2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON) 2022
DOI: 10.1109/melecon53508.2022.9842900
|View full text |Cite
|
Sign up to set email alerts
|

Biometric-Based Packet Validation Scheme for Body Area Network Smart Healthcare Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…However, there are certain limitations to blockchain technology such as high storage complexities. It has also been noted that IIoT has become a disruptive computing paradigm across various domains such as smart cities [190], [191], [192], healthcare [193], [194], [195] and manufacturing [196], [133]. It has introduced ubiquity in the sharing of healthcare data [197] and therefore transforming healthcare from digital to intelligent [198].…”
Section: Key Findingsmentioning
confidence: 99%
“…However, there are certain limitations to blockchain technology such as high storage complexities. It has also been noted that IIoT has become a disruptive computing paradigm across various domains such as smart cities [190], [191], [192], healthcare [193], [194], [195] and manufacturing [196], [133]. It has introduced ubiquity in the sharing of healthcare data [197] and therefore transforming healthcare from digital to intelligent [198].…”
Section: Key Findingsmentioning
confidence: 99%
“…On the other hand, the RFID based mutual authentication protocol in [169] requires the execution of complex elliptic curve encryption. As such, it incurs high computing overheads [170], which is inefficient for the tags. This problem can be addressed by the multi-server environment security protocol in [171].…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
“…However, effectiveness [238] of the assurance techniques is a factor that is difficult to measure in the operational phase [239]. Therefore, a methodology is required to establish whether the security controls [240]- [244] are adequate and appropriate for specific systems. To attain this, it is essential for these factors to be considered while developing a security assurance technique.…”
Section: Research Gaps and Recommendationsmentioning
confidence: 99%