2023
DOI: 10.3390/app13031287
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Internet of Medical Things

Abstract: IoMT sensor nodes, Internet of Things (IoT) wearable medical equipment, healthcare facilities, patients, and insurance firms are all increasingly being included in IoMT systems. Therefore, it is difficult to create a blockchain design for such systems, since scalability is among the most important aspects of blockchain technology. This realization prompted us to comprehensively analyze blockchain-based IoMT solutions developed in English between 2017 and 2022. This review incorporates the theoretical underpinn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 125 publications
0
2
0
Order By: Relevance
“…Various problems are associated with the security and privacy of the data in the IoMT ( Taherdoost, 2023 ). Combined networks incentivize hackers to find information in the connected devices.…”
Section: Introductionmentioning
confidence: 99%
“…Various problems are associated with the security and privacy of the data in the IoMT ( Taherdoost, 2023 ). Combined networks incentivize hackers to find information in the connected devices.…”
Section: Introductionmentioning
confidence: 99%
“…Rapid developments in large-scale industrial automation, safety, and monitoring were brought about by the Industrial Revolution. Because it incorporates an extensive variety of wireless sensors and monitors for large equipment monitoring and problem detection, the Industrial IoT has consequently generated a lot of attention [5]. Infection control and pandemic measures are shared by some nations with other nations.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, authentication and access control are the first lines of protection because they only allow individuals with the necessary rights to access data [11,12]. To guarantee data security and integrity, secure IoT systems require reciprocal permission between IoT devices and other networks [13][14][15]. If not, these systems will be vulnerable to various security issues, such as unauthorized access, data theft, and data modification [16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%