Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2350774PMC
http://dx.doi.org/10.1136/bmj.312.7036.977cDOI Listing

Publication Analysis

Top Keywords

internet encryption
4
encryption algorithims
4
algorithims effective
4
effective maintaining
4
maintaining security
4
internet
1
algorithims
1
effective
1
maintaining
1
security
1

Similar Publications

Intelligent two-phase dual authentication framework for Internet of Medical Things.

Sci Rep

January 2025

Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, 11543, Saudi Arabia.

The Internet of Medical Things (IoMT) has revolutionized healthcare by bringing real-time monitoring and data-driven treatments. Nevertheless, the security of communication between IoMT devices and servers remains a huge problem because of the inherent sensitivity of the health data and susceptibility to cyber threats. Current security solutions, including simple password-based authentication and standard Public Key Infrastructure (PKI) approaches, typically do not achieve an appropriate balance between security and low computational overhead, resulting in the possibility of performance bottlenecks and increased vulnerability to attacks.

View Article and Find Full Text PDF

Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions.

Sensors (Basel)

January 2025

Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.

This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.

View Article and Find Full Text PDF

With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.

View Article and Find Full Text PDF

AllianceBlockchain in the Governance Innovation of Internet Hospitals.

Sensors (Basel)

December 2024

Department of Artificial Intelligence and Data Science, National University of Computer and Emerging Sciences, Islamabad 44000, Pakistan.

The rise of Internet hospitals has significant issues associated with data security and governance in managing sensitive patient data. This paper discusses an alliance blockchain (i.e.

View Article and Find Full Text PDF

Security is one of the increasingly significant issues given advancements in technology that harness data from multiple devices such as the internet of medical devices. While protecting data from unauthorized user access, several techniques are used including fingerprints, passwords, and others. One of the techniques that has attracted much attention is the use of human features, which has proven to be most effective because of the difficulties in impersonating human-related features.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!