Smart Healthcare System Design 2021
DOI: 10.1002/9781119792253.ch9
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Framework for Protecting Clinical Data in Medical IoT Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…In this sense, a digital twins approach, where virtual and physical counterparts devise a model for thorough analysis, is one way to improve prediction. Our investigation has also identified how the use of modern approaches, such as cloud and fog computing [117][118][119], in healthcare can help patients receive better care whilst seamlessly protecting their data and equipment. We have argued that these approaches need more timely analysis features, as the abstraction demanded to compute numerical indices sometimes hinders decision-making capabilities due to the sheer complexity of the potential state space posed by MIoT/IoT.…”
Section: Future Work and Research Directionsmentioning
confidence: 99%
“…In this sense, a digital twins approach, where virtual and physical counterparts devise a model for thorough analysis, is one way to improve prediction. Our investigation has also identified how the use of modern approaches, such as cloud and fog computing [117][118][119], in healthcare can help patients receive better care whilst seamlessly protecting their data and equipment. We have argued that these approaches need more timely analysis features, as the abstraction demanded to compute numerical indices sometimes hinders decision-making capabilities due to the sheer complexity of the potential state space posed by MIoT/IoT.…”
Section: Future Work and Research Directionsmentioning
confidence: 99%
“…Inadequate security measures or complex registration processes can hinder accessibility and inclusivity, particularly for marginalized populations [72]. This may result in exclusion from essential services or the creation of counterfeit identities.…”
Section: Inclusivity and Accessibility Challengesmentioning
confidence: 99%
“…They assess the security features provided by these frameworks, highlighting their strengths and limitations.The framework aims to address the security challenges faced by IoT systems, considering the unique characteristics and requirements of IoT environments. [7][8] [9][10] [11] [12] Maitra and Paul (2008) used the KSA phase with zigzag and IV replacement to RC4+ for safety. PRGA shift operation pointers.…”
Section: Literature Surveymentioning
confidence: 99%
“…Input parameters: input data parameters Output: Cipher Text [3] : the constant sigma[0] to sigma [3] m [4] to m [11] : the 128 bit key (divided into 8 32 bit words) m [12] : the block cipher m [13] to m [15] : the 128 bit block nonce…”
Section: Algorithmmentioning
confidence: 99%