Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT

J Ren, J Li, H Liu, T Qin - Tsinghua Science and Technology, 2021 - ieeexplore.ieee.org
With the rapid advancement of the Internet of Things (IoT), the typical application of wireless
body area networks (WBANs) based smart healthcare has drawn wide attention from all …

Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks

W Meng, KKR Choo, S Furnell… - … on Network and …, 2018 - ieeexplore.ieee.org
The medical industry is increasingly digitalized and Internet-connected (eg, Internet of
Medical Things), and when deployed in an Internet of Medical Things environment, software …

BYOD in hospitals-security issues and mitigation strategies

TA Wani, A Mendoza, K Gray - Proceedings of the Australasian …, 2019 - dl.acm.org
The demand for using personal devices in hospitals (BYOD) has increased rapidly over the
years. However, BYOD also means that healthcare organisations are at great risk of leaking …

Can I trust the data I see? A Physician's concern on medical data in IoT health architectures

FT Jaigirdar, C Rudolph, C Bain - Proceedings of the Australasian …, 2019 - dl.acm.org
With the increasing advancement of Internet of Things (IoT) enabled systems, smart medical
devices open numerous opportunities for the healthcare sector. The success of using such …

MCAD: a machine learning based cyberattacks detector in software-defined networking (SDN) for healthcare systems

LM Halman, MJF Alenazi - IEEE Access, 2023 - ieeexplore.ieee.org
The healthcare sector deals with sensitive and significant data that must be protected
against illegitimate users. Software-defined networks (SDNs) are widely used in healthcare …

Security vulnerabilities in healthcare: an analysis of medical devices and software

CM Mejía-Granda, JL Fernández-Alemán… - Medical & Biological …, 2024 - Springer
The integration of IoT in healthcare has introduced vulnerabilities in medical devices and
software, posing risks to patient safety and system integrity. This study aims to bridge the …

Low-complexity signature-based malware detection for IoT devices

MFB Abbas, T Srikanthan - … and Techniques in Information Security: 8th …, 2017 - Springer
The ominous threat from malware in critical systems has forced system designers to include
detection techniques in their systems to ensure a timely response. However, the widely used …

Comparison between CoAP and MQTT in smart healthcare and some threats

S Imane, M Tomader, H Nabil - 2018 International Symposium …, 2018 - ieeexplore.ieee.org
Smart healthcare present the most important loT applications. The Internet of Things will
revolutionize our life's mode including the healthcare system. This paper will show how …

To warn or not to warn: online signaling in audit games

C Yan, H Xu, Y Vorobeychik, B Li… - 2020 IEEE 36th …, 2020 - ieeexplore.ieee.org
Routine operational use of sensitive data is often governed by law and regulation. For
instance, in the medical domain, there are various statues at the state and federal level that …

[PDF][PDF] Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks.

LM Halman, MJF Alenazi - CMES-Computer Modeling in …, 2024 - cdn.techscience.cn
The healthcare sector holds valuable and sensitive data. The amount of this data and the
need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their …