4.6 Article

A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

ANAF-IoMT: A Novel Architectural Framework for IoMT-Enabled Smart Healthcare System by Enhancing Security Based on RECC-VC

Mohit Kumar et al.

Summary: This article investigates how to enhance the security of the Internet of Medical Things using elliptic curve cryptography and Vigenere cipher, improving data security and privacy through algorithms for privacy preservation, neural networks, optimization methods, and blockchain technology.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Chemistry, Analytical

LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things

Chien-Ming Chen et al.

Summary: The Internet of Health Things (IoHT) has introduced a new telemedicine approach in healthcare, but there are security risks and privacy concerns with the transmission of patient health data. To address these issues, we proposed a lightweight authentication protocol called LAP-IoHT and demonstrated its performance advantage through verification and comparative analysis in the IoHT environment.

SENSORS (2022)

Article Computer Science, Information Systems

IoMT-Based Platform for E-Health Monitoring Based on the Blockchain

Jalel Ktari et al.

Summary: With the increasing use of IoT in various fields, this study focuses on its application in the healthcare sector. The researchers propose a platform based on IoMT for monitoring patients' health, using Blockchain technology to ensure data security and confidentiality. The system collects data from smart sensors such as blood pressure and EEG signals, encrypts them, and stores them in an embedded Blockchain node. Preliminary results demonstrate the effectiveness of this platform as a potential low-cost and secure Electronic Health Record (EHR) solution.

ELECTRONICS (2022)

Review Chemistry, Analytical

Artificial Intelligence (AI) and Internet of Medical Things (IoMT) Assisted Biomedical Systems for Intelligent Healthcare

Pandiaraj Manickam et al.

Summary: Artificial intelligence (AI) is a modern approach in computer science that develops intelligent and efficient devices through programs and algorithms. The Internet of Medical Things (IoMT) combines network-linked biomedical devices and software applications as a next-generation bio-analytical tool. This review discusses the importance of AI in enhancing the capabilities of IoMT and point-of-care devices in healthcare, as well as its role and challenges in advanced biomedical applications.

BIOSENSORS-BASEL (2022)

Review Computer Science, Information Systems

A Systematic Review and IoMT Based Big Data Framework for COVID-19 Prevention and Detection

Soomaiya Hamid et al.

Summary: The Internet of Medical Things (IoMT) has played a crucial role in the healthcare sector during the COVID-19 outbreak. IoMT systems have been implemented to support traditional healthcare systems in providing remote medical services. This research conducts a systematic literature review (SLR) on IoMT systems for COVID-19 and other medical applications, and proposes a framework called 'cov-AID' for remote disease monitoring and diagnosis.

ELECTRONICS (2022)

Article Remote Sensing

Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

Tsuyang Wu et al.

Summary: The emergence of the Internet of Drones (IoD) as an extension of the Internet of Things (IoT) has allowed for faster and more secure data transmission through the use of 5G technology. However, existing authentication protocols have security vulnerabilities. Through the design of an improved protocol and thorough analysis and verification, the security of the protocol is found to be satisfactory.

DRONES (2022)

Article Computer Science, Information Systems

An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks

Prabhat Kumar et al.

Summary: Internet of Medical Things (IoMT), a branch of Internet of Things (IoT), provides unparalleled benefits in improving patient care quality and treatment efficiency. However, the increasing severity and frequency of cyber-attacks in IoMT environments pose significant challenges.

COMPUTER COMMUNICATIONS (2021)

Review Health Care Sciences & Services

A Perspective Roadmap for IoMT-Based Early Detection and Care of the Neural Disorder, Dementia

Sapna Juneja et al.

Summary: The Internet of Medical Things (IoMT) is a key application of IoT that improves diagnosis and care reliability. This technology faces challenges and open issues, particularly in early detection and postdetection care for neurological disorders like dementia. IoMT enables better patient monitoring and insights for tackling diseases effectively.

JOURNAL OF HEALTHCARE ENGINEERING (2021)

Article Computer Science, Information Systems

Cryptographic technologies and protocol standards for Internet of Things

Zeadally Sherali et al.

Summary: The article discusses the security issues and importance of cryptographic protocol standards in the IoT environment, as well as the advantages and disadvantages of their applications in various IoT scenarios. The authors pointed out the challenges that need to be addressed for future IoT applications.

INTERNET OF THINGS (2021)

Article Computer Science, Hardware & Architecture

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

Mahdi Fotouhi et al.

COMPUTER NETWORKS (2020)

Review Multidisciplinary Sciences

Security and Privacy in IoT-Cloud-Based e-Health Systems-A Comprehensive Review

Chanapha Butpheng et al.

SYMMETRY-BASEL (2020)

Article Computer Science, Information Systems

An Effective Training Scheme for Deep Neural Network in Edge Computing Enabled Internet of Medical Things (IoMT) Systems

Irina Valeryevna Pustokhina et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC

Adesh Kumari et al.

IEEE ACCESS (2020)

Article Engineering, Electrical & Electronic

Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks

Arezou Ostad-Sharif et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Computer Science, Interdisciplinary Applications

An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system

Preeti Soni et al.

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2019)

Article Computer Science, Hardware & Architecture

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks

Sravani Challa et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Engineering, Electrical & Electronic

SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment

Gagangeet Singh Aujla et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Hardware & Architecture

Authenticated key management protocol for cloud-assisted body area sensor networks

Mohammad Wazid et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Telecommunications

Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network

Akansha Singh et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Computer Science, Information Systems

IoMT: A Reliable Cross Layer Protocol for Internet of Multimedia Things

Shalli Rani et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Engineering, Electrical & Electronic

Design and analysis of an improved smartcard-based remote user password authentication scheme

S. K. Hafizul Islam

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2016)

Article Computer Science, Theory & Methods

The random oracle model: a twenty-year retrospective

Neal Koblitz et al.

DESIGNS CODES AND CRYPTOGRAPHY (2015)

Article Computer Science, Information Systems

An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

Santanu Chatterjee et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Health Care Sciences & Services

A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems

Xiaopeng Yan et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Computer Science, Hardware & Architecture

The random oracle methodology, revisited

R Canetti et al.

JOURNAL OF THE ACM (2004)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)