2020
DOI: 10.1007/s11276-020-02340-0
|View full text |Cite
|
Sign up to set email alerts
|

Review of security challenges in healthcare internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
28
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 73 publications
(28 citation statements)
references
References 25 publications
0
28
0
Order By: Relevance
“…(2019) No Partial Yes No No Yes Yes Somasundaram et al. Somasundaram and Thirugnanam (2020) Yes Yes Yes No No Yes Yes Baker et al. Baker et al.…”
Section: Introductionmentioning
confidence: 99%
“…(2019) No Partial Yes No No Yes Yes Somasundaram et al. Somasundaram and Thirugnanam (2020) Yes Yes Yes No No Yes Yes Baker et al. Baker et al.…”
Section: Introductionmentioning
confidence: 99%
“…However, data security information for patients is given at all data handling, delivery, cloud storage, and data republication levels [24,25]. For medical security and privacy systems on the network of wireless medical sensors, the following four requirements should be considered [26].…”
Section: Security Requirements Of Medical Sensorsmentioning
confidence: 99%
“…• Various attack resistance: In a multi-server environment, the authentication scheme should be able to resist specific passive and active attacks, practically in real-world applications [28]. • Key Agreement for Secure Session: The proposed scheme should provide a secure session key to encrypt communication and protect the authentication message between entities [26].…”
mentioning
confidence: 99%
“…Recently, hackers are more creative in their methodologies and use various tactics to break into a system. It is inevitable to consider the following threat vectors while designing an IoMT defense scheme [11][12][13][14].…”
Section: Iomt Attack Typesmentioning
confidence: 99%