2022
DOI: 10.1109/access.2022.3180367
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Identity Management Systems in Health IoT: A Systematic Review

Abstract: Identity and Access Management (IAM) systems are crucial for any information system, such as healthcare information systems. Health IoT (HIoT) applications are targeted by attackers due to the highvolume and sensitivity of health data. Thus, IAM systems for HIoT need to be built with high standards and based on reliable frameworks. Blockchain (BC) is an emerging technology widely used for developing decentralized IAM solutions. Although, the integration of BC in HIoT for proposing IAM solutions has gained rece… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
23
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(23 citation statements)
references
References 70 publications
0
23
0
Order By: Relevance
“…Electronic health records (EHR), patient health records (PHR), and mobile health are examples of subdomains within the e-health industry (m-Health). The Internet of Things (IoT) for health is widely used in e-Health areas [ 7 ]. Figure 1 shows the security vulnerabilities of the IoMT environment.…”
Section: Introductionmentioning
confidence: 99%
“…Electronic health records (EHR), patient health records (PHR), and mobile health are examples of subdomains within the e-health industry (m-Health). The Internet of Things (IoT) for health is widely used in e-Health areas [ 7 ]. Figure 1 shows the security vulnerabilities of the IoMT environment.…”
Section: Introductionmentioning
confidence: 99%
“…The contribution of our previous paper [ 4 ] was to review the BC-IdM systems in HIoT. In that study, we reviewed 24 studies that proposed BC-IdM solutions in HIoT applications and, as a result, identified the architecture of BC-IdM systems in HIoT, covered security and privacy concerns, and identified the need to develop a comprehensive cybersecurity risk management framework and conduct security risk assessments for BC-based IdM systems in HIoT.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, several studies have also applied Blockchain for developing decentralized IdM systems in HIoT. These studies were reviewed and analysed in [ 4 ].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations