Research Article
An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing
Table 2
The security comparisons of related works.
| | Security issue | Proposed scheme | | Ben Othman et al. [16] | Kalra and Sood [17] | Lounis et al. [18] | Our scheme |
| | Replay attack | N/A | Yes | N/A | Yes | | Man-in-middle attack | N/A | Yes | Yes | Yes | | Integrity | Yes | N/A | Yes | Yes | | Data security | N/A | Yes | Yes | Yes | | Confidentiality | Yes | Yes | Yes | Yes | | Nonrepudiation | N/A | N/A | N/A | Yes | | Privacy | N/A | N/A | N/A | Yes |
|
|