{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T17:18:34Z","timestamp":1772126314699,"version":"3.50.1"},"reference-count":160,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:00:00Z","timestamp":1769817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:00:00Z","timestamp":1772064000000},"content-version":"vor","delay-in-days":26,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-026-00290-1","type":"journal-article","created":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T10:05:01Z","timestamp":1769853901000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A systematic mapping review of privacy and security mechanisms in IoT enabled telehealth systems"],"prefix":"10.1007","volume":"6","author":[{"given":"Marzieh","family":"Nezamdoust","sequence":"first","affiliation":[]},{"given":"Mousa","family":"Alizadeh","sequence":"additional","affiliation":[]},{"given":"Azam","family":"Seilsepour","sequence":"additional","affiliation":[]},{"given":"Abbas","family":"Asosheh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,31]]},"reference":[{"key":"290_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2021.104399","volume":"148","author":"RW Ahmad","year":"2021","unstructured":"Ahmad RW, Salah K, Jayaraman R, Yaqoob I, Ellahham S, Omar M. The role of blockchain technology in telehealth and telemedicine. Int J Med Inform. 2021;148:104399. https:\/\/doi.org\/10.1016\/j.ijmedinf.2021.104399.","journal-title":"Int J Med Inform"},{"key":"290_CR2","doi-asserted-by":"publisher","first-page":"8486508","DOI":"10.1155\/2022\/8486508","volume":"2022","author":"R Poonsuph","year":"2022","unstructured":"Poonsuph R. The design blueprint for a large-scale telehealth platform. Int J Telemed Appl. 2022;2022:8486508. https:\/\/doi.org\/10.1155\/2022\/8486508.","journal-title":"Int J Telemed Appl"},{"key":"290_CR3","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7298r1","volume-title":"Glossary of key information security terms","author":"R Kissel","year":"2011","unstructured":"Kissel R. Glossary of key information security terms. Darby, PA: Diane Publishing; 2011."},{"issue":"7","key":"290_CR4","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.3390\/sym12071191","volume":"12","author":"C Butpheng","year":"2020","unstructured":"Butpheng C, Yeh K-H, Xiong H. Security and privacy in IoT-cloud-based e-health systems: a comprehensive review. Symmetry. 2020;12(7):1191. https:\/\/doi.org\/10.3390\/sym12071191.","journal-title":"Symmetry"},{"issue":"11","key":"290_CR5","doi-asserted-by":"publisher","first-page":"389","DOI":"10.3390\/fi16110389","volume":"16","author":"S Madanian","year":"2024","unstructured":"Madanian S, Chinbat T, Subasinghage M, Airehrour D, Hassandoust F, Yongchareon S. Health iot threats: survey of risks and vulnerabilities. Future Internet. 2024;16(11):389. https:\/\/doi.org\/10.3390\/fi16110389.","journal-title":"Future Internet"},{"issue":"20","key":"290_CR6","doi-asserted-by":"publisher","first-page":"5897","DOI":"10.3390\/s20205897","volume":"20","author":"S Pal","year":"2020","unstructured":"Pal S, Hitchens M, Rabehaja T, Mukhopadhyay S. Security requirements for the internet of things: a systematic approach. Sensors. 2020;20(20):5897. https:\/\/doi.org\/10.3390\/s20205897.","journal-title":"Sensors"},{"key":"290_CR7","doi-asserted-by":"publisher","unstructured":"Singh D, Wazid M, Singh DP, Das AK, Rodrigues JJPC. Embattle the security of e-health system through a secure authentication and key agreement protocol. In: 2023 International Wireless Communications and Mobile Computing (IWCMC). IEEE; 2023. p. 1130\u20131135. https:\/\/doi.org\/10.1109\/IWCMC58020.2023.10182468.","DOI":"10.1109\/IWCMC58020.2023.10182468"},{"issue":"3","key":"290_CR8","doi-asserted-by":"publisher","first-page":"87","DOI":"10.12700\/APH.18.3.2021.3.5","volume":"18","author":"V Rajasekar","year":"2021","unstructured":"Rajasekar V, Premalatha J, Sathya K, Saracevic M. Secure remote user authentication scheme on health care, iot and cloud applications: a multilayer systematic survey. Acta Polytechnica Hungarica. 2021;18(3):87\u2013106. https:\/\/doi.org\/10.12700\/APH.18.3.2021.3.5.","journal-title":"Acta Polytechnica Hungarica"},{"issue":"3","key":"290_CR9","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.3390\/s23031252","volume":"23","author":"E Rodr\u00edguez","year":"2023","unstructured":"Rodr\u00edguez E, Otero B, Canal R. A survey of machine and deep learning methods for privacy protection in the internet of things. Sensors. 2023;23(3):1252. https:\/\/doi.org\/10.3390\/s23031252.","journal-title":"Sensors"},{"issue":"3","key":"290_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/JDM.321545","volume":"34","author":"Y Liu","year":"2023","unstructured":"Liu Y, Ju F, Zhang Q, Zhang M, Ma Z, Li M, et al. Overview of internet of medical things security based on blockchain access control. J Database Manag. 2023;34(3):1\u201320. https:\/\/doi.org\/10.4018\/JDM.321545.","journal-title":"J Database Manag"},{"key":"290_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2024.105379","volume":"185","author":"MZ Nezhad","year":"2024","unstructured":"Nezhad MZ, Bojnordi AJJ, Mehraeen M, Bagheri R, Rezazadeh J. Securing the future of IoT-healthcare systems: a meta-synthesis of mandatory security requirements. Int J Med Inform. 2024;185:105379. https:\/\/doi.org\/10.1016\/j.ijmedinf.2024.105379.","journal-title":"Int J Med Inform"},{"issue":"7","key":"290_CR12","doi-asserted-by":"publisher","first-page":"3629","DOI":"10.3390\/app15073629","volume":"15","author":"R Nabha","year":"2025","unstructured":"Nabha R, Laouiti A, Samhat AE. Internet of things-based healthcare systems: an overview of privacy-preserving mechanisms. Appl Sci. 2025;15(7):3629. https:\/\/doi.org\/10.3390\/app15073629.","journal-title":"Appl Sci"},{"key":"290_CR13","doi-asserted-by":"publisher","first-page":"205520762311771","DOI":"10.1177\/20552076231177144","volume":"9","author":"T Suleski","year":"2023","unstructured":"Suleski T, Ahmed M, Yang W, Wang E. A review of multi-factor authentication in the internet of healthcare things. Digital Health. 2023;9:20552076231177144. https:\/\/doi.org\/10.1177\/20552076231177144.","journal-title":"Digital Health"},{"key":"290_CR14","doi-asserted-by":"publisher","DOI":"10.37256\/cnc.2120243852","author":"R Kaur","year":"2024","unstructured":"Kaur R, Shahrestani S, Ruan C. Security and privacy of wearable wireless sensors in healthcare: a systematic review. Comput Netw Commun. 2024. https:\/\/doi.org\/10.37256\/cnc.2120243852.","journal-title":"Comput Netw Commun"},{"key":"290_CR15","doi-asserted-by":"publisher","DOI":"10.17705\/3jmwa.000079","author":"T Taipalus","year":"2023","unstructured":"Taipalus T. Systematic mapping study in information systems research. J Midwest Assoc Inf Syst. 2023. https:\/\/doi.org\/10.17705\/3jmwa.000079.","journal-title":"J Midwest Assoc Inf Syst"},{"issue":"1","key":"290_CR16","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1186\/s13643-020-01542-z","volume":"10","author":"ML Rethlefsen","year":"2021","unstructured":"Rethlefsen ML, Kirtley S, Waffenschmidt S, Ayala AP, Moher D, Page MJ, et al. Prisma-s: an extension to the prisma statement for reporting literature searches in systematic reviews. Syst Rev. 2021;10(1):39. https:\/\/doi.org\/10.1186\/s13643-020-01542-z.","journal-title":"Syst Rev"},{"issue":"3","key":"290_CR17","doi-asserted-by":"publisher","first-page":"952","DOI":"10.3390\/s22030952","volume":"22","author":"A Shaikh","year":"2022","unstructured":"Shaikh A, Al Reshan MS, Sulaiman A, Alshahrani H, Asiri Y. Secure telemedicine system design for Covid-19 patients treatment using service oriented architecture. Sensors. 2022;22(3):952. https:\/\/doi.org\/10.3390\/s22030952.","journal-title":"Sensors"},{"key":"290_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100367","volume":"14","author":"N Paudel","year":"2021","unstructured":"Paudel N, Neupane RC. A general architecture for a real-time monitoring system based on the internet of things. Internet Things. 