2017
DOI: 10.1007/s12553-017-0180-8
|View full text |Cite
|
Sign up to set email alerts
|

Internet of things in medical applications with a service-oriented and security approach: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(29 citation statements)
references
References 45 publications
0
29
0
Order By: Relevance
“…A typical architecture of IoMT monitoring devices involves sensors connected directly to the human body. In custom solutions such as [72,73], Arduino modules are used to gather medical data from the sensors [12,13,64,[68][69][70]98]. Figure 2 illustrates the communications among various monitoring devices such as wearable sensors and ingestibles.…”
Section: Physiologic Monitoring Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…A typical architecture of IoMT monitoring devices involves sensors connected directly to the human body. In custom solutions such as [72,73], Arduino modules are used to gather medical data from the sensors [12,13,64,[68][69][70]98]. Figure 2 illustrates the communications among various monitoring devices such as wearable sensors and ingestibles.…”
Section: Physiologic Monitoring Devicesmentioning
confidence: 99%
“…We list them for completeness. In the healthcare environment such systems may be medical servers, coordinators, databases with health data, real-time monitors, mobile devices, laptops and network equipment [12,75,113].…”
Section: Other Ict Devicesmentioning
confidence: 99%
“…IoT devices are more vulnerable to different types of attacks on different layers of IoT architecture. There are studies concentrating on privacy and security issues and proposed solutions to address these issues [27][28][29]. Privacy and security are particularly important for the health sector because of the sensitive nature of human life data [30].…”
Section: Messaging Protocols (Rq 5)mentioning
confidence: 99%
“…Issues regarding protecting the privacy of patients and the security of medical details are two basic problems with the proper use of electronic medical services [33]. Different techniques are used to protect this healthcare data.…”
Section: Security-related Work For Medical Applicationmentioning
confidence: 99%