{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T10:50:27Z","timestamp":1745491827748,"version":"3.37.3"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T00:00:00Z","timestamp":1533772800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T00:00:00Z","timestamp":1533772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11036-018-1098-8","type":"journal-article","created":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T18:58:37Z","timestamp":1533841117000},"page":"2525-2544","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["New Engineering Method for the Risk Assessment: Case Study Signal Jamming of the M-Health Networks"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2507-9571","authenticated-orcid":false,"given":"Kamel","family":"Karoui","sequence":"first","affiliation":[]},{"given":"Fakher Ben","family":"Ftima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,9]]},"reference":[{"unstructured":"Pang Z (2013) Technologies architectures of the Internet-of-Things (IoT) for health well-being, M.S. thesis, Dept. Electron. Comput. Syst., KTH-Roy. Inst. Technol., Stockholm","key":"1098_CR1"},{"issue":"4","key":"1098_CR2","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1016\/j.aei.2016.09.006","volume":"30","author":"M Wang","year":"2016","unstructured":"Wang M, Zhong RY, Dai Q et al (2016) A MPN-based scheduling model for IoT-enabled hybrid flow shop manufacturing. Adv Eng Inform 30(4):728\u2013736","journal-title":"Adv Eng Inform"},{"issue":"2","key":"1098_CR3","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.aei.2012.12.003","volume":"27","author":"C-Y Chang","year":"2013","unstructured":"Chang C-Y, Tsai M-D (2013) Knowledge-based navigation system for building health diagnosis. Adv Eng Inform 27(2):246\u2013260","journal-title":"Adv Eng Inform"},{"issue":"4","key":"1098_CR4","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/TITB.2004.840019","volume":"8","author":"RSH Istepanian","year":"2004","unstructured":"Istepanian RSH, Jovanov E, Zhang YT (2004) Guest editorial introduction to the special section on m-health: Beyond seamless mobility for global wireless healthcare connectivity. IEEE Trans Inf Technol Biomed 8(4):405\u2013412","journal-title":"IEEE Trans Inf Technol Biomed"},{"unstructured":"Moneo Gregorio D (2013) Mobile devices in applications for healthcare: systemstechnology Senior Design Research Project, Warsaw University of Technology, Faculty of Electronics Information Technology, Institute of Electronic Systems","key":"1098_CR5"},{"unstructured":"ISO (2014) Available: http:\/\/www.iso.org\/iso\/catalogue_detail?csnumber=43170, accessed 9 December 2014","key":"1098_CR6"},{"unstructured":"OWASP (2014) The OWASP Risk Rating Methodology, Available: https:\/\/www.owasp.org\/index.php\/OWASP_Risk_Rating_Methodology, accessed 9 December 2014","key":"1098_CR7"},{"unstructured":"ISO (2014) Available: http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=50341, accessed 9 December 2014.","key":"1098_CR8"},{"unstructured":"European Network Information Security Agency (ENISA) (2013) ENISA Threat Landscape- Midyear 2013. Available: http:\/\/www.enisa.europa.eu\/activities\/Risk-management\/evolving-threat-environment\/enisa-threat-landscape-mid-year-2013\/at_download\/fullReport, accessed 9 December 2014","key":"1098_CR9"},{"unstructured":"Chen Xin Wang Xiao-Han Huang He, Research on multi-attribute information security Risk assessment method based on threat analysis, Computer Engineering Design journal, vol. 1, p. 012,2009","key":"1098_CR10"},{"issue":"1","key":"1098_CR11","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0925-5273(01)00098-6","volume":"78","author":"J Hallikas","year":"2002","unstructured":"Hallikas J, Veli-Matti V, Tuominen M (2002) Risk analysis assessment in network environments: a dyadic case study. Int J Prod Econ 78(1):45\u201355","journal-title":"Int J Prod