2022
DOI: 10.1155/2022/1863838
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy on Smart Healthcare Technologies: Security Framework, Case Study, and Future Directions

Abstract: There is a massive transformation in the traditional healthcare system from the specialist-centric approach to the patient-centric approach by adopting modern and intelligent healthcare solutions to build a smart healthcare system. It permits patients to directly share their medical data with the specialist for remote diagnosis without any human intervention. Furthermore, the remote monitoring of patients utilizing wearable sensors, Internet of Things (IoT) technologies, and artificial intelligence (AI) has ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 155 publications
0
1
0
Order By: Relevance
“…This system can be used for authentication whenever confidential information about the missions or the country's security is given to the soldiers to ensure that no one else except those selected soldiers is provided with that information. One of the scenarios where this authentication system would be useful in military would be before entering the military base, the soldiers will be asked to wear EEG sensors, 34 which will capture the EEG signals of the soldiers while performing some predefined specific tasks. After capturing the EEG signals of the soldier, these signals would be used for authenticating their identity through our proposed approach.…”
Section: Proposed Architecturementioning
confidence: 99%
“…This system can be used for authentication whenever confidential information about the missions or the country's security is given to the soldiers to ensure that no one else except those selected soldiers is provided with that information. One of the scenarios where this authentication system would be useful in military would be before entering the military base, the soldiers will be asked to wear EEG sensors, 34 which will capture the EEG signals of the soldiers while performing some predefined specific tasks. After capturing the EEG signals of the soldier, these signals would be used for authenticating their identity through our proposed approach.…”
Section: Proposed Architecturementioning
confidence: 99%