2021
DOI: 10.1002/smr.2335
|View full text |Cite
|
Sign up to set email alerts
|

Security and provenance for Internet of Health Things: A systematic literature review

Abstract: Internet of Health Things (IoHT) is an extension of the Internet of Things (IoT), which plays an important role in the observation, consultation, monitoring, and treatment process of remote exchange data processes in healthcare. The integration, computation, and interoperability are facilitated through various sensors, controllers, and actuators. Security is considered as one of the important factors for the communication of these devices to smoothly run the activities of healthcare. The current literature ass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 91 publications
(22 reference statements)
0
18
0
Order By: Relevance
“…These SLR guidelines have three key steps, which are planning the review, conducting the review, and reporting the review. A similar approach was applied by many other researchers in their studies 41–54 . We will discuss in detail below all in SLR protocols.…”
Section: Methodsmentioning
confidence: 99%
“…These SLR guidelines have three key steps, which are planning the review, conducting the review, and reporting the review. A similar approach was applied by many other researchers in their studies 41–54 . We will discuss in detail below all in SLR protocols.…”
Section: Methodsmentioning
confidence: 99%
“…This includes lack of authorization/insufficient authentication, insecure web interfaces, lack of transport encryption, insecure network services, privacy concerns, insecure cloud interfaces, inadequate security configuration, insecure software or firmware, poor physical security, and insecure mobile interfaces [60]. Interested readers can refer to [61,62] for detailed security issues concerning IoHT.…”
Section: Ioht Security Landscapementioning
confidence: 99%
“…To reduce time complexity, images can be encrypted using chaos and transformation techniques such as Discrete Cosine transform (DCT) and DWT [19][20][21][22][23][24][25][26][27][28]. In the past few years, chaos has played a vital role in image encryption due to its some unique features such as sensitivity in initial conditions, unpredictability, pseudo randomness, ergodicity, and non-deterministic behavior [29][30][31][32][33][34]. Chaotic systems can be divided into low-dimensional and highdimensional maps.…”
Section: Plos Onementioning
confidence: 99%