2022 International Conference on Electronics and Renewable Systems (ICEARS) 2022
DOI: 10.1109/icears53579.2022.9751848
|View full text |Cite
|
Sign up to set email alerts
|

Pragmatic Analysis of IoMT Network Modelling Techniques from a Statistical Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…IoMT network design needs constant validation because of the broad range of performance, which extends the time to market and raises implementation costs. In [18], they offered a statistical study of models for IoMT network design that aims to reduce the number of validations. The three important algorithms applied in the MEC's resource allocation management process are the DPSO, ACO, and basic PSO, according to [19,20].…”
Section: Literature Surveymentioning
confidence: 99%
“…IoMT network design needs constant validation because of the broad range of performance, which extends the time to market and raises implementation costs. In [18], they offered a statistical study of models for IoMT network design that aims to reduce the number of validations. The three important algorithms applied in the MEC's resource allocation management process are the DPSO, ACO, and basic PSO, according to [19,20].…”
Section: Literature Surveymentioning
confidence: 99%
“…Researchers applied the cryptography techniques of symmetric and asymmetric algorithms to define different authentication keys, encryption, and decryption information to support the security of transferring data between the IoMT nodes and layers [9][10][11][12][13]. By providing trust-based services, the studies tried to solve the security and privacy problems via defining a hard limitation to provide or dedicate a server to a requester when correctness has a highlighter role than availability [14,15]. The trust-based approaches lead to the high limitations of providing a service.…”
Section: Introductionmentioning
confidence: 99%
“…Sustainability 2022, 14, x FOR PEER REVIEW 13 of 31 15. ServiceSecurity assesses the application security based on the number of correct services received (CorrectServicet) and the total number of services (TotalServicet) at t time.…”
mentioning
confidence: 99%