2021;14:100367. https:\/\/doi.org\/10.1016\/j.iot.2021.100367.","journal-title":"Internet Things"},{"key":"290_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/8486508","volume":"2022","author":"R Poonsuph","year":"2022","unstructured":"Poonsuph R. The design blueprint for a large-scale telehealth platform. Int J Telemed Appl. 2022;2022:1\u201315. https:\/\/doi.org\/10.1155\/2022\/8486508.","journal-title":"Int J Telemed Appl"},{"issue":"9","key":"290_CR20","doi-asserted-by":"publisher","first-page":"309","DOI":"10.3390\/a15090309","volume":"15","author":"AD Aguru","year":"2022","unstructured":"Aguru AD, Babu ES, Nayak SR, Sethy A, Verma A. Integrated industrial reference architecture for smart healthcare in internet of things: a systematic investigation. Algorithms. 2022;15(9):309. https:\/\/doi.org\/10.3390\/a15090309.","journal-title":"Algorithms"},{"key":"290_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120209","volume":"662","author":"A Aguru","year":"2024","unstructured":"Aguru A, Babu E. A lightweight multi-vector ddos detection framework for iot-enabled mobile health informatics systems using deep learning. Inf Sci. 2024;662:120209. https:\/\/doi.org\/10.1016\/j.ins.2024.120209.","journal-title":"Inf Sci"},{"issue":"11","key":"290_CR22","doi-asserted-by":"publisher","first-page":"8707","DOI":"10.1109\/JIOT.2020.3045653","volume":"8","author":"A Ghubaish","year":"2020","unstructured":"Ghubaish A, Salman T, Zolanvari M, Unal D, Al-Ali A, Jain R. Recent advances in the internet-of-medical-things (iomt) systems security. IEEE Internet Things J. 2020;8(11):8707\u201318. https:\/\/doi.org\/10.1109\/JIOT.2020.3045653.","journal-title":"IEEE Internet Things J"},{"key":"290_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103164","volume":"192","author":"MH Kashani","year":"2021","unstructured":"Kashani MH, Madanipour M, Nikravan M, Asghari P, Mahdipour E. A systematic review of iot in healthcare: applications, techniques, and trends. J Netw Comput Appl. 2021;192:103164. https:\/\/doi.org\/10.1016\/j.jnca.2021.103164.","journal-title":"J Netw Comput Appl"},{"issue":"20","key":"290_CR24","doi-asserted-by":"publisher","first-page":"13071","DOI":"10.3390\/ijerph192013071","volume":"19","author":"CO Alenoghena","year":"2022","unstructured":"Alenoghena CO, Onumanyi AJ, Ohize HO, Adejo AO, Oligbi M, Ali SI, et al. ehealth: a survey of architectures, developments in mhealth, security concerns and solutions. Int J Environ Res Public Health. 2022;19(20):13071. https:\/\/doi.org\/10.3390\/ijerph192013071.","journal-title":"Int J Environ Res Public Health"},{"key":"290_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100057","volume":"3","author":"M Kokila","year":"2025","unstructured":"Kokila M, Reddy S. Authentication, access control and scalability models in internet of things security: a review. Cyber Security Appl. 2025;3:100057. https:\/\/doi.org\/10.1016\/j.csa.2024.100057.","journal-title":"Cyber Security Appl"},{"key":"290_CR26","doi-asserted-by":"publisher","first-page":"205520762110093","DOI":"10.1177\/20552076211009396","volume":"7","author":"H Bitar","year":"2021","unstructured":"Bitar H, Alismail S. The role of ehealth, telehealth, and telemedicine for chronic disease patients during Covid-19 pandemic: a rapid systematic review. Digital Health. 2021;7:20552076211009396. https:\/\/doi.org\/10.1177\/20552076211009396.","journal-title":"Digital Health"},{"key":"290_CR27","doi-asserted-by":"publisher","DOI":"10.31478\/202311e","author":"D Mathews","year":"2023","unstructured":"Mathews D, et al. Telehealth and mobile health: case study for understanding and anticipating emerging science and technology. NAM Perspect. 2023. https:\/\/doi.org\/10.31478\/202311e.","journal-title":"NAM Perspect"},{"key":"290_CR28","first-page":"53","volume":"800","author":"JT Force","year":"2022","unstructured":"Force JT. Assessing security and privacy controls in information systems and organizations. NIST Spec Publ. 2022;800:53.","journal-title":"NIST Spec Publ"},{"key":"290_CR29","unstructured":"NIST: framework for improving critical infrastructure cybersecurity. 2018.https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP. NIST Cybersecurity Framework, version 1.1."},{"key":"290_CR30","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1016\/j.future.2024.07.048","volume":"161","author":"J Dutta","year":"2024","unstructured":"Dutta J, Puthal D. Poah 2.0: Ai-empowered dynamic authentication based adaptive blockchain consensus for iomt-edge workflow. Future Generation Comput Syst. 2024;161:655\u201372. https:\/\/doi.org\/10.1016\/j.future.2024.07.048.","journal-title":"Future Generation Comput Syst"},{"issue":"2","key":"290_CR31","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3390\/healthcare7020056","volume":"7","author":"CC Agbo","year":"2019","unstructured":"Agbo CC, Mahmoud QH, Eklund JM. Blockchain technology in healthcare: a systematic review. Healthcare. 2019;7(2):56. https:\/\/doi.org\/10.3390\/healthcare7020056.","journal-title":"Healthcare"},{"issue":"10","key":"290_CR32","doi-asserted-by":"publisher","first-page":"12915","DOI":"10.1111\/exsy.12915","volume":"39","author":"P Sharma","year":"2022","unstructured":"Sharma P, Moparthi NR, Namasudra S, Shanmuganathan V, Hsu C-H. Blockchain-based iot architecture to secure healthcare system using identity-based encryption. Expert Syst. 2022;39(10):12915. https:\/\/doi.org\/10.1111\/exsy.12915.","journal-title":"Expert Syst"},{"key":"290_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101220","volume":"26","author":"H Cheng","year":"2024","unstructured":"Cheng H, Lo S-L, Lu J. A blockchain-enabled decentralized access control scheme using multi-authority attribute-based encryption for edge-assisted internet of things. Internet Things. 2024;26:101220. https:\/\/doi.org\/10.1016\/j.iot.2024.101220.","journal-title":"Internet Things"},{"issue":"2","key":"290_CR34","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1002\/spy2.348","volume":"7","author":"D Rani","year":"2024","unstructured":"Rani D, Kumar R, Chauhan N. A secure framework for iot-based healthcare using blockchain and ipfs. Secur Privacy. 2024;7(2):348. https:\/\/doi.org\/10.1002\/spy2.348.","journal-title":"Secur Privacy"},{"key":"290_CR35","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.csbj.2023.11.038","volume":"23","author":"A Hennebelle","year":"2024","unstructured":"Hennebelle A, Ismail L, Materwala H, Al Kaabi J, Ranjan P, Janardhanan R. Secure and privacy-preserving automated machine learning operations into end-to-end integrated iot-edge-artificial intelligence-blockchain monitoring system for diabetes mellitus prediction. Comput Struct Biotechnol J. 2024;23:212\u201333. https:\/\/doi.org\/10.1016\/j.csbj.2023.11.038.","journal-title":"Comput Struct Biotechnol J"},{"key":"290_CR36","doi-asserted-by":"publisher","first-page":"181560","DOI":"10.1109\/ACCESS.2020.3026260","volume":"8","author":"G Thamilarasu","year":"2020","unstructured":"Thamilarasu G, Odesile A, Hoang A. An intrusion detection system for internet of medical things. IEEE Access. 2020;8:181560\u201376. https:\/\/doi.org\/10.1109\/ACCESS.2020.3026260.","journal-title":"IEEE Access"},{"key":"290_CR37","doi-asserted-by":"publisher","unstructured":"Shaji A, Nair NS. A novel trust based two-phase algorithm to detect sybil attack in iomt networks. In: 2023 9th International Conference on Smart Computing and Communications (ICSCC). IEEE; 2023. p. 309\u2013314. https:\/\/doi.org\/10.1109\/ICSCC59169.2023.10334946.","DOI":"10.1109\/ICSCC59169.2023.10334946"},{"issue":"12","key":"290_CR38","doi-asserted-by":"publisher","first-page":"4860","DOI":"10.1002\/ett.4860","volume":"34","author":"M Alizadeh","year":"2023","unstructured":"Alizadeh M, Beheshti MT, Ramezani A, Bolouki S. An optimized hybrid methodology for short-term traffic forecasting in telecommunication networks. Trans Emerg Telecommun Technol. 2023;34(12):4860.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"290_CR39","doi-asserted-by":"crossref","unstructured":"Alizadeh M, Beheshti MT, Ramezani A, Saadatinezhad H. Network traffic forecasting based on fixed telecommunication data using deep learning. In: 2020 6th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS). IEEE; 2020. p. 1\u20137.","DOI":"10.1109\/ICSPIS51611.2020.9349573"},{"issue":"2","key":"290_CR40","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/s11277-020-07250-0","volume":"113","author":"A Kore","year":"2020","unstructured":"Kore A, Patil S. Ic-mads: Iot-enabled cross layer man-in-middle attack detection system for smart healthcare application. Wireless Pers Commun. 