A secure real-time internet of medical smart things (IOMST)

Computers & Electrical Engineering - Tập 72 - Trang 455-467 - 2018
I.S. Farahat1, A.S. Tolba2, Mohamed Elhoseny3, Waleed Eladrosy2
1Department of Computer Science, Faculty of Computers and Information, South Valley University, Luxor, Egypt
2Department of Computer Science, Faculty of Computers and Information, Mansoura University, Egypt
3Department of Information Systems, Faculty of Computers and Information, Mansoura University, Egypt

Tài liệu tham khảo

Osseiran, 2017, Internet of things, IEEE Commun Stand Mag, 1, 84, 10.1109/MCOMSTD.2017.7992936 Zanella, 2014, Internet of things for smart cities, IEEE Int Things J, 1, 22, 10.1109/JIOT.2014.2306328 Bardram, 2011, Phase recognition during surgical procedures using embedded and body-worn sensors, 45 http://cloudtweaks.com/2013/05/top-5-hipaa-security-risks-asproviders-migrate-to-tthe-cloud/, may 2013 (Accessed: 5 july 2017). https://www.forbes.com/sites/gilpress/2017/03/20/6-hot-internet-of-things-iot-security-technologies, Mar 2017(last access October 2017). http://www.hhnmag.com/articles/3438-how-the-internet-of-things-will-affect-health-care, June 2015 (Accessed: 10 June 2017). Maksimović, 2015, A custom internet of things healthcare system, 1 G. Zhou, P. Zeng, X. Yuan, S. Chen, and K-K.R. Choo, An efficient code-based threshold ring signature scheme with a leader-participate model, Secur Commun Netw, 2017 (Article ID 1915239), 1-7, Aug. 2017. Lake, 2014, Internet of things: architectural framework for ehealth security, J ICT Stand, 1, 301, 10.13052/jicts2245-800X.133 https://www.owasp.org/index.php/Main_Page, 2017 (last access 2 November 2015). Stergiou, 2018, Secure integration of IoT and cloud computing, Future Gener Comput Syst, 78, 964, 10.1016/j.future.2016.11.031 Feldhofer, 2004, Strong authentication for RFID systems using the AES algorithm, 357 M. Usman, I. Ahmed, M.I. Aslam, S. Khan, and U.A. Shah, “SIT: a lightweight encryption algorithm for secure internet of things,” arXivPrepr. arXiv1704.08688, 2017. Elhoseny, 2016, An energy efficient encryption method for secure dynamic WSN, Secur Commun Netw, 9, 2024, 10.1002/sec.1459 Li, 2018, Differentially private Naive Bayes learning over multiple data sources, Inf Sci (Ny)., 444, 89, 10.1016/j.ins.2018.02.056 Gao, 2018, Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack, Inf Sci (Ny)., 444, 72, 10.1016/j.ins.2018.02.058 Gupta, 2016, Handbook of research on modern cryptographic solutions for computer and cyber security, IGI Global Cui, 2017, Algebraic cryptanalysis scheme of AES-256 using Gröbner basis, Downloads.Hindawi.Com, 2017, 9 AlaaTharwat, Hani Mahdi, Mohamed Elhoseny, Aboul Ella hassanien, Recognizing human activity in mobile crowdsensing environment using optimized k-NN algorithm, Expert Syst Appl, Available online 12 April 2018 (https://doi.org/10.1016/j.eswa.2018.04.017). Abdelaziza, 2018, A machine learning model for improving healthcare services on cloud computing environment”, Measurement, 119, 117, 10.1016/j.measurement.2018.01.022 Mohamed Elhoseny, Ahmed Abdelaziz, Ahmed Salama, AM Riad, Arun Kumar Sangaiah, Khan Muhammad, A hybrid model of internet of things and cloud computing to manage big data in health services applications, Future generation computer systems, Elsevier, Accepted March 2018, In Press. Elhoseny, 2018, A framework for big data analysis in smart cities, 723