Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

MA Khatun, SF Memon, C Eising, LL Dhirani - IEEE Access, 2023 - ieeexplore.ieee.org
The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-
driven infrastructure that highly relies on smart sensing devices (ie, blood pressure monitors …

A Review on the Application of Internet of Medical Things in Wearable Personal Health Monitoring: A Cloud-Edge Artificial Intelligence Approach

KT Putra, AZ Arrayyan, N Hayati, C Damarjati… - IEEE …, 2024 - ieeexplore.ieee.org
The advent of the fifth-generation mobile communication technology (5G) era has catalyzed
significant advancements in medical diagnosis delivery, primarily driven by the surge in …

[HTML][HTML] Enhancing identity and access management using hyperledger fabric and oauth 2.0: A block-chain-based approach for security and scalability for healthcare …

S Sutradhar, S Karforma, R Bose, S Roy… - Internet of Things and …, 2024 - Elsevier
Block-chain-based Identity and access management framework is a promising solution to
privacy and security issues raised during the exchange of patient data in the healthcare …

[HTML][HTML] A blockchain privacy-conserving framework for secure medical data transmission in the internet of medical things

S Sutradhar, S Majumder, R Bose, H Mondal… - Decision Analytics …, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) has transformed healthcare, collecting and
transmitting vast medical data. This study proposes an innovative solution, integrating …

A comprehensive survey on the chicken swarm optimization algorithm and its applications: state-of-the-art and research challenges

B Chen, L Cao, C Chen, Y Chen, Y Yue - Artificial Intelligence Review, 2024 - Springer
The application of optimization theory and the algorithms that are generated from it has
increased along with science and technology's continued advancement. Numerous issues …

[HTML][HTML] Efficient key distribution for secure and energy-optimized communication in wireless sensor network using bioinspired algorithms

AO Khadidos, N Alhebaishi, AO Khadidos… - Alexandria Engineering …, 2024 - Elsevier
Abstract Wireless Sensor Networks (WSNs) play a major part in numerous applications such
as smart agriculture, healthcare, and environmental monitoring. Safeguarding protected …

Trustworthy Healthcare Cloud Storage Auditing Scheme (TCSHAS) with blockchain-based incentive mechanism

R Bose, S Sutradhar, D Bhattacharyya, S Roy - SN Applied Sciences, 2023 - Springer
Abstract The Trustworthy Healthcare Cloud Storage Auditing Scheme (TCSHAS) represents
a progressive solution for resolving trust-related issues linked to third-party auditors (TPAs) …

Effective Identification and Authentication of Healthcare IoT Using Fog Computing with Hybrid Cryptographic Algorithm

PB Corthis, GP Ramesh, M García-Torres, R Ruíz - Symmetry, 2024 - mdpi.com
Currently, Internet of Things (IoT)-based cloud systems face several problems such as
privacy leakage, failure in centralized operation, managing IoT devices, and malicious …

Further study on the Rulkov neuron: geometric control, circuit realization and chaos-based encryption

M Xia, C Li, Y Li, P Li - Physica Scripta, 2024 - iopscience.iop.org
Rulkov neuron with various firing modes is exhaustively explored by numerical simulation
aiming to disclose its unique properties of evolution. Transient chaos and the coexistence of …

Hybrid Encryption Technique to Enhance Security of Health Data in Cloud Environment

A Dutta, R Bose, S Roy, S Sutradhar - Archives of Pharmacy Practice, 2023 - archivepp.com
Data security is a primary concern in cloud computing as data is traveling over the internet
and is originated from various sources. Encryption techniques are used to protect sensitive …