2022
DOI: 10.3390/s22207948
|View full text |Cite
|
Sign up to set email alerts
|

LBSS: A Lightweight Blockchain-Based Security Scheme for IoT-Enabled Healthcare Environment

Abstract: Recently, global healthcare has made great progress with the use of Internet of Things technology. However, for there to be excellent patient care, there must be a high degree of safety for the IoT health system. There has been a massive increase in hacking systems and the theft of sensitive and highly confidential information from large health centers and hospitals. That is why establishing a highly secure and reliable healthcare system has become a top priority. In this paper, a security scheme for the IoT-e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 45 publications
0
7
0
Order By: Relevance
“…However, with the advent of the Internet and the emergence of distributed public blockchain ledgers, a novel cultural technology has surfaced. These advancements possess the potential to enable inclusive participation of the entire global population, comprising seven billion individuals, while also facilitating more extensive and intricate coordination [53]. Consequently, these developments hold the promise of expediting our journey towards achieving a genuinely advanced society.…”
Section: Discussionmentioning
confidence: 99%
“…However, with the advent of the Internet and the emergence of distributed public blockchain ledgers, a novel cultural technology has surfaced. These advancements possess the potential to enable inclusive participation of the entire global population, comprising seven billion individuals, while also facilitating more extensive and intricate coordination [53]. Consequently, these developments hold the promise of expediting our journey towards achieving a genuinely advanced society.…”
Section: Discussionmentioning
confidence: 99%
“…This is expected because some of these metrics are well-known and were used before IoT began in different computing areas like networking, software, and systems engineering. However, most of the studies are limited because they depended on a single empirical validation method, i.e., the simulation strategy [1], [19], [22], [24], [27], [38], [39], [40], [41], [42]. Thus, they neglected theoretical validation.…”
Section: Rq3: How Do Researchers Validate Their Metrics?mentioning
confidence: 99%
“…Only a few solutions applied metrics to the transport/network layer (IV-B3)(IV-B3)(IV-B3) [39], [47]. Most solutions focused on the other two layers, perception and application [2], [20], [22], [24], [27], [41], [42], [48], [49], [50]. Security metrics in IoT must be considered for each layer to be reliable.…”
Section: Rq: Which Attack Types Can the Metric Detect?mentioning
confidence: 99%
See 1 more Smart Citation
“…However, with the use of ICT, networked systems and devices become vulnerable, and data is exposed. The need to ensure a secure and reliable healthcare system is a fundamental priority, highlighting the importance of protecting the privacy and confidentiality of patient's medical information [4], [5]. To achieve optimal security, it is essential to know the forms or types of computer security.…”
Section: Introductionmentioning
confidence: 99%