Econ"},{"issue":"4","key":"1098_CR12","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1016\/j.neubiorev.2010.10.016","volume":"35","author":"DC Blanchard","year":"2011","unstructured":"Blanchard DC, Griebel G, Pobbe R, Blanchard RJ (2011) Risk assessment as an evolved threat detection analysis process. Neuroscience & Bio Behavioral Reviews Journal 35(4):991\u2013998","journal-title":"Neuroscience & Bio Behavioral Reviews Journal"},{"unstructured":"Nist KD (2014) Risk Management Framework Overview: NIST, FISMARMF Overview, Available: http:\/\/csrc.nist.gov\/groups\/SMA\/fisma\/documents\/rmf_overview_6-9-14.pdf, Accessed 9 Dec 2014","key":"1098_CR13"},{"issue":"6","key":"1098_CR14","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.ress.2007.03.025","volume":"93","author":"A Terje","year":"2008","unstructured":"Terje A (2008) A semi-quantitative approach to Risk analysis, as an alternative to QRAs. Journal Reliability Engineering & System Safety 93(6):790\u2013797","journal-title":"Journal Reliability Engineering & System Safety"},{"doi-asserted-by":"crossref","unstructured":"Kr\u00e4mer M, Aspinall D, Wolters M (2016) POSTER: Weighing in eHealth Security. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 1832\u20131834","key":"1098_CR15","DOI":"10.1145\/2976749.2989044"},{"issue":"2","key":"1098_CR16","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2006.315852","volume":"8","author":"Y Wang","year":"2006","unstructured":"Wang Y, Attebury G, Ramamurthy B (2006) A survey of security issues in wireless sensor networks. IEEE Commun Surveys Tuts 8(2):2\u201323","journal-title":"IEEE Commun Surveys Tuts"},{"doi-asserted-by":"crossref","unstructured":"Wood D, Stankovic JA, Zhou G (2007) DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks in The 4th Annual IEEE Communications Society Conference on Sensor, Mesh Ad Hoc Communications Networks (SECON), San Diego, CA, pp. 60\u201369","key":"1098_CR17","DOI":"10.1109\/SAHCN.2007.4292818"},{"doi-asserted-by":"crossref","unstructured":"Xu W, Trappe W, Zhang Y (2007) Channel surfing: defending wireless sensor networks from interference. In: Proc. 6th international conference on Information processing in sensor networks, New York, pp. 499\u2013508","key":"1098_CR18","DOI":"10.1109\/IPSN.2007.4379710"},{"doi-asserted-by":"crossref","unstructured":"Cagalj M, Capkun S, Hubaux J-P (2006) Wormhole-Based Anti-Jamming Techniques in Sensor Networks, IEEE Trans. Mobile Computing","key":"1098_CR19","DOI":"10.1109\/TMC.2007.250674"},{"issue":"4","key":"1098_CR20","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TDSC.2015.2469655","volume":"14","author":"MZA Bhuiyan","year":"2017","unstructured":"Bhuiyan MZA, Wang G, Wu J et al (2017) Dependable structural health monitoring using wireless sensor networks. IEEE Transactions on Dependable and Secure Computing 14(4):363\u2013376","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"1098_CR21","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MWC.2004.1368895","volume":"11","author":"E Shi","year":"2004","unstructured":"Shi E, Perrig A (December 2004) Designing secure sensor networks. Wireless Communication Magazine 11(6):38\u201343","journal-title":"Wireless Communication Magazine"},{"issue":"3","key":"1098_CR22","doi-asserted-by":"publisher","first-page":"2415","DOI":"10.1007\/s10586-017-0796-5","volume":"20","author":"Z Cai","year":"2017","unstructured":"Cai Z, Yan H, Li P et al (2017) Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Clust Comput 20(3):2415\u20132422","journal-title":"Clust Comput"},{"issue":"6","key":"1098_CR23","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1109\/TBCAS.2013.2245664","volume":"7","author":"M Zhang","year":"2013","unstructured":"Zhang M, Raghunathan A, Jha NK (2013) MedMon: Securing medical devices through wireless monitoring anomaly detection. Biomedical CircuitsSystems, IEEE Transactions 7(6):871\u2013881","journal-title":"Biomedical