{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:30:09Z","timestamp":1760236209833,"version":"build-2065373602"},"reference-count":70,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T00:00:00Z","timestamp":1635897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","doi-asserted-by":"publisher","award":["UID\/CEC\/04524\/2021","UID\/CEC\/ 00127\/2021"],"award-info":[{"award-number":["UID\/CEC\/04524\/2021","UID\/CEC\/ 00127\/2021"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014717","name":"Centro 2020","doi-asserted-by":"publisher","award":["CENTRO-01-0145-FEDER-024293"],"award-info":[{"award-number":["CENTRO-01-0145-FEDER-024293"]}],"id":[{"id":"10.13039\/501100014717","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Physical activity contributes to the maintenance of health conditions and functioning. However, the percentage of older adults who comply with the recommendations for physical activity levels is low when compared to the same percentages on younger groups. The SmartWalk system aims to encourage older adults to perform physical activity (i.e., walking in the city), which is monitored and adjusted by healthcare providers for best results. The study reported in this article focused on the implementation of SmartWalk security services to keep personal data safe during communications and while at rest, which were validated considering a comprehensive use case. The security framework offers various mechanisms, including an authentication system that was designed to complement the pairs of usernames and passwords with trusted execution environments and token-based features, authorization with different access levels, symmetric and asymmetric key cryptography, critical transactions review, and logging supported by blockchain technology. The resulting implementation contributes for a common understanding of the security features of trustful smart cities\u2019 applications, which conforms with existing legislation and regulations.<\/jats:p>","DOI":"10.3390\/s21217323","type":"journal-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T21:57:49Z","timestamp":1635976669000},"page":"7323","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Security Mechanisms of a Mobile Health Application for Promoting Physical Activity among Older Adults"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6618-6376","authenticated-orcid":false,"given":"David","family":"Bastos","sequence":"first","affiliation":[{"name":"Computer Science and Communications Research Centre, Polytechnic Institute of Leiria, School of Technology and Management, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3019-1330","authenticated-orcid":false,"given":"Jos\u00e9","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"Computer Science and Communications Research Centre, Polytechnic Institute of Leiria, School of Technology and Management, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9335-1851","authenticated-orcid":false,"given":"Fernando","family":"Silva","sequence":"additional","affiliation":[{"name":"Computer Science and Communications Research Centre, Polytechnic Institute of Leiria, School of Technology and Management, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8415-9040","authenticated-orcid":false,"given":"M\u00e1rio","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Institute of Electronics and Telematics Engineering of Aveiro, Higher School of Technology and Management of \u00c1gueda, University of Aveiro, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7332-4397","authenticated-orcid":false,"given":"Carlos","family":"Rabad\u00e3o","sequence":"additional","affiliation":[{"name":"Computer Science and Communications Research Centre, Polytechnic Institute of Leiria, School of Technology and Management, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8211-0398","authenticated-orcid":false,"given":"Antonio","family":"Fern\u00e1ndez-Caballero","sequence":"additional","affiliation":[{"name":"Departamento de Sistemas Inform\u00e1ticos, Universidad de Castilla-La Mancha, 02071 Albacete, Spain"},{"name":"Biomedical Research Networking Centre in Mental Health (CIBERSAM), 28029 Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5029-6191","authenticated-orcid":false,"given":"Jo\u00e3o Paulo","family":"Barraca","sequence":"additional","affiliation":[{"name":"Department of Electronics, Telecommunications and Informatics, Institute of Telecommunications, University of Aveiro, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3801-7249","authenticated-orcid":false,"given":"Nelson Pacheco","family":"Rocha","sequence":"additional","affiliation":[{"name":"Department of Medical Sciences, Institute of Electronics and Telematics Engineering of Aveiro, University of Aveiro, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5062-1241","authenticated-orcid":false,"given":"Ant\u00f3nio","family":"Pereira","sequence":"additional","affiliation":[{"name":"Computer Science and Communications Research Centre, Polytechnic Institute of Leiria, School of Technology and Management, 2411-901 Leiria, Portugal"},{"name":"INOV INESC INOVA\u00c7\u00c3O, Institute of New Technologies\u2014Leiria Office, Apartado 4163, 2411-901 Leiria, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,3]]},"reference":[{"key":"ref_1","unstructured":"United Nations (2017). World Population Ageing 2017, Department of Economic and Social Affairs, Population Division."