4.8 Article

An Intelligent Trust Cloud Management Method for Secure Clustering in 5G Enabled Internet of Medical Things

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare

Yi Sun et al.

Summary: This article investigates how to securely access patients' records from previous case-databases while protecting patient privacy. The proposed privacy-preserving medical record searching scheme based on ElGamal Blind Signature allows patients to make self-helped medical diagnosis and intelligently obtain target searching information. The scheme greatly improves the timeliness of information acquisition and meets the high-speed information sharing requirements, while ensuring bilateral security for patient privacy and case-database privacy.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things

Hang Li et al.

Summary: The Internet of Health Things (IoHT) refers to uniquely identifiable devices connected to the Internet that can communicate with each other. This concept plays a crucial role in smart health monitoring and improvement systems, with cybersecurity being a top priority. This article proposes a novel access policy expression method and constructs a flexible and efficient encryption scheme to ensure data security in the IoHT.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2022)

Article Engineering, Electrical & Electronic

Mobile Edge Computing Enabled 5G Health Monitoring for Internet of Medical Things: A Decentralized Game Theoretic Approach

Zhaolong Ning et al.

Summary: This paper presents a cost-efficient in-home health monitoring system for IoMT based on Mobile Edge Computing, divided into two sub-networks. The algorithm considers the characteristics of IoMT, patient costs, and wireless resource allocation, achieving a Nash equilibrium.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things

B. D. Deebak et al.

Summary: Technological development enhances the computational capabilities of smart devices using TMIS in healthcare organizations, improving medical identification and automating remote healthcare monitoring. The CBMH platform offers emergency treatment support and emphasizes security and patient anonymity.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Computer Science, Information Systems

A Detection Framework Against CPMA Attack Based on Trust Evaluation and Machine Learning in IoT Network

Liang Liu et al.

Summary: This article proposes a targeted insider attack model and a malicious nodes detection framework to address targeted insider attacks in IoT networks. By maintaining partial trust metrics and utilizing regression and clustering algorithms, the detection accuracy is improved. Experimental results demonstrate that the proposed scheme can effectively detect and identify malicious nodes' attack modes with high accuracy.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Automation & Control Systems

A Secure Clustering Protocol With Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks

Liu Yang et al.

Summary: This article presents a secure clustering protocol for industrial wireless sensor networks, which utilizes fuzzy trust evaluation and outlier detection to ensure security. The protocol adopts an interval type-2 fuzzy logic controller and a density-based outlier detection mechanism, and proposes a fuzzy-based cluster heads election method to achieve a balance between energy saving and security assurance. Extensive experiments demonstrate the effectiveness of the protocol in defending the network against attacks from internal malicious or compromised nodes.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Hardware & Architecture

DEEP-LEARNING-EMPOWERED BREAST CANCER AUXILIARY DIAGNOSIS FOR 5GB REMOTE E-HEALTH

Keping Yu et al.

Summary: Breast cancer, the most common cancer in women, lacks high-quality medical resources in remote areas. While remote e-health has improved the situation to some extent, technical limitations, such as network bandwidth constraints and the availability of skilled doctors, hinder its capabilities. The proposed deep learning-based breast cancer auxiliary diagnosis scheme supported by 5G technology aims to overcome these limitations and improve diagnostic accuracy in remote areas.

IEEE WIRELESS COMMUNICATIONS (2021)

Article Computer Science, Artificial Intelligence

A neutrosophic WPM-based machine learning model for device trust in industrial internet of things

Mohammad Ayoub Khan et al.

Summary: The manufacturing industry stands to benefit significantly from implementing Industrial Internet of Things (IIoT) concepts and technologies, with the challenge of integration and seamless operation introducing IIoT as a separate field of study in smart manufacturing. A trust model based on the neutrosophic weighted product method (WPM) has been proposed to accurately assess IIoT devices' trustworthiness, showing promising results in detecting misbehavior more accurately than other aggregation methods.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Information Systems

TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing

Weidong Fang et al.

WIRELESS NETWORKS (2020)

Article Automation & Control Systems

Distributed H∞ Estimation in Sensor Networks With Two-Channel Stochastic Attacks

Haiyu Song et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Article Engineering, Electrical & Electronic

Efficient Resource Allocation in SCMA-Enabled Device-to-Device Communication for 5G Networks

Ajmery Sultana et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

A Survey of Healthcare Internet of Things (HIoT): A Clinical Perspective

Hadi Habibzadeh et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Distributed Artificial Intelligence Solution for D2D Communication in 5G Networks

Iacovos Ioannou et al.

IEEE SYSTEMS JOURNAL (2020)

Article Engineering, Electrical & Electronic

A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks

Jinfang Jiang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Physical Layer Security in D2D Underlay Cellular Networks With Poisson Cluster Process

Jiawei Lyu et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks

Zhengyi Shang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System With Public Verifiability

Mahender Kumar et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Engineering, Electrical & Electronic

A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks

Guangjie Han et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Information Systems

A secure routing protocol with regional partitioned clustering and Beta trust management in smart home

Zhen Hong et al.

WIRELESS NETWORKS (2019)

Article Computer Science, Hardware & Architecture

Machine Learning Based Trust Computational Model for IoT Services

Upul Jayasinghe et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2019)

Article Computer Science, Information Systems

Trust evaluation method for clustered wireless sensor networks based on cloud model

Tong Zhang et al.

WIRELESS NETWORKS (2018)

Article Engineering, Electrical & Electronic

A Trust Cloud Model for Underwater Wireless Sensor Networks

Jinfang Jiang et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Engineering, Electrical & Electronic

A fuzzy fully distributed trust management system in wireless sensor networks

Hossein Jadidoleslamy et al.

AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS (2016)

Article Computer Science, Theory & Methods

ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks

Yuxin Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)