CircuitsSystems, IEEE Transactions"},{"doi-asserted-by":"crossref","unstructured":"Hu C (2013) OPFKA: Secure efficient ordered physiological-feature-based key agreement for wireless body area networks. INFOCOM, 2013 Proceedings IEEE. IEEE","key":"1098_CR24","DOI":"10.1109\/INFCOM.2013.6567031"},{"doi-asserted-by":"crossref","unstructured":"Rostami M (2013) Balancing security utility in medical devices?. Proceedings of the 50th Annual Design Automation Conference. ACM","key":"1098_CR25","DOI":"10.1145\/2463209.2488750"},{"unstructured":"Harries P (2014) The Prognosis for Healthcare Payers Providers: Rising Cyber security Risks Costs, Pricewaterhouse Coopers, December 17, http:\/\/usblogs.pwc.com\/cybersecurity\/the-prognosis-for-healthcare-payers-andproviders-rising-cybersecurity-Risks-and-costs","key":"1098_CR26"},{"unstructured":"Sen J (2009) A survey on wireless sensor network security. arXiv preprint arXiv:1011.1529, 2010. International Journal of Communication Networks and Information Security (IJCNIS) 1(2):55\u201378","key":"1098_CR27"},{"issue":"10","key":"1098_CR28","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood AD, Stankovic JA (2002) Denial of service in sensor networks. IEEE Computer 35(10):54\u201362","journal-title":"IEEE Computer"},{"issue":"1","key":"1098_CR29","first-page":"143","volume":"36","author":"S Arora","year":"2014","unstructured":"Arora S, Yttri J, Nilsen W (2014) Privacy and security in mobile health (mHealth) research. Alcohol Research: Current Reviews 36(1):143","journal-title":"Alcohol Research: Current Reviews"},{"doi-asserted-by":"crossref","unstructured":"Xu W, Trappe W, Zhang Y, Wood T (2005) The Feasibility of Launching Detecting Jamming Attacks in Wireless Networks, Proceedings of Mobihoc","key":"1098_CR30","DOI":"10.1145\/1062689.1062697"},{"unstructured":"OAhmad Y, Elaiza AK, Saadiah YA (2012) Novel Framework for Jamming Detection Classification in Wireless Networks 2012 8th International Conference on Computing Networking Technology (ICCNT 2012), Gyeongju","key":"1098_CR31"},{"issue":"3","key":"1098_CR32","first-page":"34","volume":"2","author":"G Upma","year":"2013","unstructured":"Upma G, Gayatri B, Sandeep M (2013) A Dual Mechanism for defeating DDoS Attacks in Cloud Computing Model. International Journal of Application or Innovation in Engineering & Management (IJAIEM) 2(3):34\u201339","journal-title":"International Journal of Application or Innovation in Engineering & Management (IJAIEM)"},{"issue":"3","key":"1098_CR33","first-page":"1065","volume":"36","author":"S Ullah","year":"2012","unstructured":"Ullah S, Henry H, Bart B, Benoit L, Chris B, Ingrid M (2012) A Comprehensive Survey of Wireless Body Area Networks On PHY, MAC. Network Layers Solutions Journal of Medical Systems 36(3):1065\u20131094","journal-title":"Network Layers Solutions Journal of Medical Systems"},{"key":"1098_CR34","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.cose.2013.04.005","volume":"37","author":"N Van Deursen","year":"2013","unstructured":"Van Deursen N, Buchanan WJ, Duff A (2013) Monitoring information security risks within health care. Computers & Security 37:31\u201345","journal-title":"Computers & Security"},{"key":"1098_CR35","first-page":"383","volume":"2017","author":"DT Handler","year":"2017","unstructured":"Handler DT, Hauge L, Spognardi A et al (2017) Security and Privacy Issues in Healthcare Monitoring Systems: A Case Study. BIOSTEC 2017:383","journal-title":"BIOSTEC"},{"issue":"1","key":"1098_CR36","first-page":"1","volume":"1","author":"CMS","year":"2009","unstructured":"CMS (2009) CMS information security Risk assessment methodology. Cent Medimed Medicaid Serv 1(1):1\u201320","journal-title":"Cent Medimed Medicaid Serv"},{"unstructured":"Samy GN, Ahmad R, Ismail Z (2012) Adopting Adapting Medical Approach in Risk Management Process for Analysing Information Security Risk. INTECH