Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
暂无分享,去创建一个
[1] Raouf Boutaba,et al. Man-in-the-Middle Attack Mitigation in Internet of Medical Things , 2022, IEEE Transactions on Industrial Informatics.
[2] A. J. A. Dhiyya. Architecture of IoMT in Healthcare , 2022, The Internet of Medical Things (IoMT).
[3] H. F. Ahmad,et al. Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML , 2022, J. Netw. Comput. Appl..
[4] Praveen Kumar Reddy Maddikunta,et al. A Review on Security and Privacy of Internet of Medical Things , 2020, Internet of Things.
[5] Jonathan Rodriguez,et al. A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT) , 2020, Trans. Emerg. Telecommun. Technol..
[6] Rakesh Kumar Mahendran,et al. Security and Privacy Issues in Medical Internet of Things: Overview, Countermeasures, Challenges and Future Directions , 2021, Sustainability.
[7] Christos Emmanouilidis,et al. Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications , 2021, Sensors.
[8] Liza Abdul Latiff,et al. A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches , 2021, PeerJ Comput. Sci..
[9] Fadi Al-Turjman,et al. Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things , 2021, IEEE Journal on Selected Areas in Communications.
[10] Derar Eleyan,et al. Survey of DoS/DDoS attacks in IoT , 2021, Sustainable Engineering and Innovation.
[11] Rakesh Tripathi,et al. Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology , 2021, The Journal of Supercomputing.
[12] Raj Jain,et al. Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security , 2020, IEEE Internet of Things Journal.
[13] Al-Sakib Khan Pathan,et al. A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic , 2020, Connect. Sci..
[14] Bhavna Arora,et al. Detection and Prevention of DoS and DDoS in IoT , 2021 .
[15] Nico Surantha,et al. A Review of Wearable Internet-of-Things Device for Healthcare , 2021 .
[16] Adel Binbusayyis,et al. Security, Privacy and Trust in IoMT Enabled Smart Healthcare System: A Systematic Review of Current and Future Trends , 2021 .
[17] Mahmood Al-khassaweneh,et al. A review of internet of medical things (IoMT) - based remote health monitoring through wearable sensors: a case study for diabetic patients , 2020 .
[18] Khan Muhammad,et al. Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare , 2020, Comput. Commun..
[19] Justice Owusu Agyemang,et al. Lightweight rogue access point detection algorithm for WiFi-enabled Internet of Things(IoT) devices , 2020, Internet Things.
[20] Muhammad Tahir,et al. A Lightweight Authentication and Authorization Framework for Blockchain-Enabled IoT Network in Health-Informatics , 2020, Sustainability.
[21] Christos Douligeris,et al. Security in IoMT Communications: A Survey , 2020, Sensors.
[22] Abhishek Kumar,et al. Securing communication by attribute-based authentication in HetNet used for medical applications , 2020, EURASIP J. Wirel. Commun. Netw..
[23] Praveen Kumar Reddy Maddikunta,et al. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture , 2020, Comput. Commun..
[24] Maria-Dolores Cano,et al. Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA , 2020, Secur. Commun. Networks.
[25] Devesh Pratap Singh,et al. BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment , 2020, IEEE Access.
[26] Rui Yang,et al. Merging RFID and Blockchain Technologies to Accelerate Big Data Medical Research Based on Physiological Signals , 2020, Journal of healthcare engineering.
[27] S. Manimurugan,et al. Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network , 2020, IEEE Access.
[28] Elias Yaacoub,et al. Securing internet of medical things systems: Limitations, issues and recommendations , 2020, Future Gener. Comput. Syst..
[29] Samuel H. Fuller,et al. A Low-Power Dual-Factor Authentication Unit for Secure Implantable Devices , 2020, 2020 IEEE Custom Integrated Circuits Conference (CICC).
[30] Yaghoub Farjami,et al. MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption , 2020, Journal of Ambient Intelligence and Humanized Computing.
[31] Michael Kimwele,et al. Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system , 2020, Journal of medical engineering & technology.
[32] Mohamed Jmaiel,et al. AUDIT: AnomaloUs data Detection and Isolation approach for mobile healThcare systems , 2019, Expert Syst. J. Knowl. Eng..
[33] Xiaojiang Du,et al. Secure medical treatment with deep learning on embedded board , 2020 .
[34] Shilpa Chaudhari,et al. An efficient approach for enhancing security in Internet of Things using the optimum authentication key , 2020, International Journal of Computers and Applications.
[35] Yingnan Sun,et al. Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey , 2019, IEEE Access.
[36] Vaidehi Vijayakumar,et al. Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles , 2019, Journal of Medical Systems.
[37] Sameh Sorour,et al. Role-Based Hierarchical Medical Data Encryption for Implantable Medical Devices , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[38] Afsaneh Dehnad,et al. Security Requirements of Internet of Things-Based Healthcare System: a Survey Study , 2019, Acta informatica medica : AIM : journal of the Society for Medical Informatics of Bosnia & Herzegovina : casopis Drustva za medicinsku informatiku BiH.
[39] Zhiwei Wang,et al. Blind Batch Encryption-Based Protocol for Secure and Privacy-Preserving Medical Services in Smart Connected Health , 2019, IEEE Internet of Things Journal.
[40] Malka N. Halgamuge,et al. Security and Privacy of Internet of Medical Things (IoMT) Based Healthcare Applications: A Review , 2019 .
