Robust watermarking algorithm for medical volume data in internet of medical things

J Liu, J Ma, J Li, M Huang, N Sadiq, Y Ai - IEEE Access, 2020 - ieeexplore.ieee.org
… Internet of Medical Things (IoMT). Based on the strict security requirements and high level
of accuracy required for disease diagnosis and pathological analysis, 3D medical volume data …

Security in IoMT communications: A survey

D Koutras, G Stergiopoulos, T Dasaklis… - Sensors, 2020 - mdpi.com
… The term Internet of Things (IoT) refers to a wide range of … various sectors with different
security requirements and needs, … , also known as Internet of Medical Things (IoMT), may support …

Precision health data: Requirements, challenges and existing techniques for data security and privacy

C Thapa, S Camtepe - Computers in biology and medicine, 2021 - Elsevier
… The growth is due to electronic health records (EHR), medical images, and the internet of
medical things (IoMT), including wearable devices (eg, fitness trackers such as FitBits). It is …

Security framework for IoT based real-time health applications

A Hussain, T Ali, F Althobiani, U Draz, M Irfan, S Yasin… - Electronics, 2021 - mdpi.com
things that are not necessary to share with a third person. Confidentiality, integrity and
availability are the primary requirements of data security. … to consult remote medical specialists. …

A secure and efficient cloud-centric internet-of-medical-things-enabled smart healthcare system with public verifiability

M Kumar, S Chand - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… goals defined in [33], we consider the following security attacks for the proposed systems.
1) Eavesdropping: An unauthorized party could not listen sensitive data in the WBAN …

A secure certificateless signcryption scheme without pairing for internet of medical things

X Chen, D He, MK Khan, M Luo… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
security proof for our design and compare its security with some related schemes. The
security analysis demonstrates that our scheme can achieve the claimed security properties. …

Security and privacy requirements for the internet of things: A survey

N Alhirabi, O Rana, C Perera - ACM Transactions on Internet of Things, 2021 - dl.acm.org
… this study is security and privacy, we will briefly introduce requirements engineering in …
security and their attributes as part of requirements definition. In Section 5, we present the security

Internet of Healthcare Things: A contemporary survey

S Ketu, PK Mishra - Journal of Network and Computer Applications, 2021 - Elsevier
… and security structures from the perspective of smart healthcare, including security challenges,
security requirements, … We can also track medical staff in real-time. In IoHT infrastructure …

A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things

RK Mahendran, P Velusamy - Computer Communications, 2020 - Elsevier
security model uses a signature-based masking technique to encrypt the message. Applied
layer security model uses different security … Biometric security system proposed in existing …

Security issues in implantable medical devices: Fact or fiction?

V Hassija, V Chamola, BC Bajpai, S Zeadally - Sustainable Cities and …, 2021 - Elsevier
security in the Internet of Things (IoT) Domain. These protocols have not been developed,
keeping in mind the security threats and requirements of the Internet of Medical Things (IoMT). …