2020
DOI: 10.1109/access.2020.2995917
|View full text |Cite
|
Sign up to set email alerts
|

BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment

Abstract: The Internet of Medical Things (IoMT) is a kind of connected infrastructure of smart medical devices along with software applications, health systems and services. These medical devices and applications are connected to healthcare systems through the Internet. The Wi-Fi enabled devices facilitate machine-to-machine communication and link to the cloud platforms for data storage. IoMT has the ability to make accurate diagnoses, with fewer mistakes and lower costs of care. IoMT with smartphone applications permit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
113
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 175 publications
(114 citation statements)
references
References 59 publications
0
113
0
1
Order By: Relevance
“…Neha Garg et al [24] launched an authentication key agreements scheme based on blockchain for IoMT environment, termed as BAKMP-IoMT. It offered secured key management among the cloud servers, personal servers and the implantable medical gadgets.…”
Section: Review On Blockchain Approaches For Security Iomtmentioning
confidence: 99%
“…Neha Garg et al [24] launched an authentication key agreements scheme based on blockchain for IoMT environment, termed as BAKMP-IoMT. It offered secured key management among the cloud servers, personal servers and the implantable medical gadgets.…”
Section: Review On Blockchain Approaches For Security Iomtmentioning
confidence: 99%
“…It has been found to be resilient against DoS, replay, main-in-the-middle, impersonation, illegal key generation, etc. [54].…”
Section: Blockchain-based Security Modelmentioning
confidence: 99%
“…Chang et al and Park et al [15,16] had offered an authentication structure between the user node and the gateway node and utilized a honeyword checker for the password security. Also, their scheme used random number generator from the Elliptic curve along with a hash function right before sending the authentication request.…”
Section: Related Workmentioning
confidence: 99%