2020;113(2):727\u201346. https:\/\/doi.org\/10.1007\/s11277-020-07250-0.","journal-title":"Wireless Pers Commun"},{"key":"290_CR41","doi-asserted-by":"publisher","unstructured":"He Z, Sayadi H. Image-based zero-day malware detection in iomt devices: a hybrid AI-enabled method. In: 2023 24th International Symposium on Quality Electronic Design (ISQED). IEEE; 2023. p. 1\u20138. https:\/\/doi.org\/10.1109\/ISQED57927.2023.10129348.","DOI":"10.1109\/ISQED57927.2023.10129348"},{"issue":"1","key":"290_CR42","doi-asserted-by":"publisher","first-page":"1760","DOI":"10.1038\/s41598-024-84713-5","volume":"15","author":"M Asif","year":"2025","unstructured":"Asif M, Abrar M, Salam A, Amin F, Ullah F, Shah S, et al. Intelligent two-phase dual authentication framework for internet of medical things. Sci Rep. 2025;15(1):1760. https:\/\/doi.org\/10.1038\/s41598-024-84713-5.","journal-title":"Sci Rep"},{"key":"290_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101314","volume":"27","author":"O Popoola","year":"2024","unstructured":"Popoola O, Rodrigues MA, Marchang J, Shenfield A, Ikpehai A, Popoola J. An optimized hybrid encryption framework for smart home healthcare: ensuring data confidentiality and security. Internet Things. 2024;27:101314. https:\/\/doi.org\/10.1016\/j.iot.2024.101314.","journal-title":"Internet Things"},{"key":"290_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121329","volume":"237","author":"J Miao","year":"2024","unstructured":"Miao J, Wang Z, Wu Z, Ning X, Tiwari P. A blockchain-enabled privacy-preserving authentication management protocol for internet of medical things. Expert Syst Appl. 2024;237:121329. https:\/\/doi.org\/10.1016\/j.eswa.2023.121329.","journal-title":"Expert Syst Appl"},{"key":"290_CR45","doi-asserted-by":"publisher","first-page":"3532","DOI":"10.1109\/ACCESS.2024.3523530","volume":"13","author":"A Ahmad","year":"2024","unstructured":"Ahmad A, Jagatheswari S. Quantum safe multi-factor user authentication protocol for cloud-assisted medical IoT. IEEE Access. 2024;13:3532\u201345. https:\/\/doi.org\/10.1109\/ACCESS.2024.3523530.","journal-title":"IEEE Access"},{"issue":"3","key":"290_CR46","doi-asserted-by":"publisher","first-page":"5500","DOI":"10.1109\/JIOT.2019.2903082","volume":"6","author":"S Ebrahimi","year":"2019","unstructured":"Ebrahimi S, Bayat-Sarmadi S, Mosanaei-Boorani H. Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in iot. IEEE Internet Things J. 2019;6(3):5500\u20137. https:\/\/doi.org\/10.1109\/JIOT.2019.2903082.","journal-title":"IEEE Internet Things J"},{"issue":"15","key":"290_CR47","doi-asserted-by":"publisher","first-page":"4899","DOI":"10.3390\/s24154899","volume":"24","author":"W Long","year":"2024","unstructured":"Long W, Deng L, Zeng J, Gao Y, Lu T. An efficient certificateless anonymous signcryption scheme for wban. Sensors. 2024;24(15):4899. https:\/\/doi.org\/10.3390\/s24154899.","journal-title":"Sensors"},{"key":"290_CR48","doi-asserted-by":"publisher","unstructured":"Yavuz AA, Darzi S, Nouma SE. Lightweight and scalable post-quantum authentication for medical internet of things. 2023. arXiv preprint arXiv:2311.18674. doi: https:\/\/doi.org\/10.48550\/arXiv.2311.18674","DOI":"10.48550\/arXiv.2311.18674"},{"issue":"1","key":"290_CR49","doi-asserted-by":"publisher","first-page":"3368819","DOI":"10.1155\/2022\/3368819","volume":"2022","author":"G Xu","year":"2022","unstructured":"Xu G, Xu S, Cao Y, Yun F, Cui Y, Yu Y, et al. Ppseb: a postquantum public-key searchable encryption scheme on blockchain for e-healthcare scenarios. Security Commun Netw. 2022;2022(1):3368819. https:\/\/doi.org\/10.1155\/2022\/3368819.","journal-title":"Security Commun Netw"},{"issue":"15","key":"290_CR50","doi-asserted-by":"publisher","first-page":"4221","DOI":"10.3390\/s20154221","volume":"20","author":"A Rauf","year":"2020","unstructured":"Rauf A, Wang Z, Sajid H, Ali Tahir M. Secure route-obfuscation mechanism with information-theoretic security for internet of things. Sensors. 2020;20(15):4221. https:\/\/doi.org\/10.3390\/s20154221.","journal-title":"Sensors"},{"issue":"1","key":"290_CR51","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1080\/19361610.2019.1545278","volume":"14","author":"A Omotosho","year":"2019","unstructured":"Omotosho A, Ayemlo Haruna B, Mikail Olaniyi O. Threat modeling of internet of things health devices. J Appl Security Res. 2019;14(1):106\u201321. https:\/\/doi.org\/10.1080\/19361610.2019.1545278.","journal-title":"J Appl Security Res"},{"issue":"2","key":"290_CR52","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3390\/bios10020014","volume":"10","author":"M Ibrahim","year":"2020","unstructured":"Ibrahim M, Alsheikh A, Matar A. Attack graph modeling for implantable pacemaker. Biosensors. 2020;10(2):14. https:\/\/doi.org\/10.3390\/bios10020014.","journal-title":"Biosensors"},{"key":"290_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107567","volume":"183","author":"R Hajian","year":"2020","unstructured":"Hajian R, ZakeriKia S, Erfani SH, Mirabi M. Shaparak: scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement. Comput Netw. 2020;183:107567. https:\/\/doi.org\/10.1016\/j.comnet.2020.107567.","journal-title":"Comput Netw"},{"issue":"6","key":"290_CR54","doi-asserted-by":"publisher","first-page":"5562","DOI":"10.1007\/s11227-020-03472-y","volume":"77","author":"A Braeken","year":"2021","unstructured":"Braeken A, Liyanage M. Highly efficient key agreement for remote patient monitoring in mec-enabled 5g networks. J Supercomput. 2021;77(6):5562\u201385. https:\/\/doi.org\/10.1007\/s11227-020-03472-y.","journal-title":"J Supercomput"},{"issue":"21","key":"290_CR55","doi-asserted-by":"publisher","first-page":"18486","DOI":"10.1109\/JIOT.2023.3283347","volume":"10","author":"S Das","year":"2023","unstructured":"Das S, Namasudra S, Deb S, Ger PM, Crespo RG. Securing iot-based smart healthcare systems by using advanced lightweight privacy-preserving authentication scheme. IEEE Internet Things J. 2023;10(21):18486\u201394. https:\/\/doi.org\/10.1109\/JIOT.2023.3283347.","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"290_CR56","doi-asserted-by":"publisher","first-page":"5025","DOI":"10.1109\/JBHI.2023.3338851","volume":"28","author":"MM Salim","year":"2023","unstructured":"Salim MM, Yang LT, Park JH. Lightweight authentication scheme for iot-based e-healthcare service communication. IEEE J Biomed Health Inform. 2023;28(9):5025\u201332. https:\/\/doi.org\/10.1109\/JBHI.2023.3338851.","journal-title":"IEEE J Biomed Health Inform"},{"issue":"1","key":"290_CR57","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00521-023-08270-0","volume":"36","author":"C Chakraborty","year":"2024","unstructured":"Chakraborty C, Othman SB, Almalki FA, Sakli H. Fc-seeda: Fog computing-based secure and energy efficient data aggregation scheme for internet of healthcare things. Neural Comput Appl. 2024;36(1):241\u201357. https:\/\/doi.org\/10.1007\/s00521-023-08270-0.","journal-title":"Neural Comput Appl"},{"issue":"1","key":"290_CR58","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10207-023-00748-1","volume":"23","author":"OBJ Rabie","year":"2024","unstructured":"Rabie OBJ, Selvarajan S, Hasanin T, Mohammed GB, Alshareef AM, Uddin M. A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (hwmsns). Int J Inf Secur. 2024;23(1):51\u201380. https:\/\/doi.org\/10.1007\/s10207-023-00748-1.","journal-title":"Int J Inf Secur"},{"key":"290_CR59","doi-asserted-by":"publisher","first-page":"156849","DOI":"10.1109\/ACCESS.2024.3477922","volume":"12","author":"A Delham Algarni","year":"2024","unstructured":"Delham Algarni A, Algarni F, Ullah Jan S, Innab N. Lsp-ehs: a lightweight and secure protocol for e-healthcare system. IEEE Access. 2024;12:156849\u201366. https:\/\/doi.org\/10.1109\/ACCESS.2024.3477922.","journal-title":"IEEE Access"},{"issue":"1","key":"290_CR60","first-page":"263","volume":"21","author":"J-W Lo","year":"2020","unstructured":"Lo J-W, Wu C-Y, Chiou S-F. A lightweight authentication and key agreement scheme for telecare medicine information system. J Internet Technol. 