2020 International Conference on E-Health and Bioengineering (EHB) 2020
DOI: 10.1109/ehb50910.2020.9280103
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Risks for Remote Healthcare Monitoring Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Some studies used component-based architectures, such as SP, IP, and RP in the IdM systems, or miners, incentivize nodes, etc., in the BC network, or patients, SP, and data consumers in the HIoT system. Whereas some studies developed technologies- or layer-based architectures, such as [ 89 ], which are presented for systems such as cloud, communication technologies, and IoT technologies, namely Wireless Personal Area Networks (WPAN). Almost every study showed asset characteristics.…”
Section: Taxonomymentioning
confidence: 99%
See 1 more Smart Citation
“…Some studies used component-based architectures, such as SP, IP, and RP in the IdM systems, or miners, incentivize nodes, etc., in the BC network, or patients, SP, and data consumers in the HIoT system. Whereas some studies developed technologies- or layer-based architectures, such as [ 89 ], which are presented for systems such as cloud, communication technologies, and IoT technologies, namely Wireless Personal Area Networks (WPAN). Almost every study showed asset characteristics.…”
Section: Taxonomymentioning
confidence: 99%
“… [S8] Review on security threats, vulnerabilities, and countermeasures of 5G enabled Internet-of-Medical-Things [ 149 ] Review showing attacks and countermeasures in 5G HIoT, including BC applications. [S9] Security and privacy risks for remote healthcare monitoring systems [ 89 ] Review study showing vulnerabilities, security requirements, and countermeasures in HIoT. [S10] Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review [ 43 ] Review study showing HIoT regulations, security requirements, vulnerabilities, and countermeasures.…”
Section: Table A1mentioning
confidence: 99%