Open Access Publisher","key":"1098_CR37"},{"unstructured":"Healey J, Pollard N, Woods B (2015) The Healthcare Internet of Things: Rewards Risks. Atlantic Council, March 18, 2015. http:\/\/www.mcafee.com\/kr\/resources\/reports\/rp-healthcare-iot-rewards-Risks.pdf. Accessed December 10, 2015","key":"1098_CR38"},{"doi-asserted-by":"crossref","unstructured":"Abie H, Balasingham I (2012). Risk-based adaptive security for smart IoT in eHealth. In Proceedings of the 7th International Conference on Body Area Networks (pp. 269\u2013275). ICST (Institute for Computer Sciences, Social-Informatics Telecommunications Engineering)","key":"1098_CR39","DOI":"10.4108\/icst.bodynets.2012.250235"},{"doi-asserted-by":"crossref","unstructured":"Savola RM, Abie H (2013) Metrics-driven security objective decomposition for an e-health application with adaptive security management. Proceedings of the International Workshop on Adaptive Security. ACM","key":"1098_CR40","DOI":"10.1145\/2523501.2523507"},{"unstructured":"Aman W, Snekkenes E (2013) An empirical research on infosec Risk management in iot based ehealth. Third International Conference on Mobile Services, Resources, Users. Mobility","key":"1098_CR41"},{"doi-asserted-by":"crossref","unstructured":"Savola RM (2015) Risk-driven security metrics development for an e-health IoT application. Information Security for South Africa (ISSA), IEEE","key":"1098_CR42","DOI":"10.1109\/ISSA.2015.7335061"},{"issue":"6","key":"1098_CR43","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1516046.1516055","volume":"52","author":"K Fu","year":"2009","unstructured":"Fu K (2009) Inside Risks: Reducing Risks of implantable medical devices. Commun ACM 52(6):25\u201327","journal-title":"Commun ACM"},{"issue":"1","key":"1098_CR44","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/356683.356686","volume":"9","author":"DJ Kuck","year":"1977","unstructured":"Kuck DJ (1977) A survey of parallel machine organization programming. ACM Computing Surveys (CSUR) Journal 9(1):29\u201359","journal-title":"ACM Computing Surveys (CSUR) Journal"},{"issue":"3","key":"1098_CR45","first-page":"94","volume":"45","author":"Y Yang","year":"2009","unstructured":"Yang Y, Yao SZ (2009) Risk assessment method of information security based on threat analysis. Computer Engineering Applications 45(3):94\u201396","journal-title":"Computer Engineering Applications"},{"issue":"3","key":"1098_CR46","doi-asserted-by":"publisher","first-page":"193","DOI":"10.14257\/ijsia.2014","volume":"8","author":"MP Suhartana","year":"2014","unstructured":"Suhartana MP, Bens Soewito B (2014) Modeling of Risk Factors in Determining Network Security Level. International Journal of Security Its Applications 8(3):193\u2013208. https:\/\/doi.org\/10.14257\/ijsia.2014","journal-title":"International Journal of Security Its Applications"},{"doi-asserted-by":"crossref","unstructured":"T. Zia A. Zomaya (2006) Security issues in wireless sensor networks. In: Proc. IEEE Int. Conf. Syst. Netw. Commun, p. 40","key":"1098_CR47","DOI":"10.1109\/ICSNC.2006.66"},{"issue":"8","key":"1098_CR48","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/JSTSP.2016.2607692","volume":"10","author":"L Fan","year":"2016","unstructured":"Fan L, Lei X, Yang N et al (2016) Secure multiple amplify-and-forward relaying with cochannel interference. IEEE Journal of Selected Topics in Signal Processing 10(8):1494\u20131505","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"issue":"6","key":"1098_CR49","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s12652-015-0305-8","volume":"6","author":"H Shen","year":"2015","unstructured":"Shen H, Gao C, He D et al (2015) New biometrics-based authentication scheme for multi-server environment in critical systems. J Ambient Intell Humaniz Comput 6(6):825\u2013834","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"8","key":"1098_CR50","doi-asserted-by":"publisher","first-page":"7599","DOI":"10.1109\/TVT.2017.2669240","volume":"66","author":"L