2020;21(1):263\u201372.","journal-title":"J Internet Technol"},{"issue":"8","key":"290_CR61","doi-asserted-by":"publisher","first-page":"2880","DOI":"10.3390\/s21082880","volume":"21","author":"T-W Lin","year":"2021","unstructured":"Lin T-W, Hsu C-L, Le T-V, Lu C-F, Huang B-Y. A smartcard-based user-controlled single sign-on for privacy preservation in 5g-iot telemedicine systems. Sensors. 2021;21(8):2880. https:\/\/doi.org\/10.3390\/s21082880.","journal-title":"Sensors"},{"key":"290_CR62","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2018.11.021","volume":"149","author":"A Gupta","year":"2019","unstructured":"Gupta A, Tripathi M, Shaikh TJ, Sharma A. A lightweight anonymous user authentication and key establishment scheme for wearable devices. Comput Netw. 2019;149:29\u201342. https:\/\/doi.org\/10.1016\/j.comnet.2018.11.021.","journal-title":"Comput Netw"},{"issue":"10","key":"290_CR63","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.3390\/app7101069","volume":"7","author":"Z Mahmood","year":"2017","unstructured":"Mahmood Z, Ning H, Ullah A, Yao X. Secure authentication and prescription safety protocol for telecare health services using ubiquitous iot. Appl Sci. 2017;7(10):1069. https:\/\/doi.org\/10.3390\/app7101069.","journal-title":"Appl Sci"},{"key":"290_CR64","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.future.2019.05.058","volume":"100","author":"V Sureshkumar","year":"2019","unstructured":"Sureshkumar V, Amin R, Vijaykumar VR, Sekar SR. Robust secure communication protocol for smart healthcare system with FPGA implementation. Future Gener Comput Syst. 2019;100:938\u201351. https:\/\/doi.org\/10.1016\/j.future.2019.05.058.","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"290_CR65","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1002\/int.22644","volume":"37","author":"Q Zhang","year":"2022","unstructured":"Zhang Q, Zhu L, Li Y, Ma Z, Yuan J, Zheng J, et al. A group key agreement protocol for intelligent internet of things system. Int J Intell Syst. 2022;37(1):699\u2013722. https:\/\/doi.org\/10.1002\/int.22644.","journal-title":"Int J Intell Syst"},{"issue":"9","key":"290_CR66","doi-asserted-by":"publisher","first-page":"6895","DOI":"10.1016\/j.jksuci.2021.07.016","volume":"34","author":"MI Ahmed","year":"2022","unstructured":"Ahmed MI, Kannan G. Secure and lightweight privacy preserving internet of things integration for remote patient monitoring. J King Saud Univ Comput Inf Sci. 2022;34(9):6895\u2013908. https:\/\/doi.org\/10.1016\/j.jksuci.2021.07.016.","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"2","key":"290_CR67","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.dcan.2020.06.003","volume":"7","author":"MF Ayub","year":"2021","unstructured":"Ayub MF, Mahmood K, Kumari S, Sangaiah AK, et al. Lightweight authentication protocol for e-health clouds in iot-based applications through 5g technology. Digital Commun Netw. 2021;7(2):235\u201344. https:\/\/doi.org\/10.1016\/j.dcan.2020.06.003.","journal-title":"Digital Commun Netw"},{"issue":"1","key":"290_CR68","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s12652-020-02213-6","volume":"12","author":"SS Sahoo","year":"2021","unstructured":"Sahoo SS, Mohanty S, Majhi B. A secure three-factor based authentication scheme for healthcare systems using iot-enabled devices. J Ambient Intell Humaniz Comput. 2021;12(1):1419\u201334. https:\/\/doi.org\/10.1007\/s12652-020-02213-6.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"290_CR69","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","volume":"96","author":"SF Aghili","year":"2019","unstructured":"Aghili SF, Mala H, Shojafar M, Peris-Lopez P. Laco: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in iot. Future Gener Comput Syst. 2019;96:410\u201324. https:\/\/doi.org\/10.1016\/j.future.2019.02.020.","journal-title":"Future Gener Comput Syst"},{"issue":"12","key":"290_CR70","doi-asserted-by":"publisher","first-page":"5419","DOI":"10.3390\/s23125419","volume":"23","author":"MA Khan","year":"2023","unstructured":"Khan MA, Alhakami H, Alhakami W, Shvetsov AV, Ullah I. A smart card-based two-factor mutual authentication scheme for efficient deployment of an iot-based telecare medical information system. Sensors. 2023;23(12):5419. https:\/\/doi.org\/10.3390\/s23125419.","journal-title":"Sensors"},{"key":"290_CR71","doi-asserted-by":"publisher","unstructured":"Anushaa S, Naundhini S, Chaudhary D. Secure protocol with mutual authentication for telecare medical information system using ecc for iot-enabled wban devices. In: 2024 International Conference on Intelligent Systems and Advanced Applications (ICISAA). IEEE; 2024. p. 1\u20137. https:\/\/doi.org\/10.1109\/ICISAA62385.2024.10829056.","DOI":"10.1109\/ICISAA62385.2024.10829056"},{"issue":"3","key":"290_CR72","doi-asserted-by":"publisher","first-page":"3620","DOI":"10.1109\/JSYST.2020.3016065","volume":"15","author":"DS Gupta","year":"2020","unstructured":"Gupta DS, Islam SKH, Obaidat MS, Karati A, Sadoun B. Laac: lightweight lattice-based authentication and access control protocol for e-health systems in iot environments. IEEE Syst J. 2020;15(3):3620\u20137. https:\/\/doi.org\/10.1109\/JSYST.2020.3016065.","journal-title":"IEEE Syst J"},{"issue":"4","key":"290_CR73","doi-asserted-by":"publisher","first-page":"6111","DOI":"10.1109\/JIOT.2023.3309931","volume":"11","author":"M Adeli","year":"2023","unstructured":"Adeli M, Bagheri N, Maimani HR, Kumari S, Rodrigues JJPC. A post-quantum compliant authentication scheme for iot healthcare systems. IEEE Internet Things J. 2023;11(4):6111\u20138. https:\/\/doi.org\/10.1109\/JIOT.2023.3309931.","journal-title":"IEEE Internet Things J"},{"key":"290_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100062","volume":"3","author":"M Manickam","year":"2025","unstructured":"Manickam M, Devarajan GG. An improved three-factor authentication protocol for wireless body area networks. Cyber Security Appl. 2025;3:100062. https:\/\/doi.org\/10.1016\/j.csa.2024.100062.","journal-title":"Cyber Security Appl"},{"key":"290_CR75","doi-asserted-by":"publisher","unstructured":"Manal R, Fatima R, Tomader M. Authentication for e-health applications in iot-enabled 5g and proposed solution. In: Proceedings of the 4th International Conference on Smart City Applications. ACM; 2019. p. 1\u20136. https:\/\/doi.org\/10.1145\/3368756.3369059.","DOI":"10.1145\/3368756.3369059"},{"key":"290_CR76","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2023.102087","volume":"59","author":"M Tanveer","year":"2023","unstructured":"Tanveer M, Bashir AK, Alzahrani BA, Albeshri A, Alsubhi K, Chaudhry SA. Cadf-cse: chaotic map-based authenticated data access\/sharing framework for iot-enabled cloud storage environment. Phys Commun. 2023;59:102087. https:\/\/doi.org\/10.1016\/j.phycom.2023.102087.","journal-title":"Phys Commun"},{"key":"290_CR77","doi-asserted-by":"publisher","first-page":"183665","DOI":"10.1109\/ACCESS.2024.3500216","volume":"12","author":"A Alzahrani","year":"2024","unstructured":"Alzahrani A. Developing a provable secure and cloud-centric authentication protocol for the e-healthcare system. IEEE Access. 2024;12:183665\u201387. https:\/\/doi.org\/10.1109\/ACCESS.2024.3500216.","journal-title":"IEEE Access"},{"issue":"14","key":"290_CR78","doi-asserted-by":"publisher","first-page":"5401","DOI":"10.3390\/s22145401","volume":"22","author":"C-M Chen","year":"2022","unstructured":"Chen C-M, Chen Z, Kumari S, Lin M-C. Lap-ioht: a lightweight authentication protocol for the internet of health things. Sensors. 2022;22(14):5401. https:\/\/doi.org\/10.3390\/s22145401.","journal-title":"Sensors"},{"issue":"1","key":"290_CR79","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0294429","volume":"19","author":"IA Abbasi","year":"2024","unstructured":"Abbasi IA, Jan SU, Alqahtani AS, Khan AS, Algarni F. A lightweight and robust authentication scheme for the healthcare system using public cloud server. PLoS ONE. 2024;19(1):1\u201327. https:\/\/doi.org\/10.1371\/journal.pone.0294429.","journal-title":"PLoS ONE"},{"key":"290_CR80","doi-asserted-by":"publisher","first-page":"193978","DOI":"10.1109\/ACCESS.2025.3630350","volume":"13","author":"M Nezamdoust","year":"2025","unstructured":"Nezamdoust M, Alizadeh M. Toward secure and anonymous patient monitoring: an authenticated key agreement protocol with secure de-anonymization. IEEE Access. 