2019
DOI: 10.3390/computation7020024
| View full text |Cite
|
Sign up to set email alerts
|

Abstract: Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical transport networks related to optical fibers. Many hospitals are acquiring their own metro dark fiber networks for collaborating with other institutes as a way to maximize their capacity to meet patient needs, as sharing scarce and expensive assets, such as scanners, allows them… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…The cluster heads cardinality is reduced by 40.1%, the energy consumption is enhanced by 21.7% and the network lifetime is extended by 20.8%. As future work, we plan to study the effect of introducing the State of Health ( ) of rechargeable batteries [ 60 ] during the clustering and integrating an optimized attack prevention schemes [ 61 ] to avoid the sudden death of network device and further increase the network durability.…”
Section: Discussionmentioning
confidence: 99%
“…The cluster heads cardinality is reduced by 40.1%, the energy consumption is enhanced by 21.7% and the network lifetime is extended by 20.8%. As future work, we plan to study the effect of introducing the State of Health ( ) of rechargeable batteries [ 60 ] during the clustering and integrating an optimized attack prevention schemes [ 61 ] to avoid the sudden death of network device and further increase the network durability.…”
Section: Discussionmentioning
confidence: 99%
“…Data security is particularly important in the medical field, and Liag et al developed an attack detection model for medical surveillance systems using Internet Protocol (IP) virtual private networks (VPNs) over optical transport networks. They proposed a multilayer network architecture and a lightweight implementation of the procedure that enabled remote access to medical devices [280].…”
Section: Cybersecurity and Data Risksmentioning
confidence: 99%
“…Among the discussed cyber defense measures, the authors focus on means for ensuring physical cybersecurity, recommendations for mitigating risks in space-based and radio communication, email and browser protection, and the adoption of Intrusion Detecting System (IDS). Note that IDSs and other standalone attack detection methods [ 15 ] are extensively used in IT [ 16 , 17 ] and OT [ 18 ] networks and can bring benefits to the security of networked ship systems.…”
Section: Related Workmentioning
confidence: 99%