2022
DOI: 10.3390/s22041448
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS

Abstract: In the era of smart healthcare, Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS) play an important role, while accessing, monitoring, assessing, and prescribing patients ubiquitously. Efficient authentication and secure data transmission are the influential impediments of these networks that need to be addressed to maintain credence among clients, healthcare specialists, pharmacologists, and other associated entities. To address the authentication and data privacy issues in smart healthcare… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 88 publications
(56 citation statements)
references
References 41 publications
0
56
0
Order By: Relevance
“…STARTGAS: represents the max number of computational steps allowed for the transaction to execute. The data field is the key field that the contracts use to read whenever a smart contract is addressed [ 42 , 43 , 44 , 45 , 46 ]. IIoT Security Threats IIoT solutions consist of industrial systems that connect to cloud for data collection and analysis purposes.…”
Section: Background and Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…STARTGAS: represents the max number of computational steps allowed for the transaction to execute. The data field is the key field that the contracts use to read whenever a smart contract is addressed [ 42 , 43 , 44 , 45 , 46 ]. IIoT Security Threats IIoT solutions consist of industrial systems that connect to cloud for data collection and analysis purposes.…”
Section: Background and Related Studiesmentioning
confidence: 99%
“…The second level of FN’s latency is reduced because of IoMT device communication. As a result, users’ requirements are encountered in the proposed fog computing (FC) model [ 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 ].…”
Section: Proposed Frameworkmentioning
confidence: 99%
“…is research [12] examines how changing centralized databases to corner ones might reduce data manipulation. Cloud, fog, blockchain, and IoMT are all parts of the system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The grid providers can formulate a more reasonable and reliable distribution strategy of electricity by the realtime collection and analysis of the situation of electric generation, transmission and demand/consumption [3]. However, the information exchange between the end user and the grid providers may face some security issues and threats [4][5][6].…”
Section: Introductionmentioning
confidence: 99%