Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme

    Nisreen Innab*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2237-2258, 2024, DOI:10.32604/cmc.2024.049608 - 15 August 2024

    Abstract Internet of Health Things (IoHT) is a subset of Internet of Things (IoT) technology that includes interconnected medical devices and sensors used in medical and healthcare information systems. However, IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication. In this article, we intend to address this shortcoming, and as a result, we propose a new scheme called, the certificateless anonymous authentication (CAA) scheme. The proposed scheme is based on hyperelliptic curve cryptography (HECC), an enhanced variant of elliptic curve cryptography (ECC)… More >

  • Open Access

    ARTICLE

    Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT

    Muhammad Tahir1,2,*, Mingchu Li1,2, Irfan Khan1,2, Salman A. Al Qahtani3, Rubia Fatima4, Javed Ali Khan5, Muhammad Shahid Anwar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2529-2544, 2023, DOI:10.32604/cmc.2023.042403 - 29 November 2023

    Abstract Real-time health data monitoring is pivotal for bolstering road services’ safety, intelligence, and efficiency within the Internet of Health Things (IoHT) framework. Yet, delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems. We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this. This strategy is devised to streamline the data retrieval path, subsequently diminishing network strain. Crafting an adept cache processing scheme poses its own set of challenges, especially given the transient nature of monitoring data and the imperative for swift data transmission,… More >

  • Open Access

    ARTICLE

    Developed Fall Detection of Elderly Patients in Internet of Healthcare Things

    Omar Reyad1,2, Hazem Ibrahim Shehata1,3, Mohamed Esmail Karar1,4,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1689-1700, 2023, DOI:10.32604/cmc.2023.039084 - 30 August 2023

    Abstract Falling is among the most harmful events older adults may encounter. With the continuous growth of the aging population in many societies, developing effective fall detection mechanisms empowered by machine learning technologies and easily integrable with existing healthcare systems becomes essential. This paper presents a new healthcare Internet of Health Things (IoHT) architecture built around an ensemble machine learning-based fall detection system (FDS) for older people. Compared to deep neural networks, the ensemble multi-stage random forest model allows the extraction of an optimal subset of fall detection features with minimal hyperparameters. The number of cascaded… More >

  • Open Access

    ARTICLE

    Optimal Resource Allocation in Fog Computing for Healthcare Applications

    Salman Khan1,*, Ibrar Ali Shah1, Nasser Tairan2, Habib Shah2, Muhammad Faisal Nadeem3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6147-6163, 2022, DOI:10.32604/cmc.2022.023234 - 14 January 2022

    Abstract In recent years, the significant growth in the Internet of Things (IoT) technology has brought a lot of attention to information and communication industry. Various IoT paradigms like the Internet of Vehicle Things (IoVT) and the Internet of Health Things (IoHT) create massive volumes of data every day which consume a lot of bandwidth and storage. However, to process such large volumes of data, the existing cloud computing platforms offer limited resources due to their distance from IoT devices. Consequently, cloud-computing systems produce intolerable latency problems for latency-sensitive real-time applications. Therefore, a new paradigm called… More >

  • Open Access

    ARTICLE

    Cryptanalysis of an Online/Offline Certificateless Signature Scheme for Internet of Health Things

    Saddam Hussain1, Syed Sajid Ullah2,*, Mohammad Shorfuzzaman3, Mueen Uddin4, Mohammed Kaosar5

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 983-993, 2021, DOI:10.32604/iasc.2021.019486 - 20 August 2021

    Abstract Recently, Khan et al. [An online-offline certificateless signature scheme for internet of health things,” Journal of Healthcare Engineering, vol. 2020] presented a new certificateless offline/online signature scheme for Internet of Health Things (IoHT) to fulfill the authenticity requirements of the resource-constrained environment of (IoHT) devices. The authors claimed that the newly proposed scheme is formally secured against Type-I adversary under the Random Oracle Model (ROM). Unfortunately, their scheme is insecure against adaptive chosen message attacks. It is demonstrated that an adversary can forge a valid signature on a message by replacing the public key. Furthermore, More >

  • Open Access

    ARTICLE

    Intelligent Tunicate Swarm-Optimization-Algorithm-Based Lightweight Security Mechanism in Internet of Health Things

    Gia Nhu Nguyen1,2, Nin Ho Le Viet1,2, Gyanendra Prasad Joshi3, Bhanu Shrestha4,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 551-562, 2021, DOI:10.32604/cmc.2020.012441 - 30 October 2020

    Abstract Fog computing in the Internet of Health Things (IoHT) is promising owing to the increasing need for energy- and latency-optimized health sector provisioning. Additionally, clinical data (particularly, medical image data) are a delicate, highly protected resource that should be utilized in an effective and responsible manner to fulfil consumer needs. Herein, we propose an energy-effi- cient fog-based IoHT with a tunicate swarm-optimization-(TSO)-based lightweight Simon cipher to enhance the energy efficiency at the fog layer and the security of data stored at the cloud server. The proposed Simon cipher uses the TSO algorithm to select the More >

Displaying 1-10 on page 1 of 6. Per Page