An exhaustive survey on security and privacy issues in Healthcare 4.0

JJ Hathaliya, S Tanwar - Computer Communications, 2020 - Elsevier
The healthcare industry has revolutionized from 1.0 to 4.0 where Healthcare 1.0 was more
doctor centric and Healthcare 2.0 replaced manual records with electronic healthcare …

[HTML][HTML] Uniting cyber security and machine learning: Advantages, challenges and future research

M Wazid, AK Das, V Chamola, Y Park - ICT express, 2022 - Elsevier
Abstract Machine learning (ML) is a subset of Artificial Intelligence (AI), which focuses on the
implementation of some systems that can learn from the historical data, identify patterns and …

Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare

M Masud, GS Gaba, K Choudhary… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) produces massive heterogeneous data from various applications,
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …

A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …

Design of secure mutual authentication scheme for metaverse environments using blockchain

J Ryu, S Son, J Lee, Y Park, Y Park - Ieee Access, 2022 - ieeexplore.ieee.org
During the COVID-19 pandemic, engagement in various remote activities such as online
education and meetings has increased. However, since the conventional online …

Smart grid metering networks: A survey on security, privacy and open research issues

P Kumar, Y Lin, G Bai, A Paverd… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Smart grid (SG) networks are newly upgraded networks of connected objects that greatly
improve reliability, efficiency, and sustainability of the traditional energy infrastructure. In this …

An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT

A Shahidinejad, J Abawajy - ACM Computing Surveys, 2024 - dl.acm.org
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …

Secure remote user authenticated key establishment protocol for smart home environment

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Securing electronics healthcare records in healthcare 4.0: A biometric-based approach

JJ Hathaliya, S Tanwar, S Tyagi, N Kumar - Computers & Electrical …, 2019 - Elsevier
In recent years, there has been an exponential increase in the usage of Healthcare 4.0-
based diagnostics systems across the globe. In healthcare 4.0, the patient's records are …