2023
DOI: 10.32604/csse.2023.024537
|View full text |Cite
|
Sign up to set email alerts
|

Proof of Activity Protocol for IoMT Data Security

Abstract: The Internet of Medical Things (IoMT) is an online device that senses and transmits medical data from users to physicians within a time interval. In, recent years, IoMT has rapidly grown in the medical field to provide healthcare services without physical appearance. With the use of sensors, IoMT applications are used in healthcare management. In such applications, one of the most important factors is data security, given that its transmission over the network may cause obtrusion. For data security in IoMT sys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…Also, image retrieval [36,37] can play a vital role in generating the new natural images used as Stego images for coverless steganography. Different data types, such as text audio, and videos [38][39][40][41][42][43][44][45][46][47][48][49][50][51][52][53][54][55], may be used for generating many robust coverless steganography systems.…”
Section: Discussionmentioning
confidence: 99%
“…Also, image retrieval [36,37] can play a vital role in generating the new natural images used as Stego images for coverless steganography. Different data types, such as text audio, and videos [38][39][40][41][42][43][44][45][46][47][48][49][50][51][52][53][54][55], may be used for generating many robust coverless steganography systems.…”
Section: Discussionmentioning
confidence: 99%
“…Fig. 2 shows the sequence diagram of three smart contracts with the supply chain [50][51][52][53][54]. Medical equipment details and their requirements for treatment and medical waste details are stored in the distributed storage system on the edge computing ledger.…”
Section: Smart Contractmentioning
confidence: 99%
“…At the start, every node has the same amount of energy. The BS would have no energy constraints and has very high computing energy [25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43].…”
Section: System Modelmentioning
confidence: 99%