{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T09:22:48Z","timestamp":1775726568993,"version":"3.50.1"},"reference-count":129,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3281655","type":"journal-article","created":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T18:12:34Z","timestamp":1685556754000},"page":"107725-107753","source":"Crossref","is-referenced-by-count":18,"title":["Improving Security Architecture of Internet of Medical Things: A Systematic Literature Review"],"prefix":"10.1109","volume":"11","author":[{"given":"Mudasir","family":"Mahmood","sequence":"first","affiliation":[{"name":"Institute of Computing and Information Technology, Gomal University, Dera Ismail Khan, Pakistan"}]},{"given":"Muhammad Ijaz","family":"Khan","sequence":"additional","affiliation":[{"name":"Institute of Computing and Information Technology, Gomal University, Dera Ismail Khan, Pakistan"}]},{"family":"Ziauddin","sequence":"additional","affiliation":[{"name":"Institute of Computing and Information Technology, Gomal University, Dera Ismail Khan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2003-940X","authenticated-orcid":false,"given":"Hameed","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Buner, Buner, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7542-736X","authenticated-orcid":false,"given":"Inayat","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Engineering and Technology, Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4343-7187","authenticated-orcid":false,"given":"Shahid","family":"Rahman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Buner, Buner, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3563-5981","authenticated-orcid":false,"given":"Muhammad","family":"Shabir","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Buner, Buner, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3707-3708","authenticated-orcid":false,"given":"Badam","family":"Niazi","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, Nangarhar University, Jalalabad, Afghanistan"}]}],"member":"263","reference":[{"key":"ref57","first-page":"1","article-title":"Security analysis of a patient monitoring system for the Internet of Things in eHealth","volume":"335","author":"habib","year":"2015","journal-title":"Proc Int Conf eHealth Telemed Social Med"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2014.10"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.028"},{"key":"ref58","first-page":"5705","article-title":"Cyber-attacks and threats for healthcare&#x2014;A multilayer thread analysis","author":"spanakis","year":"2020","journal-title":"Proc 42nd Annu Int Conf IEEE Eng Med Biol Soc"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.10.006"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409099"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/Anti-Cybercrime.2017.7905270"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849014"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2018.8615361"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719875653"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3011444"},{"key":"ref45","first-page":"401","article-title":"Security technology analysis of IoT","volume":"312","author":"peng","year":"2012","journal-title":"Internet of Things"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.021"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2019.8857055"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICISC.2018.8399126"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3052850"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.07.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.058"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.05.029"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8829595"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v20.i1.pp414-422"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2856896"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.030"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3017221"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","article-title":"An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture","volume":"160","author":"priya","year":"2020","journal-title":"Comput Commun"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.12.003"},{"key":"ref40","article-title":"A case study on how the Apple Watch can benefit medical heart research","author":"dellgren","year":"2017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2013.78"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.008"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/computers9010008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography3010003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817615"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0029-7"},{"key":"ref33","first-page":"187","article-title":"A combined approach of steganography and cryptography with generative adversarial networks: Survey","author":"sandya","year":"2022","journal-title":"Intelligent System Design Proceedings of INDIA 2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800503"},{"key":"ref39","first-page":"790","article-title":"Secret sharing of IoT healthcare data using cryptographic algorithm","volume":"5","author":"devi","year":"0","journal-title":"International Journal of Engine Research"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.4258\/hir.2015.21.4.271"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICGS3.2019.8688030"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.054"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3801-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-07-2016-0200"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100125"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/1932296818768618"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2849"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2017.60"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/fi11110239"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/sym12040664"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910087"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom.2019.8812784"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v20.i1.pp414-422"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101869"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100123"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.3390\/sym12081305"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/SIOT.2015.9"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00445-y"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903242"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4049"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.005"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.10.009"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00026"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102154"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.2000123"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719851977"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960617"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3006523"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.100"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730672"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(10)60159-8"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.099"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2018.8525716"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03895-7"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2016.7988026"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.14400\/JDC.2017.15.3.187"},{"key":"ref85","first-page":"18","article-title":"Cyber-physical-security model for safety-critical IoT infrastructures","volume":"35","author":"bellekens","year":"2015","journal-title":"Proc Wireless World Res Forum Meeting"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"ref87","first-page":"199","article-title":"DDITA: A naive security model for IoT resource security","author":"matta","year":"2018","journal-title":"Smart Innovations in Communication and Computational Sciences"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.050"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03192-3_4"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCIS48478.2019.8974544"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100052"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110217"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0580-z"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963797"},{"key":"ref78","first-page":"1","article-title":"Using SEIRS epidemic models for IoT botnets attacks","author":"gardner","year":"2017","journal-title":"Proc Design Reliable Commun Netw 13th Int Conf"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9897-5_6"},{"key":"ref106","article-title":"IoMT amid COVID-19 pandemic: Application, architecture, technology, and security","volume":"174","author":"aman","year":"2021","journal-title":"J Netw Comput Appl"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2671460"},{"key":"ref75","article-title":"The case for retraining of ML models for IoT device identification at the edge","author":"kolcun","year":"2020","journal-title":"arXiv 2011 08605"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i5.pp4250-4262"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.14257\/astl.2016.129.41"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.006"},{"key":"ref77","first-page":"15","article-title":"Towards IoT ecosystems and business models","author":"leminen","year":"2012","journal-title":"Journal of Business &amp; Industrial Marketing"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823430"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2445094"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS49469.2020.239527"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.058"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/1460458212442933"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8376988"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI49217.2020.00-17"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2952764"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2018.8820213"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6752048"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.07.106"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.4108\/icst.bodynets.2012.250235"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2700-3"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2907092"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2582841"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1177\/0954406219884970"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025617"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.01.006"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2840129"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1301-5_23"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.07.008"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32427-7_54"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761783"},{"key":"ref113","first-page":"1","article-title":"Transactions on human-computer interaction","volume":"3","author":"benbasat","year":"2011","journal-title":"AIS Transactions on Human-Computer Interaction"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2018.8632063"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900536"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00091"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2963328"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2877146"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2018.8449816"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2771382"},{"key":"ref61","article-title":"Anomaly detection models for IoT time series data","author":"giannoni","year":"2018","journal-title":"arXiv 1812 00890"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1002\/int.22293"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10138814.pdf?arnumber=10138814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T18:18:11Z","timestamp":1698085091000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10138814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":129,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3281655","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}