Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Chaos-Based Cryptographic Mechanism for Smart Healthcare IoT Systems

    Muhammad Samiullah1, Waqar Aslam1, Arif Mehmood1, Muhammad Saeed Ahmad2, Shafiq Ahmad3, Adel M. Al-Shayea3, Muhammad Shafiq4,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 753-769, 2022, DOI:10.32604/cmc.2022.020432

    Abstract Smart and interconnected devices can generate meaningful patient data and exchange it automatically without any human intervention in order to realize the Internet of Things (IoT) in healthcare (HIoT). Due to more and more online security and data hijacking attacks, the confidentiality, integrity and availability of data are considered serious issues in HIoT applications. In this regard, lightweight block ciphers (LBCs) are promising in resource-constrained environment where security is the primary consideration. The prevalent challenge while designing an LBC for the HIoT environment is how to ascertain platform performance, cost, and security. Most of the existing LBCs primarily focus on… More >

  • Open Access

    ARTICLE

    Analysis of the Desynchronization Attack Impact on the E2EA Scheme

    Shadi Nashwan*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 625-644, 2022, DOI:10.32604/csse.2022.020799

    Abstract The healthcare IoT system is considered to be a significant and modern medical system. There is broad consensus that these systems will play a vital role in the achievement of economic growth in numerous growth countries. Among the major challenges preventing the fast and widespread adoption of such systems is the failure to maintain the data privacy of patients and the integrity of remote clinical diagnostics. Recently, the author proposed an end-to-end authentication scheme for healthcare IoT systems (E2EA), to provide a mutual authentication with a high data rate between the communication nodes of the healthcare IoT systems. Although the… More >

  • Open Access

    ARTICLE

    An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN

    Shadi Nashwan*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 607-642, 2021, DOI:10.32604/cmc.2021.015597

    Abstract The healthcare internet of things (IoT) system has dramatically reshaped this important industry sector. This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers. The goal is the remote monitoring of a patient’s physiological data by physicians. Moreover, this system can reduce the number and expenses of healthcare centers, make up for the shortage of healthcare centers in remote areas, enable consultation with expert physicians around the world, and increase the health awareness of communities. The major challenges that affect the rapid deployment and widespread acceptance of… More >

  • Open Access

    ARTICLE

    Blockchain-as-a-Utility for Next-Generation Healthcare Internet of Things

    Alaa Omran Almagrabi1, Rashid Ali2, Daniyal Alghazzawi1, Abdullah AlBarakati1, Tahir Khurshaid3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 359-376, 2021, DOI:10.32604/cmc.2021.014753

    Abstract The scope of the Internet of Things (IoT) applications varies from strategic applications, such as smart grids, smart transportation, smart security, and smart healthcare, to industrial applications such as smart manufacturing, smart logistics, smart banking, and smart insurance. In the advancement of the IoT, connected devices become smart and intelligent with the help of sensors and actuators. However, issues and challenges need to be addressed regarding the data reliability and protection for significant next-generation IoT applications like smart healthcare. For these next-generation applications, there is a requirement for far-reaching privacy and security in the IoT. Recently, blockchain systems have emerged… More >

  • Open Access

    ARTICLE

    M-IDM: A Multi-Classification Based Intrusion Detection Model in Healthcare IoT

    Jae Dong Lee1,2, Hyo Soung Cha1, Shailendra Rathore2, Jong Hyuk Park2,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1537-1553, 2021, DOI:10.32604/cmc.2021.014774

    Abstract In recent years, the application of a smart city in the healthcare sector via loT systems has continued to grow exponentially and various advanced network intrusions have emerged since these loT devices are being connected. Previous studies focused on security threat detection and blocking technologies that rely on testbed data obtained from a single medical IoT device or simulation using a well-known dataset, such as the NSL-KDD dataset. However, such approaches do not reflect the features that exist in real medical scenarios, leading to failure in potential threat detection. To address this problem, we proposed a novel intrusion classification architecture… More >

Displaying 1-10 on page 1 of 5. Per Page