2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2015
DOI: 10.1109/icitst.2015.7412059
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy framework for ubiquitous healthcare IoT devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 12 publications
0
13
0
Order By: Relevance
“…During a systematic literature review, it is observed that security and privacy are still a big challenge for the Internet of medical things. Several studies were already conducted in the near past to deal with the Internet of medical things security challenges [23][24][25][26] and as well as to deal with security challenges of cloud computing [27][28][29][30][31][32]. e IoT is the complex network developed through smart devices that are connected in different ways, producing data and information for communication and exchanging information within the network.…”
Section: Mobile Information Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…During a systematic literature review, it is observed that security and privacy are still a big challenge for the Internet of medical things. Several studies were already conducted in the near past to deal with the Internet of medical things security challenges [23][24][25][26] and as well as to deal with security challenges of cloud computing [27][28][29][30][31][32]. e IoT is the complex network developed through smart devices that are connected in different ways, producing data and information for communication and exchanging information within the network.…”
Section: Mobile Information Systemsmentioning
confidence: 99%
“…Equation 25is related to calculating fuzzy positive ideal solution (FPIS), and equation (26) is associated with fuzzy negative ideal solution (FNIS).…”
Section: Phase Iv: Fuzzy Topsismentioning
confidence: 99%
See 1 more Smart Citation
“…The attacker can eavesdrop and manipulate the message in real-time without the sender or receiver noticing [6]. Referenced in: [32], [13], [16], [19], [21], [46], [26].…”
Section: Denial Of Service (Dos) (26)mentioning
confidence: 99%
“…With full access to the application, the attacker can modify or delete PHR data from the medical database [34]. Referenced in : [3], [27], [32], [21], [43], [45].…”
Section: Denial Of Service (Dos) (26)mentioning
confidence: 99%