2019
DOI: 10.1109/access.2019.2946081
|View full text |Cite
|
Sign up to set email alerts
|

Threat Analysis for Wearable Health Devices and Environment Monitoring Internet of Things Integration System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(25 citation statements)
references
References 28 publications
0
23
0
2
Order By: Relevance
“…In order to support a secure IoMT system ( Tseng et al., 2019 ), presented an approach for data verification with risk assessment. The approach defined analysis methods appropriate for selected IoT devices.…”
Section: The Iomt Ecosystemmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to support a secure IoMT system ( Tseng et al., 2019 ), presented an approach for data verification with risk assessment. The approach defined analysis methods appropriate for selected IoT devices.…”
Section: The Iomt Ecosystemmentioning
confidence: 99%
“…Communication is an important consideration in IoMT. For example ( Zhang et al., 2018 ), designed an IoMT system that uses Narrow Band IoT (NB-IoT) protocol ( Ma et al., 2017 ), analyzed IoMT system with Long-Term Evolution (LTE) communication, and ( Ahad et al., 2019 ) incorporated 5G based communication to support long range wireless communication, while the work of ( Tseng et al., 2019 ) focused on short range wireless communication protocol, i.e., Wi-Fi and Bluetooth as part of their work on IoMT.…”
Section: The Iomt Ecosystemmentioning
confidence: 99%
“…These technologies can also be used to track the spread of the virus by tracking the mobility of those with comorbidities. In this regard, recently, there have been several conversations about data security and privacy of the users, which are all ongoing topics at the moment, to make sure that these technologies follow the ethical guidelines and privacy of the users ( Arias et al (2015) ; He et al (2018) ; Tseng et al (2019) ; Stoyanova et al (2020) ).…”
Section: Categories Of Robotic Systems For Boosting Care Deliverymentioning
confidence: 99%
“…It is beyond the scope of this study to describe the development of the Korean government's quarantine system processes and its operational mechanisms fully. For the purpose of this research, we applied available response guidelines released by the Korean government and explored other documents about the quarantine system [35,36].…”
Section: Security Of the Korean Response Systemmentioning
confidence: 99%