2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS) 2019
DOI: 10.1109/dcoss.2019.00091
|View full text |Cite
|
Sign up to set email alerts
|

Review of Security and Privacy for the Internet of Medical Things (IoMT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
55
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 110 publications
(55 citation statements)
references
References 38 publications
0
55
0
Order By: Relevance
“…Together with various other solutions, Pagoropoulos et al underscore the importance of relational database management systems (RDBMS) and database handling systems in waste handling, where they facilitate decision-making, leading to the re-planning of the value network [80]. Hatzivasilis et al present main defense mechanisms for providing end-to-end data security and privacy, facilitating the integration of big data, Internet of Medical Things (IoMT) with the CE and contributing to the optimized use of assets [81].…”
Section: Data Management and Storagementioning
confidence: 99%
“…Together with various other solutions, Pagoropoulos et al underscore the importance of relational database management systems (RDBMS) and database handling systems in waste handling, where they facilitate decision-making, leading to the re-planning of the value network [80]. Hatzivasilis et al present main defense mechanisms for providing end-to-end data security and privacy, facilitating the integration of big data, Internet of Medical Things (IoMT) with the CE and contributing to the optimized use of assets [81].…”
Section: Data Management and Storagementioning
confidence: 99%
“…Hatzivasilis et al [98] reviewed security and privacy in the IoMT. In an IoMT-based health care system, there are three main application settings: hospitals, homes, and body sensors.…”
Section: Survey Papers On Security and Privacy In Iomt-based Health Carementioning
confidence: 99%
“…Such surveys have primarily focused on WBANs in terms of wireless medical sensor networks [43], Distributed Denial of Service (DDoS) attacks [44] and body-to-body sensor networks [47]. There are some reviews that have investigated Internet of Things (IoT) for medical applications [48]- [51], as well as cloud-based EHRs [52] and Mobile Cloud Computing [53]. These reviews represent a concentrated body of knowledge about the challenges and solutions on security for resourceconstrained devices and cloud services, so as to ensure confidentiality of data in-transit (over network) and at-rest (residing in devices or servers).…”
Section: Security and Privacy Of Health Critical Systemsmentioning
confidence: 99%