Fan","year":"2017","unstructured":"Fan L, Lei X, Yang N et al (2017) Secrecy cooperative networks with outdated relay selection over correlated fading channels. IEEE Trans Veh Technol 66(8):7599\u20137603","journal-title":"IEEE Trans Veh Technol"},{"key":"1098_CR51","doi-asserted-by":"publisher","first-page":"18909","DOI":"10.1109\/ACCESS.2017.2751105","volume":"5","author":"X Lai","year":"2017","unstructured":"Lai X, Zou W, Xie D et al (2017) DF Relaying Networks With Randomly Distributed Interferers. IEEE Access 5:18909\u201318917","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Yang L, Han Z, Huang Z, et al (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90-99. https:\/\/doi.org\/10.1016\/j.jnca.2017.12.017","key":"1098_CR52","DOI":"10.1016\/j.jnca.2017.12.017"},{"issue":"4","key":"1098_CR53","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TIFS.2015.2512533","volume":"11","author":"A Castiglione","year":"2016","unstructured":"Castiglione A, De Santis A, Masucci B et al (2016) Hierarchical and shared access control. IEEE Transactions on Information Forensics and Security 11(4):850\u2013865","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1098_CR54","doi-asserted-by":"publisher","first-page":"10179","DOI":"10.1109\/ACCESS.2018.2799854","volume":"6","author":"W Meng","year":"2018","unstructured":"Meng W, Tischhauser EW, Wang Q et al (2018) When intrusion detection meets blockchain technology: a review. Ieee Access 6:10179\u201310188","journal-title":"Ieee Access"},{"key":"1098_CR55","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ins.2016.08.023","volume":"379","author":"S Peng","year":"2017","unstructured":"Peng S, Yang A, Cao L et al (2017) Social influence modeling using information theory in mobile social networks. Inf Sci 379:146\u2013159","journal-title":"Inf Sci"},{"issue":"6","key":"1098_CR56","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1002\/nem.1956","volume":"26","author":"K Karoui","year":"2016","unstructured":"Karoui K (2016) Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E-commerce web server. Int J Netw Manag 26(6):553\u2013578","journal-title":"Int J Netw Manag"},{"issue":"2","key":"1098_CR57","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BF01934177","volume":"27","author":"HA Burgdorff","year":"1987","unstructured":"Burgdorff HA, Jajodia S, Springsteel FN, Zalcstein Y (1987) Alternative methods for the reconstruction of trees from their traversals. BIT Numer Math 27(2):133\u2013140","journal-title":"BIT Numer Math"},{"issue":"4","key":"1098_CR58","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/40.7773","volume":"8","author":"TV Ramabadran","year":"1988","unstructured":"Ramabadran TV, Gaitonde SS (1988) A tutorial on CRC computations. IEEE Micro 8(4):62\u201375","journal-title":"IEEE Micro"},{"key":"1098_CR59","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.jnca.2018.01.011","volume":"107","author":"Y-a Tan","year":"2018","unstructured":"Tan Y-a, Xue Y, Liang C et al (2018) A root privilege management scheme with revocable authorization for Android devices. J Netw Comput Appl 107:69\u201382","journal-title":"J Netw Comput Appl"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1098-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-018-1098-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1098-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T07:52:48Z","timestamp":1693813968000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-018-1098-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,9]]},"references-count":59,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1098"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1098-8","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2018,8,9]]},"assertion":[{"value":"9 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}