Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain
Citations
122 citations
Cites methods from "Decentralized Authentication of Dis..."
...For using blockchain for authentication, we can mention [20], [22], and [24] where the authors offered a softwaredefined network solution for 5G networks as well as an...
[...]
113 citations
91 citations
87 citations
82 citations
References
2,642 citations
Additional excerpts
...Blockchain overview [17]....
[...]
1,928 citations
"Decentralized Authentication of Dis..." refers methods in this paper
...Blockchain uses an asymmetric cryptography mechanism to validate the authentication of transactions [18]–[20]....
[...]
1,310 citations
"Decentralized Authentication of Dis..." refers background in this paper
...by the increasing interest from the research community [6]– [8])....
[...]
1,183 citations
"Decentralized Authentication of Dis..." refers background in this paper
...It is one of the most powerful simulators for networks [25]....
[...]
1,153 citations
"Decentralized Authentication of Dis..." refers background in this paper
...Here, we are interested to understand how the proposed architecture will operate in case of some common attacks such as DOS/DDOS attacks (UDP Flood, SYN Flood, TCP Flood, authentication attack (AUTH), Link-ability attack (LB), ID spoofing (ID-s) and Numb attack (NA)) [28], [29] which can occur when a patient attempts to join a hospital...
[...]