The internet of medical things and artificial intelligence: trends, challenges, and opportunities

K Kakhi, R Alizadehsani, HMD Kabir, A Khosravi… - Biocybernetics and …, 2022 - Elsevier
High quality and efficient medical service is one of the major factors defining living
standards. Developed countries strive to make their healthcare systems as efficient and cost …

IoMT malware detection approaches: analysis and research challenges

M Wazid, AK Das, JJPC Rodrigues, S Shetty… - IEEE …, 2019 - ieeexplore.ieee.org
The advancement in Information and Communications Technology (ICT) has changed the
entire paradigm of computing. Because of such advancement, we have new types of …

Secure health data sharing for medical cyber-physical systems for the healthcare 4.0

H Qiu, M Qiu, M Liu, G Memmi - IEEE journal of biomedical and …, 2020 - ieeexplore.ieee.org
The recent spades of cyber attacks have compromised end-users' data security and privacy
in Medical Cyber-Physical Systems (MCPS) in the era of Health 4.0. Traditional standard …

Towards a secure and sustainable internet of medical things (iomt): Requirements, design challenges, security techniques, and future trends

B Bhushan, A Kumar, AK Agarwal, A Kumar… - Sustainability, 2023 - mdpi.com
Recent advances in machine-to-machine (M2M) communications, mini-hardware
manufacturing, and micro computing have led to the development of the Internet of Things …

A survey on security and cryptographic perspective of Industrial-Internet-of-Things

N Mishra, SKH Islam, S Zeadally - Internet of Things, 2024 - Elsevier
Abstract The Industrial-Internet-of-Things (IIoT) powers several applications in the modern
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …

A survey on trend and classification of internet of things reviews

AHM Aman, E Yadegaridehkordi, ZS Attarbashi… - Ieee …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is sha** the current and next generation of the Internet. The
vision of IoT is to embed communication capabilities with a highly distributed, ubiquitous and …

[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.

JS Jayaprakash, K Balasubramanian… - … Materials & Continua, 2022 - cdn.techscience.cn
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …

MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption

SM Pournaghi, M Bayat, Y Farjami - Journal of Ambient Intelligence and …, 2020 - Springer
Abstract The development of Electronic Information Technology has made the Electronic
Medical Record a commonly used approach to recording and categorizing medical patient …

Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap

M Wazid, AK Das, S Shetty, P Gope… - IEEE …, 2020 - ieeexplore.ieee.org
5G mobile communication systems promote the mobile network to not only interconnect
people, but also interconnect and control the machine and other devices. 5G-enabled …

Building trust/distrust relationships on signed social service network through privacy-aware link prediction process

H Kou, H Liu, Y Duan, W Gong, Y Xu, X Xu, L Qi - Applied Soft Computing, 2021 - Elsevier
With the ever-increasing popularity of social software, we can easily establish a signed
social n etwork (SSN) by capturing users' attitudes (ie, trust/distrust, friend/enemies …