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1323","DOI":"10.1016\/S0140-6736(16)32381-9","article-title":"Future life expectancy in 35 industrialised countries: Projections with a Bayesian model ensemble","volume":"389","author":"Kontis","year":"2017","journal-title":"Lancet"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s12126-008-9019-y","article-title":"Ageing in place in the United Kingdom","volume":"32","author":"Sixsmith","year":"2008","journal-title":"Ageing Int."},{"key":"ref_4","unstructured":"World Health Organization (2002). Active Ageing: A Policy Framework, WHO."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1017\/S1041610213002287","article-title":"Operational definitions of successful aging: A systematic review","volume":"26","author":"Cosco","year":"2014","journal-title":"Int. Psychogeriatr."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Van Hoof, J., Kazak, J.K., Perek-Bia\u0142as, J.M., and Peek, S. (2018). The challenges of urban ageing: Making cities age-friendly in Europe. Int. J. Environ. Res. Public Health, 15.","DOI":"10.3390\/ijerph15112473"},{"key":"ref_7","unstructured":"World Health Organization (2020). Decade of Healthy Ageing: Baseline Report, WHO."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1177\/1460458216683535","article-title":"The European Union\u2019s Ambient and Assisted Living Joint Programme: An evaluation of its impact on population health and well-being","volume":"25","year":"2019","journal-title":"Health Inform. J."},{"key":"ref_9","unstructured":"World Health Organization (2017). Age-Friendly Environments in Europe. A Handbook of Domains for Policy Action, WHO Regional Office."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bellagente, P., Crema, C., Depari, A., Ferrari, P., Flammini, A., Lanfranchi, G., Lenzi, G., Maddiona, M., Rinaldi, S., and Sisinni, E. (2018, January 12\u201314). Remote and non-invasive monitoring of elderly in a smart city context. Proceedings of the 2018 IEEE Sensors Applications Symposium (SAS), Seoul, Korea.","DOI":"10.1109\/SAS.2018.8336732"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Vargas-Acosta, R., Becerra, D., Gurbuz, O., Villanueva-Rosales, N., Nunez-Mchiri, G.G., and Cheu, R.L. (2019, January 14\u201317). Smart Mobility for Seniors through the Urban Connector. Proceedings of the 2019 IEEE International Smart Cities Conference (ISC2), Casablanca, Morocco.","DOI":"10.1109\/ISC246665.2019.9071732"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"An, D., Wang, J., Wang, P., Yang, Y., Pu, Y., Ke, H., and Chen, Y. (2020, January 16\u201320). Beyond Walking: Improving Urban Mobility Equity in the Age of Information. Proceedings of the International Conference on Applied Human Factors and Ergonomics, San Diego, CA, USA.","DOI":"10.1007\/978-3-030-51194-4_27"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"65","DOI":"10.3897\/jucs.64591","article-title":"Towards a Collaborative Model to Assist People with Disabilities and the Elderly People in Smart Assistive Cities","volume":"27","author":"Matos","year":"2021","journal-title":"J. Univers. Comput. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Loos, E., Sourbati, M., and Behrendt, F. (2020). The Role of Mobility Digital Ecosystems for Age-Friendly Urban Public Transport: A Narrative Literature Review. Int. J. Environ. Res. Public Health, 17.","DOI":"10.3390\/ijerph17207465"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4020010","DOI":"10.1061\/(ASCE)ME.1943-5479.0000753","article-title":"Wearable Biosensor and Hotspot Analysis\u2013Based Framework to Detect Stress Hotspots for Advancing Elderly\u2019s Mobility","volume":"36","author":"Lee","year":"2020","journal-title":"J. Manag. Eng."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.neucom.2020.06.149","article-title":"A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities","volume":"444","author":"Elahi","year":"2021","journal-title":"Neurocomputing"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"e1949835","DOI":"10.1155\/2018\/1949835","article-title":"Definition of Technological Solutions Based on the Internet of Things and Smart Cities Paradigms for Active and Healthy Ageing through Cocreation","volume":"2018","author":"Fico","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MS.2017.4121209","article-title":"Healthy Routes in the Smart City: A Context-Aware Mobile Recommender","volume":"34","author":"Casino","year":"2017","journal-title":"IEEE Softw."