scispace - formally typeset
Journal ArticleDOI

A decentralized framework for device authentication and data security in the next generation internet of medical things

Reads0
Chats0
TLDR
In this paper, a decentralized and scalable framework for device authentication and data security is proposed based on blockchain platform and Physical Unclonable Functions (PUFs). An authentication protocol is developed using PUF-based cryptographic primitives.
About
This article is published in Computer Communications.The article was published on 2021-12-01. It has received 7 citations till now. The article focuses on the topics: Authentication protocol & Data security.

read more

Citations
More filters
Journal ArticleDOI

Blockchain-Based Identity Management Systems in Health IoT: A Systematic Review

- 01 Jan 2022 - 
TL;DR: In this article , a systematic literature review was conducted on Blockchain-based IAM systems in health IoT applications to investigate the security aspect, and the security threats and requirements were summarized.
Journal ArticleDOI

A Review of Blockchain Technology Applications in Ambient Assisted Living

TL;DR: Data sharing and integration of care paths with blockchain, storage, and transactional costs, personalization of data disclosure paths, interoperability with legacy care systems, legal issues, and digital rights management are identified.
Journal ArticleDOI

A Secured Healthcare Model for Sensor Data Sharing With Integrated Emotional Intelligence

TL;DR: This paper presents a human-centered approach in healthcare domain by the integration of emotional intelligence (EI) and sensor network built around IoT devices that provides role-based access control and helps in building scalable and harmonious digital healthcare platforms.
Proceedings ArticleDOI

A systematic review of the use of blockchain in Internet of Medical Things

TL;DR: In this article , a systematic review was carried out to identify the research topics of blockchain application in IoMT, how blockchain helps to overcome them, and the maturity stage of those works, which allowed us to identify five research topics in which the main ones are authentication and intrusion detection.
Journal ArticleDOI

Blockchain-assisted authenticated key agreement scheme for IoT-based healthcare system

TL;DR: In this article , the authors proposed a new protocol called Blockchain-based IoMT Authenticated Key Exchange (BIoMTAKE) that establishes a private/consortium blockchain-based distributed environment using Hyperledger Fabric.
References
More filters
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.

That ‘Internet of Things’ Thing

Kevin Ashton
TL;DR: The phrase "Internet of Things" started life as the title of a presentation I made at Procter & Gamble (P&G) in 1999 as mentioned in this paper, which was more than just a good way to get executive attention.
Book ChapterDOI

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Journal ArticleDOI

Physical one-way functions

TL;DR: The concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states as primitives for physical analogs of cryptosystems.
Book ChapterDOI

Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions

TL;DR: The practical relevance of PUFs for security applications was recognized from the start, with a special focus on the promising properties of physical unclonability and tamper evidence.
Related Papers (5)