Research Article
An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing
Table 2
The security comparisons of related works.
| Security issue | Proposed scheme | Ben Othman et al. [16] | Kalra and Sood [17] | Lounis et al. [18] | Our scheme |
| Replay attack | N/A | Yes | N/A | Yes | Man-in-middle attack | N/A | Yes | Yes | Yes | Integrity | Yes | N/A | Yes | Yes | Data security | N/A | Yes | Yes | Yes | Confidentiality | Yes | Yes | Yes | Yes | Nonrepudiation | N/A | N/A | N/A | Yes | Privacy | N/A | N/A | N/A | Yes |
|
|