[HTML][HTML] Insights into Internet of Medical Things (IoMT): Data fusion, security issues and potential solutions

SF Ahmed, MSB Alam, S Afrin, SJ Rafa, N Rafa… - Information …, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) has created a wide range of opportunities for
knowledge exchange in numerous industries. The opportunities include patient …

A survey on security threats and countermeasures in internet of medical things (IoMT)

M Papaioannou, M Karageorgou… - Transactions on …, 2022 - Wiley Online Library
Internet of medical things (IoMT) is an emerging technology aiming to improve the patient's
quality of life by enabling personalized e‐health services without limitations on time and …

Game theory and reinforcement learning for anti-jamming defense in wireless communications: Current research, challenges, and solutions

L Jia, N Qi, Z Su, F Chu, S Fang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the inherently open and shared nature of the wireless channels, wireless
communication networks are vulnerable to jamming attacks, and effective anti-jamming …

Mitigating jamming attack in 5G heterogeneous networks: A federated deep reinforcement learning approach

H Sharma, N Kumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Jamming attack is one of the serious security breaches in the upcoming fifth-generation
heterogeneous networks (5G HetNets). Most of the existing anti-jamming techniques, such …

[HTML][HTML] A survey of internet of medical things: technology, application and future directions

P He, D Huang, D Wu, H He, Y Wei, Y Cui… - Digital Communications …, 2024 - Elsevier
As the healthcare industry continues to embrace digital transformation, the Internet of
Medical Things (IoMT) emerges as a key technology. IoMT plays a critical role in …

Game theory for anti-jamming strategy in multichannel slow fading IoT networks

A Gouissem, K Abualsaud, E Yaacoub… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The open nature of the wireless communication medium renders it vulnerable to jamming
attacks by malicious users. To detect their presence and to avoid such attacks, several …

Detection of reactive jamming in DSSS-based wireless communications

M Spuhler, D Giustiniano, V Lenders… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Reactive jammers have been shown to be a serious threat for wireless communication.
Despite this, it is difficult to detect their presence reliably. We propose a novel method to …

Jamming mitigation via hierarchical security game for IoT communications

X Tang, P Ren, Z Han - IEEE Access, 2018 - ieeexplore.ieee.org
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly
launch jamming attacks only when it detects the legitimate transmission, known as the …

Optimal power allocation and scheduling under jamming attacks

S D'Oro, E Ekici, S Palazzo - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we consider a jammed wireless scenario where a network operator aims to
schedule users to maximize network performance while guaranteeing a minimum …

Energy and memory efficient clone detection in wireless sensor networks

Z Zheng, A Liu, LX Cai, Z Chen… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we propose an energy-efficient location-aware clone detection protocol in
densely deployed WSNs, which can guarantee successful clone attack detection and …