[41] Sabrina Sicari,et al. How to evaluate an Internet of Things system: Models, case studies, and real developments , 2019, Softw. Pract. Exp..
[42] Yuguang Fang,et al. Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcare , 2019, IEEE Internet of Things Journal.
[43] Hamid Jahankhani,et al. Digital Forensic Investigation For The Internet Of Medical Things (IoMT) , 2019, Journal of Forensic, Legal & Investigative Sciences.
[44] Deepak Puthal,et al. PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things , 2019, IEEE Transactions on Consumer Electronics.
[45] Nenghai Yu,et al. Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data , 2019, IEEE Internet of Things Journal.
[46] Denis Rosário,et al. Heart of IoT: ECG as biometric sign for authentication and identification , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[47] Veljko M. Milutinovic,et al. Challenges in wireless communication for connected sensors and wearable devices used in sport biofeedback applications , 2019, Future Gener. Comput. Syst..
[48] Xiaojiang Du,et al. A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants , 2019, IEEE Access.
[49] Dong-Wook Seo,et al. Development of ECG Monitoring System and Implantable Device with Wireless Charging , 2019, Micromachines.
[50] Suparna Biswas,et al. Intelligent, Secure Big Health Data Management Using Deep Learning and Blockchain Technology: An Overview , 2019 .
[51] R. Indrakumari,et al. IoT Sensing Capabilities: Sensor Deployment and Node Discovery, Wearable Sensors, Wireless Body Area Network (WBAN), Data Acquisition , 2019, Intelligent Systems Reference Library.
[52] Byung-Seo Kim,et al. The Internet of Things: A Review of Enabled Technologies and Future Challenges , 2019, IEEE Access.
[53] Mojtaba Alizadeh,et al. The application of internet of things in healthcare: a systematic literature review and classification , 2018, Universal Access in the Information Society.
[54] V. Navya,et al. Threshold-based energy-efficient routing for transmission of critical physiological parameters in a wireless body area network under emergency scenarios , 2018, International Journal of Computers and Applications.
[55] Khelifa Benahmed,et al. Security Mechanisms for 6LoWPAN Network in Context of Internet of Things: A Survey , 2018, Renewable Energy for Smart and Sustainable Cities.
[56] Ingrid Moerman,et al. A Survey of LoRaWAN for IoT: From Technology to Application , 2018, Sensors.
[57] Byung-Seo Kim,et al. IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey , 2018, Sensors.
[58] Fernando A. Kuipers,et al. Security Vulnerabilities in LoRaWAN , 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).
[59] Rahat Ali Khan,et al. The state-of-the-art wireless body area sensor networks: A survey , 2018, Int. J. Distributed Sens. Networks.
[60] Chunhua Wang,et al. Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform , 2018, IEEE Access.
[61] Alessandra Pieroni,et al. E-health-IoT Universe: A Review , 2017 .
[62] Yuval Elovici,et al. Opening Pandora's Box: E ective Techniques for Reverse Engineering IoT Devices , 2017 .
[63] Sajjan G. Shiva,et al. Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment , 2017, 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops).
[64] Rafael Medina Carnicer,et al. Deep multi-task learning for gait-based biometrics , 2017, 2017 IEEE International Conference on Image Processing (ICIP).
[65] Tosiron Adegbija,et al. A Workload Characterization for the Internet of Medical Things (IoMT) , 2017, 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[66] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[67] Suresh Neethirajan,et al. Recent advances in wearable sensors for animal health management , 2017 .
[68] M. Haghi,et al. Wearable Devices in Medical Internet of Things: Scientific Research and Commercially Available Devices , 2017, Healthcare informatics research.
[69] Gaurav Choudhary,et al. Internet of Things: A survey on architecture, technologies, protocols and challenges , 2016, 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE).
[70] Amr M. Youssef,et al. Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.
[71] Anastasios A. Economides,et al. Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information , 2015, Expert Syst. Appl..
[72] Yi Zhang,et al. Enabling Safe Interoperation by Medical Device Virtual Integration , 2015, IEEE Design & Test.
[73] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[74] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[75] Wanlei Zhou,et al. RFID in Healthcare – Current Trends and the Future , 2015, Mobile Health.
[76] Jinisha Y. Bhanushali,et al. Internet of Things: Machine to Machine communication with emphasis on role of RFID and NFC , 2015 .
[77] Al-Sakib Khan Pathan,et al. Lethality of SQL injection against current and future internet technologies , 2014, Int. J. Comput. Sci. Eng..
[78] Manos M. Tentzeris,et al. Integrating tiny RFID- and NFC-based sensors with the Internet , 2014 .
[79] Farid Touati,et al. A comparative analysis of BLE and 6LoWPAN for U-HealthCare applications , 2013, 2013 7th IEEE GCC Conference and Exhibition (GCC).
[80] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[81] Gérard Lachapelle,et al. GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .
[82] Lucia Lo Bello,et al. Comparative assessments of IEEE 802.15.4/ZigBee and 6LoWPAN for low-power industrial WSNs in realistic scenarios , 2012, 2012 9th IEEE International Workshop on Factory Communication Systems.
[83] Haishen Peng,et al. WIFI network information security analysis research , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[84] John E Ferguson,et al. Wireless communication with implanted medical devices using the conductive properties of the body , 2011, Expert review of medical devices.
[85] Panagiotis Papadimitratos,et al. Effectiveness of distance-decreasing attacks against impulse radio ranging , 2010, WiSec '10.
[86] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.