Derek Abbott, University of Adelaide
Article submission: Contact Associate Editor and submit manuscript to:
For inquiries regarding this Special Section, please contact: email@example.com.