2019 IEEE International Conference on Intelligence and Security Informatics (ISI) 2019
DOI: 10.1109/isi.2019.8823430
|View full text |Cite
|
Sign up to set email alerts
|

Applied Layered-Security Model to IoMT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…However, this scheme, without fog computing system, provides privacy protection with low efficiency and long delay. Rizk et al [15] elaborated on privacy protection, but they did not propose how to retrieve data. Mishra et al [16] proposed a fog computing service scheduling algorithm and discussed how to reduce energy cost of fog computing system, but it was not combined with a retrieval scheme of the IoMT.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this scheme, without fog computing system, provides privacy protection with low efficiency and long delay. Rizk et al [15] elaborated on privacy protection, but they did not propose how to retrieve data. Mishra et al [16] proposed a fog computing service scheduling algorithm and discussed how to reduce energy cost of fog computing system, but it was not combined with a retrieval scheme of the IoMT.…”
Section: Related Workmentioning
confidence: 99%
“…In applications of IoMT, previous studies [5,15,16,18] likely involved no ciphertext retrieval and no fog computing. In this paper, we study and propose relevant schemes to protect the privacy of patients, improve the retrieval efficiency of medical workers, and reduce the delay of data transmission.…”
Section: Related Workmentioning
confidence: 99%
“…Jan et al [31] presented the authentication of nodes for streaming of data. Similarly, there are many other frameworks intended to address the security of IoMT system are presented [32], [33] [34] [35] [36] [37] [38].…”
Section: Related Workmentioning
confidence: 99%
“…PUFs have already established a foothold in various IoT applications [7], [8], as low power security has been in great demand. PUFs exploit the inherent randomness within complementary metal-oxide-semiconductor (CMOS) devices' manufacturing process to produce a unique response when offered an input challenge.…”
Section: Introductionmentioning
confidence: 99%