2024
DOI: 10.1109/jiot.2023.3286900
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Blockchain-Based and Trust-Aware Task Offloading Strategy for Healthcare IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 45 publications
0
0
0
Order By: Relevance
“…Ren et al [24] designed a task-offloading strategy for a centralized low latency, secure, and reliable decision method (LSRDM-EH) with strong emergency handling capabilities and a dual-layer multidimensional comprehensive security strategy based on blockchain. In [25], a task-offloading strategy based on blockchain and trust awareness (BBTAS), through which task-offloading requests are published as blockchain transactions and automatically and securely executed by smart contracts (SCs). A blockchain based on a private WBAN platform to assist wearable IoT devices in healthcare services was proposed in [26].…”
Section: Existing Research Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Ren et al [24] designed a task-offloading strategy for a centralized low latency, secure, and reliable decision method (LSRDM-EH) with strong emergency handling capabilities and a dual-layer multidimensional comprehensive security strategy based on blockchain. In [25], a task-offloading strategy based on blockchain and trust awareness (BBTAS), through which task-offloading requests are published as blockchain transactions and automatically and securely executed by smart contracts (SCs). A blockchain based on a private WBAN platform to assist wearable IoT devices in healthcare services was proposed in [26].…”
Section: Existing Research Workmentioning
confidence: 99%
“…The novelty of this article comes from the paradigm of blockchain of WBANs and task-offloading with DRL of the proposed work. √ × energy consumption management scheme Zhang et al [10,17] √ × total cost, load balance CTOS-DE, DNN-TOTA Deng et al [11] × √ stability, security CP-ABE Xiao et al [12] × √ security, reliability architecture model Wang et al [13] × √ security safety protocol Xu et al [14] × √ security, energy consumption security scheme Yuan et al [16,18] √ × throughput, overall utilization A3C, DQN-FATOA Yuan et al [19] √ × resource allocation TPOS Liao et al [20,23] √ × computing capacity, latency system modeling Ning et al [21] √ × system average cost system modeling Ren et al [24,25] × √ latency, security, reliability LSRDM-EH, BBTAS Baucas et al [26] × √ security private platform Son et al [27] × √ data integrity CP-ABE Proposed work √ √ system average cost, security, QoE D3QN…”
Section: Research Gapmentioning
confidence: 99%