2017
DOI: 10.1166/jctn.2017.6602
|View full text |Cite
|
Sign up to set email alerts
|

Security Threat Management by Software Obfuscation for Privacy in Internet of Medical Thing (IoMT) Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Throughout history, cyber physical attacks have taken advantage of weaknesses that are characteristics rather than defects, ranging from known instances of programmes in the 1960s that could exercise disc weapons on hard drives and cause them to respond to the Stuxnet assault, which looked to be aimed at atomic enriching enriched uranium, by self-destructing in 2007-2010. (and allegedly succeeded) [7] .…”
Section: Internet Of Things Risksmentioning
confidence: 95%
“…Throughout history, cyber physical attacks have taken advantage of weaknesses that are characteristics rather than defects, ranging from known instances of programmes in the 1960s that could exercise disc weapons on hard drives and cause them to respond to the Stuxnet assault, which looked to be aimed at atomic enriching enriched uranium, by self-destructing in 2007-2010. (and allegedly succeeded) [7] .…”
Section: Internet Of Things Risksmentioning
confidence: 95%
“…Besides, some solutions ensure the medications and treatments are used as medical doctors recommend and are also referred to as medication reminders [43,44]. In all these cases, IoMT offers a simpler approach to remote medicine and alert systems by integrating devices and software platforms [45,46].…”
Section: Internet Of Medical Things (Iomt) In Healthcarementioning
confidence: 99%
“…The cryptography approach safeguards data privacy by obfuscating medical applications to produce computationally indistinguishable outputs. Kavitha et al [69] established a formal model for addressing security concerns using the program obfuscation approach. Their indistinguishable inscrutable obfuscated medical data transfer can be deployed between standard-compliant equipment in a health service center or clinical center to eliminate fraud and internal human risks.…”
Section: ) Authentication Based On Cryptographymentioning
confidence: 99%