Wireless body area networks and their applications—A review

DMG Preethichandra, L Piyathilaka, U Izhar… - IEEE …, 2023‏ - ieeexplore.ieee.org
In this paper, a comprehensive review of the wireless body area network is provided. A
review of the WBAN architectures, standard network topologies, and WBAN communication …

[HTML][HTML] TSFIS-GWO: Metaheuristic-driven takagi-sugeno fuzzy system for adaptive real-time routing in WBANs

S Memarian, N Behmanesh-Fard, P Aryai… - Applied Soft …, 2024‏ - Elsevier
Wireless body area network (WBAN) is an internet-of-things technology that facilitates
remote patient monitoring and enables medical staff to administer timely treatments. One of …

NANO: Cryptographic enforcement of readability and editability governance in blockchain databases

C Zhang, M Zhao, J Liang, Q Fan… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
Recently, increasing personal data has been stored in blockchain databases, ensuring data
integrity by consensus. Although transparent and immutable blockchains are mainly …

A review: Security and privacy for health care application in wireless body area networks

VD Gaikwad, S Ananthakumaran - Wireless Personal Communications, 2023‏ - Springer
At present, the utilization of wireless sensor networks (WSN) is extended into various sectors
such as military, building monitoring, health monitoring, surveillance, industrial process …

Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency

M Humayun, A Alsirhani, F Alserhani… - Journal of Cloud …, 2024‏ - Springer
Blockchain technologies (BCT) are utilized in healthcare to facilitate a smart and secure
transmission of patient data. BCT solutions, however, are unable to store data produced by …

Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing

Y Zou, T Peng, G Wang, E Luo, J **ong - Journal of Systems Architecture, 2023‏ - Elsevier
Cloud-based data sharing has become a significant technology trend thanks for its
convenience and economy. Data owners are suggested to encrypt data before outsourcing …

[HTML][HTML] DACP: Enforcing a dynamic access control policy in cross-domain environments

A Salehi, R Han, C Rudolph, M Grobler - Computer Networks, 2023‏ - Elsevier
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain
to cross-domain environments (CDEs) is important for distributed services. However …

Artificial intelligence of medical things for medical information systems privacy and security

M Abdulraheem, EA Adeniyi, JB Awotunde… - Handbook of Security …, 2024‏ - taylorfrancis.com
Artificial intelligence (AI) is a modern approach based on computer research that aims to
create algorithms and programs that make machines clever and effective at carrying out jobs …

Blockchain-based IoT security solutions for IDS research centers

S Hızal, AFMS Akhter, Ü Çavuşoğlu, D Akgün - Internet of Things, 2024‏ - Elsevier
The rapid evolution of the Internet of Things (IoT) has connected real-world objects to the
Internet, enhancing digital interaction and introducing critical security vulnerabilities …

[PDF][PDF] Blockchain-based consensus for a secure smart agriculture supply chain

M Srikanth, RNVJ Mohan, MC Naik - European Chemical Bulletin, 2023‏ - researchgate.net
Andhra Pradesh is one of the leading agricultural states in India, with a diverse range of
crops, including rice, cotton, sugarcane, and fruits and vegetables. However, like many other …