2025;13:193978\u201396.","journal-title":"IEEE Access"},{"key":"290_CR81","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107976","volume":"190","author":"R Attarian","year":"2021","unstructured":"Attarian R, Hashemi S. An anonymity communication protocol for security and privacy of clients in iot-based mobile health transactions. Comput Netw. 2021;190:107976. https:\/\/doi.org\/10.1016\/j.comnet.2021.107976.","journal-title":"Comput Netw"},{"issue":"16","key":"290_CR82","doi-asserted-by":"publisher","first-page":"5777","DOI":"10.1002\/cpe.5777","volume":"34","author":"Q Zhang","year":"2022","unstructured":"Zhang Q, Zhao K, Kuang X, Li Y, Zheng Y, Yuan J, et al. Multidomain security authentication for the internet of things. Concurr Comput Practice Experience. 2022;34(16):5777. https:\/\/doi.org\/10.1002\/cpe.5777.","journal-title":"Concurr Comput Practice Experience"},{"key":"290_CR83","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103632","volume":"137","author":"P Guo","year":"2024","unstructured":"Guo P, Liang W, Xu S. A privacy-preserving four-factor authentication protocol for internet of medical things. Comput Security. 2024;137:103632. https:\/\/doi.org\/10.1016\/j.cose.2023.103632.","journal-title":"Comput Security"},{"issue":"1","key":"290_CR84","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s44147-023-00342-1","volume":"71","author":"T Arpitha","year":"2024","unstructured":"Arpitha T, Chouhan D, Shreyas J. Anonymous and robust biometric authentication scheme for secure social iot healthcare applications. J Eng Appl Sci. 2024;71(1):8. https:\/\/doi.org\/10.1186\/s44147-023-00342-1.","journal-title":"J Eng Appl Sci"},{"issue":"7","key":"290_CR85","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/s12243-018-00702-6","volume":"74","author":"Q Li","year":"2019","unstructured":"Li Q, Zhu H, Xiong J, Mo R, Ying Z, Wang H. Fine-grained multi-authority access control in iot-enabled mhealth. Ann Telecommun. 2019;74(7):389\u2013400.","journal-title":"Ann Telecommun"},{"key":"290_CR86","doi-asserted-by":"publisher","first-page":"146350","DOI":"10.1109\/ACCESS.2021.3123456","volume":"9","author":"M Morales-Sandoval","year":"2021","unstructured":"Morales-Sandoval M, De-La-Parra-Aguirre R, Galeana-Zapi\u00e9n H, Galaviz-Mosqueda A. A three-tier approach for lightweight data security of body area networks in e-health applications. IEEE Access. 2021;9:146350\u201365. https:\/\/doi.org\/10.1109\/ACCESS.2021.3123456.","journal-title":"IEEE Access"},{"key":"290_CR87","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.future.2020.04.011","volume":"110","author":"H Nasiraee","year":"2020","unstructured":"Nasiraee H, Ashouri-Talouki M. Anonymous decentralized attribute-based access control for cloud-assisted iot. Future Gener Comput Syst. 2020;110:45\u201356. https:\/\/doi.org\/10.1016\/j.future.2020.04.011.","journal-title":"Future Gener Comput Syst"},{"issue":"3","key":"290_CR88","doi-asserted-by":"publisher","first-page":"260","DOI":"10.3390\/app7030260","volume":"7","author":"K Park","year":"2017","unstructured":"Park K, Park J, Lee J. An iot system for remote monitoring of patients at home. Appl Sci. 2017;7(3):260. https:\/\/doi.org\/10.3390\/app7030260.","journal-title":"Appl Sci"},{"issue":"5","key":"290_CR89","doi-asserted-by":"publisher","first-page":"8770","DOI":"10.1109\/JIOT.2019.2923525","volume":"6","author":"J Xu","year":"2019","unstructured":"Xu J, Xue K, Li S, Tian H, Hong J, Hong P, et al. Healthchain: a blockchain-based privacy preserving scheme for large-scale health data. IEEE Internet Things J. 2019;6(5):8770\u201381. https:\/\/doi.org\/10.1109\/JIOT.2019.2923525.","journal-title":"IEEE Internet Things J"},{"key":"290_CR90","doi-asserted-by":"publisher","unstructured":"Elemam E, Bahaa-Eldin AM, Shaker NH, Sobh MA. A secure mqtt protocol: Telemedicine iot case study. In: 2019 14th International Conference on Computer Engineering and Systems (ICCES). IEEE; 2019. p. 99\u2013105. https:\/\/doi.org\/10.1109\/ICCES48960.2019.9068129.","DOI":"10.1109\/ICCES48960.2019.9068129"},{"key":"290_CR91","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103859","volume":"85","author":"R Sarma","year":"2024","unstructured":"Sarma R, Moulik S. e-safe: A secure and efficient access control scheme with attribute convergence and user revocation in fog enhanced iot for e-health. J Inf Security Appl. 2024;85:103859. https:\/\/doi.org\/10.1016\/j.jisa.2024.103859.","journal-title":"J Inf Security Appl"},{"key":"290_CR92","doi-asserted-by":"publisher","unstructured":"Riad K, Hamza R, Yan H. Sensitive and energetic iot access control for managing cloud electronic health records. IEEE Access. 2019. https:\/\/doi.org\/10.1109\/ACCESS.2019.2926354","DOI":"10.1109\/ACCESS.2019.2926354"},{"key":"290_CR93","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/j.ins.2019.01.070","volume":"527","author":"R Hamza","year":"2020","unstructured":"Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F. A privacy-preserving cryptosystem for iot e-healthcare. Inf Sci. 2020;527:493\u2013510. https:\/\/doi.org\/10.1016\/j.ins.2019.01.070.","journal-title":"Inf Sci"},{"key":"290_CR94","doi-asserted-by":"publisher","unstructured":"Huang X, Kikuchi H, Fan CI. Privacy-preserved spectral analysis using iot mhealth biomedical data for stress estimation. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). IEEE; 2018. p. 793\u2013800. https:\/\/doi.org\/10.1109\/AINA.2018.00118.","DOI":"10.1109\/AINA.2018.00118"},{"key":"290_CR95","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106866","volume":"162","author":"R Boussada","year":"2019","unstructured":"Boussada R, Hamdane B, Elhdhili ME, Saidane LA. Privacy-preserving aware data transmission for iot-based e-health. Comput Netw. 2019;162:106866. https:\/\/doi.org\/10.1016\/j.comnet.2019.106866.","journal-title":"Comput Netw"},{"key":"290_CR96","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.iotcps.2022.02.001","volume":"2","author":"K Wang","year":"2022","unstructured":"Wang K, Xie S, Rodrigues J. Medical data security of wearable tele-rehabilitation under internet of things. Internet Things Cyber-Phys Syst. 2022;2:1\u201311. https:\/\/doi.org\/10.1016\/j.iotcps.2022.02.001.","journal-title":"Internet Things Cyber-Phys Syst"},{"key":"290_CR97","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102654","volume":"130","author":"L Zhang","year":"2022","unstructured":"Zhang L, Zhao C, Wu Q, Mu Y, Rezaeibagha F. A traceable and revocable multi-authority access control scheme with privacy preserving for mhealth. J Syst Arch. 2022;130:102654. https:\/\/doi.org\/10.1016\/j.sysarc.2022.102654.","journal-title":"J Syst Arch"},{"key":"290_CR98","doi-asserted-by":"publisher","unstructured":"Boussada R, Hamdane B, Elhdhili ME, Saidane LA. Pp-ndnot: On preserving privacy in iot-based e-health systems over ndn. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC). IEEE; 2019. p. 1\u20136. https:\/\/doi.org\/10.1109\/WCNC.2019.8886110.","DOI":"10.1109\/WCNC.2019.8886110"},{"key":"290_CR99","doi-asserted-by":"publisher","unstructured":"Boussada R, Hamdane B, Elhdhili ME, Argoubi S, Saidane LA. A secure and privacy-preserving solution for iot over ndn applied to e-health. In: 2018 14th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE; 2018. p. 817\u2013822. https:\/\/doi.org\/10.1109\/IWCMC.2018.8450374.","DOI":"10.1109\/IWCMC.2018.8450374"},{"issue":"22","key":"290_CR100","doi-asserted-by":"publisher","first-page":"22315","DOI":"10.1109\/JIOT.2021.3056116","volume":"9","author":"X Liu","year":"2021","unstructured":"Liu X, Yang X, Luo Y, Zhang Q. Verifiable multikeyword search encryption scheme with anonymous key generation for medical internet of things. IEEE Internet Things J. 2021;9(22):22315\u201326. https:\/\/doi.org\/10.1109\/JIOT.2021.3056116.","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"290_CR101","doi-asserted-by":"publisher","first-page":"32104","DOI":"10.2196\/32104","volume":"10","author":"A Sengupta","year":"2022","unstructured":"Sengupta A, Subramanian H, et al. User control of personal mhealth data using a mobile blockchain app: Design science perspective. JMIR Mhealth Uhealth. 