2023
DOI: 10.1109/access.2023.3234632
|View full text |Cite
|
Sign up to set email alerts
|

Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments From a Pragmatic Perspective

Abstract: Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security methods. Internal designs for each of these models is highly complex, and varies in terms of quantitative & qualitative performance measures. This is due to their variation in terms of design nuances, functional ad… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 136 publications
(151 reference statements)
0
5
0
Order By: Relevance
“…Biometric authentication methods, such as those based on a person's face, iris, retina, DNA, or ngerprints, are all the rage in the security certi cation industry. Authentication functions based on hashes or message authentication codes are part of function-based encryption [17].…”
Section: The Role Of Blockchain In Enhancing Iiiot Securitymentioning
confidence: 99%
“…Biometric authentication methods, such as those based on a person's face, iris, retina, DNA, or ngerprints, are all the rage in the security certi cation industry. Authentication functions based on hashes or message authentication codes are part of function-based encryption [17].…”
Section: The Role Of Blockchain In Enhancing Iiiot Securitymentioning
confidence: 99%
“…15 Normalize the parameters using Equation 23. 16 Assign weights W i to the parameters. 17 Compute the experience metric E using Equation 32.…”
Section: A Overview Of the Proposed Techniquementioning
confidence: 99%
“…Determine the node's compliance (Com) by measuring it against industry benchmarks like ISO and NIST guidelines. A higher score implies more compliance, and this may be expressed as a compliance score between 0 and 1: (16) in where S a chieved is the total number of met standards and S t otal is the total number of standards.…”
Section: ) Knowledge Metricmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the most well-known applications that make use of blockchain technology is bitcoin. Even though it is seldom updated, the Bitcoin blockchain already holds more than 190 GB of datasets & samples [ 25 , 26 ]. However, only a very small amount of this information is required for the functioning of the financial system.…”
Section: Introductionmentioning
confidence: 99%