2018
DOI: 10.1016/j.cmpb.2018.05.021
|View full text |Cite
|
Sign up to set email alerts
|

Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…Along with collecting medical data, this technology allows performing biometric identification of patients based on their physiological and behavioral patterns. Medical Internet of Things technologies allow, on the one hand, generating the flow of medical data, and, on the other hand, performing continuous biometric identification of patients (Altop, Seymen, & Levi, 2019;Arteaga-Falconi et al, 2018;Berkaya et al, 2018;Bhurane et al, 2019;Challa et al, 2018;Chukwunonyerem et al, 2016;Deng et al, 2018;Dodangeh, & Jahangir, 2018;Ehatisham-ul-Haq et al, 2018;Ellouze et al, 2018;Hu et al, 2018;Kang et al, 2018;Koya & Deepthi, 2018;Krishnan, Lokesh, & Devi, 2019;Kumar, Singhal, Saini, Roy, & Dogra, 2018;Lozoya-Santos et al, 2019;Michael, 2018;Michel-Macarty, Murillo-Escobar, López-Gutiérrez, Cruz-Hernández, & Cardoza-Avendaño, 2018;Modak & Jha, 2019;Moosavi et al, 2018;Nellyzeth, Roberto, Marco, & Conrado, 2018;Peris-Lopez et al, 2018;Pirbhulal et al, 2018;Pirbhulal et al, 2019;Wang et al, 2018;Wazid, Das, & Vasilakos, 2018, Yildirim, 2018.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Along with collecting medical data, this technology allows performing biometric identification of patients based on their physiological and behavioral patterns. Medical Internet of Things technologies allow, on the one hand, generating the flow of medical data, and, on the other hand, performing continuous biometric identification of patients (Altop, Seymen, & Levi, 2019;Arteaga-Falconi et al, 2018;Berkaya et al, 2018;Bhurane et al, 2019;Challa et al, 2018;Chukwunonyerem et al, 2016;Deng et al, 2018;Dodangeh, & Jahangir, 2018;Ehatisham-ul-Haq et al, 2018;Ellouze et al, 2018;Hu et al, 2018;Kang et al, 2018;Koya & Deepthi, 2018;Krishnan, Lokesh, & Devi, 2019;Kumar, Singhal, Saini, Roy, & Dogra, 2018;Lozoya-Santos et al, 2019;Michael, 2018;Michel-Macarty, Murillo-Escobar, López-Gutiérrez, Cruz-Hernández, & Cardoza-Avendaño, 2018;Modak & Jha, 2019;Moosavi et al, 2018;Nellyzeth, Roberto, Marco, & Conrado, 2018;Peris-Lopez et al, 2018;Pirbhulal et al, 2018;Pirbhulal et al, 2019;Wang et al, 2018;Wazid, Das, & Vasilakos, 2018, Yildirim, 2018.…”
Section: Methodsmentioning
confidence: 99%
“…Register of Healthcare Workers (Arteaga-Falconi, Al Osman, & El Saddik, 2018;Hu, Yang, Chen, Qian, & Rodrigues, 2018;Michael, 2018;Michel-Macarty, Murillo-Escobar, López-Gutiérrez, Cruz- Hernández, & Cardoza-Avendaño, 2018;Wang et al, 2018).…”
mentioning
confidence: 99%
“…In 2019, Rammyaa et al studied the performance of medical image transmission for cognitive radio multi-carrier in a code-division multiple access (CDMA) system with an image encryption algorithm based on a chaotic Arnold cat map, and the security analyses were presented [ 21 ]. In 2018, Michel-Macarty et al presented a multi-user communication scheme based on binary phase shift keying (BPSK) and the two-dimensional Hénon map in a direct sequence spread spectrum (DS/SS) system to provide privacy of biosignals privacy and security for remote health care [ 22 ]. Basic security analyses were presented, such as key analysis for sensitivity and space key, noise interference analysis, and encryption time.…”
Section: Related Workmentioning
confidence: 99%
“…The encryption algorithm of Michel-Macarty et al [ 22 ], which is based on the chaos and spread spectrum technique with symmetric-key cryptography, is used as a reference to provide information confidentiality in the proposed communication scheme. The encryption algorithm is briefly transcribed and adapted to the propose communication scheme as follows: The secret key is defined for each child-parent-specialist in a symmetric-key cryptography.…”
Section: Proposed Multi-user Secure Monitoring Schemementioning
confidence: 99%
“…However, a thorough security review is lacking to ascertain the resilience of the algorithm against attacks. Michel-Macarty et al [42] proposed a multiuser communication scheme for applications related to telemedicine. e scheme utilizes a chaotic Hénon map with code division multiple access (CDMA) technique to ensure privacy and shows robustness against noise.…”
Section: Introductionmentioning
confidence: 99%