2022;10(1):32104. https:\/\/doi.org\/10.2196\/32104.","journal-title":"JMIR Mhealth Uhealth"},{"key":"290_CR102","doi-asserted-by":"publisher","unstructured":"Yogeshwar A, Kamalakkannan S. Building dynamic permutation-based privacy preservation model with blockchain technology for iot healthcare sector. In: 2022 International Conference on Advanced Computing Technologies and Applications (ICACTA). IEEE; 2022. p. 1\u20138. https:\/\/doi.org\/10.1109\/ICACTA54488.2022.9753342.","DOI":"10.1109\/ICACTA54488.2022.9753342"},{"key":"290_CR103","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124689","volume":"255","author":"KP Revathi","year":"2024","unstructured":"Revathi KP, Manikandan T. A smart and secured blockchain for children\u2019s health monitoring using hybrid encryption and adaptive machine learning techniques. Expert Syst Appl. 2024;255:124689. https:\/\/doi.org\/10.1016\/j.eswa.2024.124689.","journal-title":"Expert Syst Appl"},{"key":"290_CR104","doi-asserted-by":"publisher","first-page":"23008","DOI":"10.1109\/ACCESS.2022.3153069","volume":"10","author":"M Tanveer","year":"2022","unstructured":"Tanveer M, Alkhayyat A, Chaudhry SA, Zikria YB, Kim SW, et al. Reas-tmis: resource-efficient authentication scheme for telecare medical information system. IEEE Access. 2022;10:23008\u201321. https:\/\/doi.org\/10.1109\/ACCESS.2022.3153069.","journal-title":"IEEE Access"},{"issue":"5","key":"290_CR105","doi-asserted-by":"publisher","first-page":"2525","DOI":"10.1109\/TNSE.2022.3203927","volume":"10","author":"M Tanveer","year":"2022","unstructured":"Tanveer M, Ahmad M, Nguyen TN, Abd El-Latif AA, et al. Resource-efficient authenticated data sharing mechanism for smart wearable systems. IEEE Trans Netw Sci Eng. 2022;10(5):2525\u201336. https:\/\/doi.org\/10.1109\/TNSE.2022.3203927.","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"290_CR106","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111588","volume":"158","author":"ZK Mohammed","year":"2024","unstructured":"Mohammed ZK, Mohammed MA, Abdulkareem KH, Zebari DA, Lakhan A, Marhoon HA, et al. A metaverse framework for iot-based remote patient monitoring and virtual consultations using aes-256 encryption. Appl Soft Comput. 2024;158:111588. https:\/\/doi.org\/10.1016\/j.asoc.2024.111588.","journal-title":"Appl Soft Comput"},{"key":"290_CR107","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100290","volume":"12","author":"M Beheshti-Atashgah","year":"2020","unstructured":"Beheshti-Atashgah M, Aref MR, Barari M, Bayat M. Security and privacy-preserving in e-health: a new framework for patient. Internet Things. 2020;12:100290. https:\/\/doi.org\/10.1016\/j.iot.2020.100290.","journal-title":"Internet Things"},{"issue":"9","key":"290_CR108","doi-asserted-by":"publisher","first-page":"6847","DOI":"10.1016\/j.jksuci.2022.06.009","volume":"34","author":"A Ibrahim","year":"2022","unstructured":"Ibrahim A, Gebali F. Compact modular multiplier design for strong security capabilities in resource-limited telehealth iot devices. J King Saud Univ Comput Inform Sci. 2022;34(9):6847\u201354. https:\/\/doi.org\/10.1016\/j.jksuci.2022.06.009.","journal-title":"J King Saud Univ Comput Inform Sci"},{"key":"290_CR109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101601","volume":"35","author":"SU Jan","year":"2023","unstructured":"Jan SU, Ghani A, Alzahrani A, Saqlain S, Yahya K, Sajjad S. Bandwidth and power efficient lightweight authentication scheme for healthcare system. J King Saud Univ Comput Inform Sci. 2023;35:101601. https:\/\/doi.org\/10.1016\/j.jksuci.2023.101601.","journal-title":"J King Saud Univ Comput Inform Sci"},{"key":"290_CR110","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100824","volume":"28","author":"A Subashini","year":"2023","unstructured":"Subashini A, Raju PK. Hybrid aes model with elliptic curve and id-based key generation for iot in telemedicine. Meas Sens. 2023;28:100824. https:\/\/doi.org\/10.1016\/j.measen.2023.100824.","journal-title":"Meas Sens"},{"key":"290_CR111","doi-asserted-by":"publisher","unstructured":"Arfaoui A, Kribeche A, Senouci SM. Cooperative mimo for adaptive physical layer security in wban. In: ICC 2020 - IEEE International Conference on Communications (ICC). IEEE; 2020. p. 1\u20137. https:\/\/doi.org\/10.1109\/ICC40277.2020.9148837.","DOI":"10.1109\/ICC40277.2020.9148837"},{"key":"290_CR112","doi-asserted-by":"publisher","first-page":"171771","DOI":"10.1109\/ACCESS.2020.3022429","volume":"8","author":"X Xiang","year":"2020","unstructured":"Xiang X, Wang M, Fan W. A permissioned blockchain-based identity management and user authentication scheme for e-health systems. IEEE Access. 2020;8:171771\u201383. https:\/\/doi.org\/10.1109\/ACCESS.2020.3022429.","journal-title":"IEEE Access"},{"issue":"16","key":"290_CR113","doi-asserted-by":"publisher","first-page":"9241","DOI":"10.3390\/su13169241","volume":"13","author":"S Son","year":"2021","unstructured":"Son S, Park Y, Park Y. A secure, lightweight, and anonymous user authentication protocol for iot environments. Sustainability. 2021;13(16):9241. https:\/\/doi.org\/10.3390\/su13169241.","journal-title":"Sustainability"},{"issue":"1","key":"290_CR114","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s10916-020-01658-8","volume":"45","author":"I Ullah","year":"2021","unstructured":"Ullah I, Amin N, Khan M, Khattak H, Kumari S. An efficient and provable secure certificate-based combined signature, encryption and signcryption scheme for the internet of things (iot) in mobile health (m-health) system. J Medical Syst. 2021;45(1):4. https:\/\/doi.org\/10.1007\/s10916-020-01658-8.","journal-title":"J Medical Syst"},{"issue":"2","key":"290_CR115","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JSAC.2020.3020658","volume":"39","author":"D Lu","year":"2020","unstructured":"Lu D, Han R, Shen Y, Dong X, Ma J, Du X, et al. xtseh: a trusted platform module sharing scheme towards smart iot-ehealth devices. IEEE J Sel Areas Commun. 2020;39(2):370\u201383. https:\/\/doi.org\/10.1109\/JSAC.2020.3020658.","journal-title":"IEEE J Sel Areas Commun"},{"key":"290_CR116","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113251","volume":"149","author":"J Rold\u00e1n","year":"2020","unstructured":"Rold\u00e1n J, Boubeta-Puig J, Mart\u00ednez JL, Ortiz G. Integrating complex event processing and machine learning: an intelligent architecture for detecting iot security attacks. Expert Syst Appl. 2020;149:113251. https:\/\/doi.org\/10.1016\/j.eswa.2020.113251.","journal-title":"Expert Syst Appl"},{"issue":"21","key":"290_CR117","doi-asserted-by":"publisher","first-page":"5997","DOI":"10.3390\/s20215997","volume":"20","author":"ZA Almusaylim","year":"2020","unstructured":"Almusaylim ZA, Jhanjhi NZ, Alhumam A. Detection and mitigation of rpl rank and version number attacks in the internet of things: Srpl-rp. Sensors. 2020;20(21):5997. https:\/\/doi.org\/10.3390\/s20215997.","journal-title":"Sensors"},{"key":"290_CR118","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2024.102659","volume":"23","author":"G Lazrek","year":"2024","unstructured":"Lazrek G, Chetioui K, Balboul Y, Mazer S, et al. An rfe\/ridge-ml\/dl based anomaly intrusion detection approach for securing iomt system. Results Eng. 2024;23:102659.","journal-title":"Results Eng"},{"key":"290_CR119","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100063","volume":"3","author":"M Tahir","year":"2025","unstructured":"Tahir M, Abdullah A, Udzir NI, Kasmiran KA. A novel approach for handling missing data to enhance network intrusion detection system. Cyber Security Appl. 2025;3:100063. https:\/\/doi.org\/10.1016\/j.csa.2024.100063.","journal-title":"Cyber Security Appl"},{"issue":"3","key":"290_CR120","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.icte.2024.04.012","volume":"10","author":"R Sahay","year":"2024","unstructured":"Sahay R, Nayyar A, Shrivastava RK, Bilal M, Singh SP, Pack S. Routing attack induced anomaly detection in iot network using rbm-lstm. ICT Express. 