2019
DOI: 10.1177/1550147719851977
|View full text |Cite
|
Sign up to set email alerts
|

An energy-efficient fog-to-cloud Internet of Medical Things architecture

Abstract: In order to increase the reliability, accuracy, and efficiency in the eHealth, Internet of Medical Things is playing a vital role. Current development in telemedicine and the Internet of Things have delivered efficient and low-cost medical devices. The Internet of Medical Things architectures being developed do not completely recognize the potential of Internet of Things. The Internet of Medical Things sensor devices have limited computation power; in case if a patient is using implanted medical devices, it is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…[35] Any layer of IOT paradigm such as cloud or edge. [36] Architecture Added as a new layer between physical and network layer [37] The same as fog [37] A digital ledger that can be used to maintain continuously growing data in a secure way [38].…”
Section: Discussionmentioning
confidence: 99%
“…[35] Any layer of IOT paradigm such as cloud or edge. [36] Architecture Added as a new layer between physical and network layer [37] The same as fog [37] A digital ledger that can be used to maintain continuously growing data in a secure way [38].…”
Section: Discussionmentioning
confidence: 99%
“…The main challenge is to decrease the consumption of energy during the working of the node which is that the actual data transmission will be doing. The parameters duty cycle energy consumption for baseline, offline and recovery algorithm is calculated with the optimization algorithm as a genetic algorithm [24][25][26][27].…”
Section: Related Workmentioning
confidence: 99%
“…A rule specifies the type of a protocol the signature is found, and the source and the destination of the data packet, and it also specifies what type of action should be taken if a malicious packet is predicted. 7 The key benefit of knowledge-based IDSs is their accuracy. It means if an alarm is raised up by the IDS, then it is actually an intrusion and not a false alarm.…”
Section: Background and Related Workmentioning
confidence: 99%