Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    Augmenting Internet of Medical Things Security: Deep Ensemble Integration and Methodological Fusion

    Hamad Naeem1, Amjad Alsirhani2,*, Faeiz M. Alserhani3, Farhan Ullah4, Ondrej Krejcar1

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2185-2223, 2024, DOI:10.32604/cmes.2024.056308 - 31 October 2024

    Abstract When it comes to smart healthcare business systems, network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network assaults. To protect IoMT devices and networks in healthcare and medical settings, our proposed model serves as a powerful tool for monitoring IoMT networks. This study presents a robust methodology for intrusion detection in Internet of Medical Things (IoMT) environments, integrating data augmentation, feature selection, and ensemble learning to effectively handle IoMT data complexity. Following rigorous preprocessing, including feature extraction, correlation removal, and Recursive Feature Elimination (RFE), selected features are standardized… More >

  • Open Access

    REVIEW

    IoMT-Based Healthcare Systems: A Review

    Tahir Abbas1,*, Ali Haider Khan2, Khadija Kanwal3, Ali Daud4,*, Muhammad Irfan5, Amal Bukhari6, Riad Alharbey6

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 871-895, 2024, DOI:10.32604/csse.2024.049026 - 17 July 2024

    Abstract The integration of the Internet of Medical Things (IoMT) and the Internet of Things (IoT), which has revolutionized patient care through features like remote critical care and real-time therapy, is examined in this study in response to the changing healthcare landscape. Even with these improvements, security threats are associated with the increased connectivity of medical equipment, which calls for a thorough assessment. With a primary focus on addressing security and performance enhancement challenges, the research classifies current IoT communication devices, examines their applications in IoMT, and investigates important aspects of IoMT devices in healthcare. The More >

  • Open Access

    ARTICLE

    Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things

    Jingjing Nie1,*, Zhenhua Chen2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4763-4779, 2024, DOI:10.32604/cmc.2024.051181 - 20 June 2024

    Abstract The Internet of Medical Things (IoMT) is an application of the Internet of Things (IoT) in the medical field. It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems, which is essential in smart healthcare. However, Personal Health Records (PHRs) are normally kept in public cloud servers controlled by IoMT service providers, so privacy and security incidents may be frequent. Fortunately, Searchable Encryption (SE), which can be used to execute queries on encrypted data, can address the issue above. Nevertheless, most existing SE schemes cannot solve the vector dominance threshold… More >

  • Open Access

    ARTICLE

    DNBP-CCA: A Novel Approach to Enhancing Heterogeneous Data Traffic and Reliable Data Transmission for Body Area Network

    Abdulwadood Alawadhi1,*, Mohd. Hasbullah Omar1, Abdullah Almogahed2, Noradila Nordin3, Salman A. Alqahtani4, Atif M. Alamri5

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2851-2878, 2024, DOI:10.32604/cmc.2024.050154 - 15 May 2024

    Abstract The increased adoption of Internet of Medical Things (IoMT) technologies has resulted in the widespread use of Body Area Networks (BANs) in medical and non-medical domains. However, the performance of IEEE 802.15.4-based BANs is impacted by challenges related to heterogeneous data traffic requirements among nodes, including contention during finite backoff periods, association delays, and traffic channel access through clear channel assessment (CCA) algorithms. These challenges lead to increased packet collisions, queuing delays, retransmissions, and the neglect of critical traffic, thereby hindering performance indicators such as throughput, packet delivery ratio, packet drop rate, and packet delay.… More >

  • Open Access

    ARTICLE

    Machine Learning-Enabled Communication Approach for the Internet of Medical Things

    Rahim Khan1,3, Abdullah Ghani1, Samia Allaoua Chelloug2,*, Mohammed Amin4, Aamir Saeed5, Jason Teo1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1569-1584, 2023, DOI:10.32604/cmc.2023.039859 - 30 August 2023

    Abstract The Internet of Medical Things (IoMT) is mainly concerned with the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically, whereas machine learning approaches enable these smart systems to make informed decisions. Generally, broadcasting is used for the transmission of frames, whereas congestion, energy efficiency, and excessive load are among the common issues associated with existing approaches. In this paper, a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames, especially with the minimum possible communication overheads in the IoMT network. For this purpose, the… More >