2024;10(3):459\u201364. https:\/\/doi.org\/10.1016\/j.icte.2024.04.012.","journal-title":"ICT Express"},{"key":"290_CR121","doi-asserted-by":"publisher","unstructured":"Tomashchuk O. Threat and risk management framework for ehealth iot applications. SPLC \u201920. p. 120\u2013126. New York, NY: Association for Computing Machinery; 2020. https:\/\/doi.org\/10.1145\/3382026.3431250.","DOI":"10.1145\/3382026.3431250"},{"issue":"9","key":"290_CR122","doi-asserted-by":"publisher","first-page":"5367","DOI":"10.3390\/ijerph19095367","volume":"19","author":"S Masengo Wa Umba","year":"2022","unstructured":"Masengo Wa Umba S, Abu-Mahfouz AM, Ramotsoela D. Artificial intelligence-driven intrusion detection in software-defined wireless sensor networks: towards secure iot-enabled healthcare systems. Int J Environ Res Public Health. 2022;19(9):5367. https:\/\/doi.org\/10.3390\/ijerph19095367.","journal-title":"Int J Environ Res Public Health"},{"key":"290_CR123","doi-asserted-by":"publisher","unstructured":"Gurbuz E, Turgut O, Kok I. Explainable ai-based malicious traffic detection and monitoring system in next-gen iot healthcare, 2023. p. 1\u20136. https:\/\/doi.org\/10.1109\/SmartNets58706.2023.10215896.","DOI":"10.1109\/SmartNets58706.2023.10215896"},{"key":"290_CR124","doi-asserted-by":"publisher","unstructured":"Neto E, Dadkhah S, Ghorbani A. Collaborative ddos detection in distributed multi-tenant iot using federated learning, 2022. p. 1\u201310. https:\/\/doi.org\/10.1109\/PST55820.2022.9851984.","DOI":"10.1109\/PST55820.2022.9851984"},{"key":"290_CR125","doi-asserted-by":"publisher","unstructured":"Alizadeh M, Mousavi SE, Beheshti MTH, Ostadi A. Combination of feature selection and hybrid classifier as to network intrusion detection system adopting fa, gwo, and bat optimizers. In: 2021 7th International Conference on Signal Processing and Intelligent Systems (ICSPIS), 2021. p. 1\u20137. https:\/\/doi.org\/10.1109\/ICSPIS54653.2021.9729365.","DOI":"10.1109\/ICSPIS54653.2021.9729365"},{"issue":"21","key":"290_CR126","doi-asserted-by":"publisher","first-page":"5997","DOI":"10.3390\/s20215997","volume":"20","author":"Z Almusaylim","year":"2020","unstructured":"Almusaylim Z, Jhanjhi N, Alhumam A. Detection and mitigation of rpl rank and version number attacks in the internet of things: Srpl-rp. Sensors. 2020;20(21):5997. https:\/\/doi.org\/10.3390\/s20215997.","journal-title":"Sensors"},{"key":"290_CR127","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.aej.2023.04.037","volume":"73","author":"H Naser Alsuqaih","year":"2023","unstructured":"Naser Alsuqaih H, Hamdan W, Elmessiry H, Abulkasim H. An efficient privacy-preserving control mechanism based on blockchain for e-health applications. Alexandria Eng J. 2023;73:159\u201372. https:\/\/doi.org\/10.1016\/j.aej.2023.04.037.","journal-title":"Alexandria Eng J"},{"key":"290_CR128","doi-asserted-by":"publisher","first-page":"159402","DOI":"10.1109\/ACCESS.2020.3020513","volume":"8","author":"L Garg","year":"2020","unstructured":"Garg L, Chukwu E, Nasser N, Chakraborty C, Garg G. Anonymity preserving iot-based covid-19 and other infectious disease contact tracing model. IEEE Access. 2020;8:159402\u201314. https:\/\/doi.org\/10.1109\/ACCESS.2020.3020513.","journal-title":"IEEE Access"},{"issue":"5","key":"290_CR129","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/TBDATA.2020.3037914","volume":"8","author":"S Biswas","year":"2022","unstructured":"Biswas S, Sharif K, Li F, Alam I, Mohanty SP. Daac: digital asset access control in a unified blockchain based e-health system. IEEE Trans Big Data. 2022;8(5):1273\u201387. https:\/\/doi.org\/10.1109\/TBDATA.2020.3037914.","journal-title":"IEEE Trans Big Data"},{"key":"290_CR130","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107833","volume":"187","author":"F Nikkhah","year":"2021","unstructured":"Nikkhah F, Safkhani M. Lapchs: a lightweight authentication protocol for cloud-based healthcare systems. Comput Netw. 2021;187:107833. https:\/\/doi.org\/10.1016\/j.comnet.2021.107833.","journal-title":"Comput Netw"},{"issue":"18","key":"290_CR131","doi-asserted-by":"publisher","first-page":"6838","DOI":"10.3390\/s22186838","volume":"22","author":"T-W Lin","year":"2022","unstructured":"Lin T-W. A privacy-preserved id-based secure communication scheme in 5g-iot telemedicine systems. Sensors. 2022;22(18):6838. https:\/\/doi.org\/10.3390\/s22186838.","journal-title":"Sensors"},{"key":"290_CR132","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.comnet.2019.04.031","volume":"159","author":"A Arfaoui","year":"2019","unstructured":"Arfaoui A, Kribeche A, Senouci S-M. Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications. Comput Netw. 2019;159:23\u201336. https:\/\/doi.org\/10.1016\/j.comnet.2019.04.031.","journal-title":"Comput Netw"},{"issue":"1","key":"290_CR133","doi-asserted-by":"publisher","first-page":"5300253","DOI":"10.1155\/2022\/5300253","volume":"2022","author":"C Butpheng","year":"2022","unstructured":"Butpheng C, Yeh K-H, Hou J-L. A secure iot and cloud computing-enabled e-health management system. Security Commun Netw. 2022;2022(1):5300253. https:\/\/doi.org\/10.1155\/2022\/5300253.","journal-title":"Security Commun Netw"},{"key":"290_CR134","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101399","volume":"74","author":"CDM Pham","year":"2021","unstructured":"Pham CDM, Dang TK. A lightweight authentication protocol for d2d-enabled iot systems with privacy. Pervasive Mobile Comput. 2021;74:101399. https:\/\/doi.org\/10.1016\/j.pmcj.2021.101399.","journal-title":"Pervasive Mobile Comput"},{"issue":"11","key":"290_CR135","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s10916-019-1442-y","volume":"43","author":"H Qiao","year":"2019","unstructured":"Qiao H, Dong X, Shen Y. Authenticated key agreement scheme with strong anonymity for multi-server environment in tmis. J Med Syst. 2019;43(11):321. https:\/\/doi.org\/10.1007\/s10916-019-1442-y.","journal-title":"J Med Syst"},{"key":"290_CR136","doi-asserted-by":"publisher","first-page":"120227","DOI":"10.1109\/ACCESS.2022.3217230","volume":"10","author":"SS Ahamad","year":"2022","unstructured":"Ahamad SS, Al-Shehri M, Keshta I. A secure and resilient scheme for telecare medical information systems with threat modeling and formal verification. IEEE Access. 2022;10:120227\u201344. https:\/\/doi.org\/10.1109\/ACCESS.2022.3217230.","journal-title":"IEEE Access"},{"issue":"5","key":"290_CR137","doi-asserted-by":"publisher","first-page":"716","DOI":"10.3390\/electronics9050716","volume":"9","author":"R Khan","year":"2020","unstructured":"Khan R, Tao X, Anjum A, Kanwal T, Malik SUR, Khan A, et al. Theta-sensitive k-anonymity: an anonymization model for iot-based electronic health records. Electronics. 2020;9(5):716. https:\/\/doi.org\/10.3390\/electronics9050716.","journal-title":"Electronics"},{"key":"290_CR138","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.ijinfomgt.2018.09.008","volume":"45","author":"JA Kaw","year":"2019","unstructured":"Kaw JA, Loan NA, Parah SA, Muhammad K, Sheikh JA, Bhat GM. A reversible and secure patient information hiding system for iot-driven e-health. Int J Inform Manag. 2019;45:262\u201375. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.09.008.","journal-title":"Int J Inform Manag"},{"issue":"1","key":"290_CR139","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-019-0262-y","volume":"21","author":"AK Sahu","year":"2020","unstructured":"Sahu AK, Swain G. Reversible image steganography using dual-layer lsb matching. Sensing Imaging. 2020;21(1):1. https:\/\/doi.org\/10.1007\/s11220-019-0262-y.","journal-title":"Sensing Imaging"},{"issue":"3","key":"290_CR140","doi-asserted-by":"publisher","first-page":"2699","DOI":"10.1007\/s40747-021-00391-0","volume":"9","author":"Y-Y Chen","year":"2023","unstructured":"Chen Y-Y, Hu Y-C, Kao H-Y, Lin Y-H. Security for ehealth system: data hiding in ambtc compressed images via gradient-based coding. Complex Intell Syst. 2023;9(3):2699\u2013711. https:\/\/doi.org\/10.1007\/s40747-021-00391-0.","journal-title":"Complex Intell Syst"},{"key":"290_CR141","volume-title":"CISSP: certified information systems security professional study guide","author":"JM Stewart","year":"2011","unstructured":"Stewart JM, Tittel E, Chapple M. CISSP: certified information systems security professional study guide. New York: John Wiley & Sons; 2011."