[HTML][HTML] Data Provenance in Healthcare: Approaches, Challenges, and Future Directions

M Ahmed, AR Dar, M Helfert, A Khan, J Kim - Sensors, 2023 - mdpi.com
Data provenance means recording data origins and the history of data generation and
processing. In healthcare, data provenance is one of the essential processes that make it …

A new DNA based encryption algorithm for internet of things

B Al-Shargabi, MAF Al-Husainy - International Conference of Reliable …, 2020 - Springer
Nowadays, with the widespread of the Internet of Things (IoT) applications in every aspect of
our lives. It's urgent to protect the sensitive data such as images generated by IoT devices …

[HTML][HTML] The applicability of the Internet of Things (IoT) between fundamental rights to health and to privacy

MO Fornasier - Revista de Investigações Constitucionais, 2020 - SciELO Brasil
This work aims to study main insecurities and uncertainties regarding to IoT, verifying its
impact to the exercise of the fundamental rights to healthcare and to privacy. Its specific …

A survey: security issues in IoT environment and IoT architecture

KA Sattar, A Al-Omary - 2021 - IET
Internet of Things (IoT) broadens the future Internet, and has drawn much attention by
researchers. The exchange of data over things connected to the internet has been increased …

RRAC: Role based reputed access control method for mitigating malicious impact in intelligent IoT platforms

M Amoon, T Altameem, A Altameem - Computer Communications, 2020 - Elsevier
IoT Environment is a recent development in communication networks that supports a wide
range of individual and cooperative user applications. Due to the openness of the service …

Enhanced Elman spike neural network fostered blockchain framework espoused intrusion detection for securing Internet of Things network

VR Vadi, S Abidin, A Khan… - Transactions on Emerging …, 2022 - Wiley Online Library
In general, due to the complexity and limited computation capabilities, the security issues
occur in Internet of Things (IoT). Security protocols are required to increase the security of …

[PDF][PDF] Trusted Execution Environments for Cloud/Fog-based Internet of Things Applications.

DCG Valadares, NC Will, MA Spohn… - CLOSER, 2021 - scitepress.org
Cloud services and fog-based solutions can improve the communication and processing
efficiency of the Internet of Things (IoT). Cloud and fog servers offer more processing power …

An intrusion detection system for health-care system using machine and deep learning

S Pande, A Khamparia, D Gupta - World Journal of Engineering, 2022 - emerald.com
Purpose One of the important key components of health care–based system is a reliable
intrusion detection system. Traditional techniques are not adequate to handle complex data …

A comparative analysis of IoT protocols for resource constraint devices and networks

S Holm, M Hammoudeh - … of the 6th International Conference on Future …, 2022 - dl.acm.org
Communication standards and protocols are detrimental to the success of any Internet of
Things (IoT) system or application. Selecting a communication standard and a suitable …

Comparative link-level analysis and performance estimation of channel models for IIoT (industrial-IoT) wireless communications

M Mahbub - Internet of things, 2020 - Elsevier
In the industrial scenarios, modern gadgets should communicate independently and in a
robust and productive manner with one another, depending on an enormous degree on …