  • Open Access

    ARTICLE

    Priority Detector and Classifier Techniques Based on ML for the IoMT

    Rayan A. Alsemmeari1,*, Mohamed Yehia Dahab2, Badraddin Alturki1, Abdulaziz A. Alsulami3

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1853-1870, 2023, DOI:10.32604/cmc.2023.038589 - 30 August 2023

    Abstract Emerging telemedicine trends, such as the Internet of Medical Things (IoMT), facilitate regular and efficient interactions between medical devices and computing devices. The importance of IoMT comes from the need to continuously monitor patients’ health conditions in real-time during normal daily activities, which is realized with the help of various wearable devices and sensors. One major health problem is workplace stress, which can lead to cardiovascular disease or psychiatric disorders. Therefore, real-time monitoring of employees’ stress in the workplace is essential. Stress levels and the source of stress could be detected early in the fog… More >

  • Open Access

    ARTICLE

    Intelligent Intrusion Detection System for the Internet of Medical Things Based on Data-Driven Techniques

    Okba Taouali1,*, Sawcen Bacha2, Khaoula Ben Abdellafou1, Ahamed Aljuhani1, Kamel Zidi3, Rehab Alanazi1, Mohamed Faouzi Harkat4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1593-1609, 2023, DOI:10.32604/csse.2023.039984 - 28 July 2023

    Abstract Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’ information and provide a proper diagnosis as needed, resulting in the Internet of Medical Things (IoMT). However, obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge. However, due to the computational resources being limited, an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms. Therefore, designing and developing a lightweight detection mechanism is crucial. To address the aforementioned challenges, a new lightweight IDS approach is developed to… More >

  • Open Access

    ARTICLE

    Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

    Musheer Ahmad1, Reem Ibrahim Alkanhel2,*, Naglaa F. Soliman2, Abeer D. Algarni2, Fathi E. Abd El-Samie3, Walid El-Shafai3,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2361-2380, 2023, DOI:10.32604/csse.2023.038439 - 28 July 2023

    Abstract Patient privacy and data protection have been crucial concerns in E-healthcare systems for many years. In modern-day applications, patient data usually holds clinical imagery, records, and other medical details. Lately, the Internet of Medical Things (IoMT), equipped with cloud computing, has come out to be a beneficial paradigm in the healthcare field. However, the openness of networks and systems leads to security threats and illegal access. Therefore, reliable, fast, and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in… More >

  • Open Access

    REVIEW

    A Systematic Review on the Internet of Medical Things: Techniques, Open Issues, and Future Directions

    Apurva Sonavane1, Aditya Khamparia2,*, Deepak Gupta3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1525-1550, 2023, DOI:10.32604/cmes.2023.028203 - 26 June 2023

    Abstract IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group. Internet of Medical Things (IoMT) bridges the gap between the medical and IoT field where medical devices communicate with each other through a wireless communication network. Advancement in IoMT makes human lives easy and better. This paper provides a comprehensive detailed literature survey to investigate different IoMT-driven applications, methodologies, and techniques to ensure the sustainability of IoMT-driven systems. The limitations of existing IoMT frameworks are also analyzed concerning their applicability in real-time driven systems More >

  • Open Access

    ARTICLE

    Efficient Group Blind Signature for Medical Data Anonymous Authentication in Blockchain-Enabled IoMT

    Chaoyang Li*, Bohao Jiang, Yanbu Guo, Xiangjun Xin

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 591-606, 2023, DOI:10.32604/cmc.2023.038129 - 08 June 2023

    Abstract Blockchain technology promotes the development of the Internet of medical things (IoMT) from the centralized form to distributed trust mode as blockchain-based Internet of medical things (BIoMT). Although blockchain improves the cross-institution data sharing ability, there still exist the problems of authentication difficulty and privacy leakage. This paper first describes the architecture of the BIoMT system and designs an anonymous authentication model for medical data sharing. This BIoMT system is divided into four layers: perceptual, network, platform, and application. The model integrates an anonymous authentication scheme to guarantee secure data sharing in the network ledger.… More >

Displaying 1-10 on page 1 of 28. Per Page