},{"issue":"3","key":"290_CR142","doi-asserted-by":"publisher","first-page":"49","DOI":"10.3390\/jcp5030049","volume":"5","author":"FT Jaigirdar","year":"2025","unstructured":"Jaigirdar FT, Rudolph C, Anwar M, Tan B. Empowering end-users with cybersecurity situational awareness: findings from iot-health table-top exercises. J Cybersecurity Privacy. 2025;5(3):49.","journal-title":"J Cybersecurity Privacy"},{"issue":"6","key":"290_CR143","doi-asserted-by":"publisher","first-page":"3410","DOI":"10.3390\/app13063410","volume":"13","author":"K Kioskli","year":"2023","unstructured":"Kioskli K, Fotis T, Nifakos S, Mouratidis H. The importance of conceptualising the human-centric approach in maintaining and promoting cybersecurity-hygiene in healthcare 4.0. Appl Sci. 2023;13(6):3410. https:\/\/doi.org\/10.3390\/app13063410.","journal-title":"Appl Sci"},{"issue":"3","key":"290_CR144","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-025-01032-0","volume":"24","author":"K Khadka","year":"2025","unstructured":"Khadka K, Ullah AB. Human factors in cybersecurity: an interdisciplinary review and framework proposal. Int J Inf Secur. 2025;24(3):1\u201313. https:\/\/doi.org\/10.1007\/s10207-025-01032-0.","journal-title":"Int J Inf Secur"},{"key":"290_CR145","doi-asserted-by":"publisher","unstructured":"Chaturvedi I, Pawar PM, Muthalagu R, Tamizharasan P. Zero trust security architecture for digital privacy in healthcare. In: Information technology security: modern trends and challenges. Cham: Springer; 2024. p. 1\u201323. https:\/\/doi.org\/10.1007\/978-981-97-0407-1_1.","DOI":"10.1007\/978-981-97-0407-1_1"},{"issue":"1","key":"290_CR146","doi-asserted-by":"publisher","first-page":"19352","DOI":"10.1038\/s41598-021-98576-7","volume":"11","author":"M Willing","year":"2021","unstructured":"Willing M, Dresen C, Gerlitz E, Haering M, Smith M, Binnewies C, et al. Behavioral responses to a cyber attack in a hospital environment. Sci Rep. 2021;11(1):19352. https:\/\/doi.org\/10.1038\/s41598-021-98576-7.","journal-title":"Sci Rep"},{"issue":"10","key":"290_CR147","doi-asserted-by":"publisher","first-page":"3111","DOI":"10.3390\/s24103111","volume":"24","author":"LAC Ahakonye","year":"2024","unstructured":"Ahakonye LAC, Nwakanma CI, Kim D-S. Tides of blockchain in iot cybersecurity. Sensors. 2024;24(10):3111. https:\/\/doi.org\/10.3390\/s24103111.","journal-title":"Sensors"},{"key":"290_CR148","doi-asserted-by":"publisher","first-page":"38048","DOI":"10.1109\/ACCESS.2024.3374629","volume":"12","author":"DC Lawo","year":"2024","unstructured":"Lawo DC, Frantz R, Aguilera AC, Clemente XAI, Podles MP, Imana JL, et al. Falcon\/kyber and dilithium\/kyber network stack on Nvidia\u2019s data processing unit platform. IEEE Access. 2024;12:38048\u201356. https:\/\/doi.org\/10.1109\/ACCESS.2024.3374629.","journal-title":"IEEE Access"},{"key":"290_CR149","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.340728","volume":"18","author":"U Musa","year":"2024","unstructured":"Musa U, Adebiyi M, Aroba O, Adebiyi A. Rsa and elliptic curve encryption system. Int J Inform Security Privacy. 2024;18:1\u201327. https:\/\/doi.org\/10.4018\/IJISP.340728.","journal-title":"Int J Inform Security Privacy"},{"key":"290_CR150","doi-asserted-by":"publisher","first-page":"112962","DOI":"10.1109\/ACCESS.2025.3584473","volume":"13","author":"Y Wang","year":"2025","unstructured":"Wang Y, Shahril Ismail E. A review on the advances, applications, and future prospects of post-quantum cryptography in blockchain and iot. IEEE Access. 2025;13:112962\u201377. https:\/\/doi.org\/10.1109\/ACCESS.2025.3584473.","journal-title":"IEEE Access"},{"issue":"4","key":"290_CR151","doi-asserted-by":"publisher","first-page":"683","DOI":"10.3390\/brainsci13040683","volume":"13","author":"T Mazhar","year":"2023","unstructured":"Mazhar T, Talpur DB, Shloul TA, Ghadi YY, Haq I, Ullah I, et al. Analysis of iot security challenges and its solutions using artificial intelligence. Brain Sci. 2023;13(4):683. https:\/\/doi.org\/10.3390\/brainsci13040683.","journal-title":"Brain Sci"},{"issue":"9","key":"290_CR152","doi-asserted-by":"publisher","first-page":"4265","DOI":"10.3390\/s23094265","volume":"23","author":"SE Ali","year":"2023","unstructured":"Ali SE, Tariq N, Khan FA, Ashraf M, Abdul W, Saleem K. Bft-iomt: a blockchain-based trust mechanism to mitigate sybil attack using fuzzy logic in the internet of medical things. Sensors. 2023;23(9):4265. https:\/\/doi.org\/10.3390\/s23094265.","journal-title":"Sensors"},{"key":"290_CR153","doi-asserted-by":"publisher","first-page":"102071","DOI":"10.1109\/ACCESS.2025.3577941","volume":"13","author":"K Nilg\u00fcn Karaca","year":"2025","unstructured":"Nilg\u00fcn Karaca K, \u00c7etin A. Systematic review of current approaches and innovative solutions for combating zero-day vulnerabilities and zero-day attacks. IEEE Access. 2025;13:102071\u201391. https:\/\/doi.org\/10.1109\/ACCESS.2025.3577941.","journal-title":"IEEE Access"},{"issue":"1","key":"290_CR154","doi-asserted-by":"publisher","first-page":"70103","DOI":"10.1049\/tje2.70103","volume":"2025","author":"MM Raoof","year":"2025","unstructured":"Raoof MM, Aldaghmi N, Aljuaid H. Iot security in healthcare: a recent trend and predictive study of sql injection attacks. J Eng. 2025;2025(1):70103. https:\/\/doi.org\/10.1049\/tje2.70103.","journal-title":"J Eng"},{"key":"290_CR155","doi-asserted-by":"publisher","DOI":"10.1016\/j.fraope.2025.100256","volume":"11","author":"P Yan","year":"2025","unstructured":"Yan P, Talaei Khoei T. Securing the internet of things: a comprehensive review of ransomware attacks, detection, countermeasures, and future prospects. Franklin Open. 2025;11:100256. https:\/\/doi.org\/10.1016\/j.fraope.2025.100256.","journal-title":"Franklin Open"},{"issue":"6","key":"290_CR156","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MNET.2023.3318179","volume":"37","author":"X Zhang","year":"2023","unstructured":"Zhang X, Shen T, Bai F, Zhang C. Collusion-based poisoning attacks against blockchained federated learning. IEEE Netw. 2023;37(6):50\u20137. https:\/\/doi.org\/10.1109\/MNET.2023.3318179.","journal-title":"IEEE Netw"},{"issue":"4","key":"290_CR157","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.3390\/encyclopedia4040099","volume":"4","author":"BD Lund","year":"2024","unstructured":"Lund BD, Lee T-H, Wang Z, Wang T, Mannuru NR. Zero trust cybersecurity: procedures and considerations in context. Encyclopedia. 2024;4(4):1520\u201333. https:\/\/doi.org\/10.3390\/encyclopedia4040099.","journal-title":"Encyclopedia"},{"key":"290_CR158","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100137","author":"W Aman","year":"2019","unstructured":"Aman W, Kausar F. Towards a gateway-based context-aware and self-adaptive security management model for iot-based ehealth systems. Int J Adv Comput Sci Appl. 2019. https:\/\/doi.org\/10.14569\/IJACSA.2019.0100137.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"4","key":"290_CR159","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1002\/widm.1495","volume":"13","author":"A Gaudio","year":"2023","unstructured":"Gaudio A, Smailagic A, Faloutsos C, Mohan S, Johnson E, Liu Y, et al. Deepfixcx: explainable privacy-preserving image compression for medical image analysis. Wiley Interdiscip Rev Data Min Knowl Discov. 2023;13(4):1495. https:\/\/doi.org\/10.1002\/widm.1495.","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"290_CR160","doi-asserted-by":"publisher","unstructured":"Li O, Hao Y, Wang Z, Zhu B, Wang S, Zhang Z, Feng F. Model inversion attacks through target-specific conditional diffusion models. 2024. arXiv preprint arXiv:2407.11424. https:\/\/doi.org\/10.48550\/arXiv.2407.11424.","DOI":"10.48550\/arXiv.2407.11424"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-026-00290-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00290-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00290-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:06:38Z","timestamp":1772121998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-026-00290-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,31]]},"references-count":160,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["290"],"URL":"https:\/\/doi.org\/10.1007\/s43926-026-00290-1","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,31]]},"assertion":[{"value":"17 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"22"}}