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bastos, D., Ribeiro, J., Silva, F., Rodrigues, M., Santos, R., Martins, C., Rocha, N., and Pereira, A. (2019, January 16\u201319). SmartWalk Mobile\u2014A Context-Aware m-Health App for Promoting Physical Activity Among the Elderly. Proceedings of the World Conference on Information Systems and Technologies, La Toja Island, Spain.","DOI":"10.1007\/978-3-030-16184-2_79"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1476","DOI":"10.1001\/archinternmed.2009.248","article-title":"Physical Activity, Function, and Longevity Among the Very Old","volume":"169","author":"Stessman","year":"2009","journal-title":"Arch. Intern. Med."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.jamda.2012.10.023","article-title":"Physical activity and health service utilization among older people","volume":"14","author":"Jacobs","year":"2013","journal-title":"J. Am. Med. Dir. Assoc."},{"key":"ref_22","first-page":"437","article-title":"Effect of six weeks of endurance exercise and following detraining on serum brain derived neurotrophic factor and memory performance in middle aged males with metabolic syndrome","volume":"53","author":"Babaei","year":"2013","journal-title":"J. Sports Med. Phys. Fit."},{"key":"ref_23","first-page":"56","article-title":"SmartWalk BAN: Using Body Area Networks to Encourage Older Adults to Perform","volume":"10","author":"Bastos","year":"2021","journal-title":"Phys. Activity. Electron."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Rocha, N.P., Bastardo, R., Pav\u00e3o, J., Santinha, G., Rodrigues, M., Rodrigues, C., Queir\u00f3s, A., and Dias, A. (2021). Smart Cities\u2019 Applications to Facilitate the Mobility of Older Adults: A Systematic Review of the Literature. Appl. Sci., 11.","DOI":"10.3390\/app11146395"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Majumder, S., and Deen, M.J. (2019). Smartphone Sensors for Health Monitoring and Diagnosis. Sensors, 19.","DOI":"10.3390\/s19092164"},{"key":"ref_26","unstructured":"(2021, September 01). Medicine Alert. Available online: https:\/\/play.google.com\/store\/apps\/details?id=com.kvsoftware.medicinealert&hl=en&gl=US."},{"key":"ref_27","unstructured":"(2021, September 01). Blood Pressure Companion. Available online: https:\/\/play.google.com\/store\/apps\/details?id=de.medando.bloodpressurecompanion&hl=en&gl=US."},{"key":"ref_28","unstructured":"(2021, September 01). Healthy.io. Available online: https:\/\/healthy.io."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Radley-Gardner, O., Beale, H., and Zimmermann, R. (2016). Fundamental Texts on European Private Law, Hart Publishing.","DOI":"10.5040\/9781782258674"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"38535","DOI":"10.1109\/ACCESS.2019.2906346","article-title":"Embracing the Smart-Home Revolution in Asia by the Elderly: An End-User Negative Perception Modeling","volume":"7","author":"Pal","year":"2019","journal-title":"IEEE Access"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Flynn, T., Grispos, G., Glisson, W., and Mahoney, W. (2020, January 7\u201310). Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack. Proceedings of the 53rd Hawaii International Conference on System Sciences, Maui, HI, USA.","DOI":"10.24251\/HICSS.2020.791"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"35","DOI":"10.21814\/unio.6.2.2767","article-title":"Digital Contact Tracing and Data Protection: Assessing the French and Portuguese Applications. Digital contact tracing and data protection: Assessing the French and Portuguese applications","volume":"6","author":"Ramos","year":"2020","journal-title":"UNIO\u2013EU Law J."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCOM.001.2000729","article-title":"IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-enabled Architecture for Contact Tracing","volume":"59","author":"Tedeschi","year":"2021","journal-title":"IEEE Commun. Mag."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.1001\/jama.2020.16178","article-title":"Prevalence of Third-Party Tracking on COVID-19\u2013Related Web Pages","volume":"324","author":"McCoy","year":"2020","journal-title":"JAMA"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1186\/s40163-014-0009-y","article-title":"Achieving a consensual definition of phishing based on a systematic review of the literature","volume":"3","author":"Lastdrager","year":"2014","journal-title":"Crime Sci."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"E786","DOI":"10.1503\/cmaj.1095434","article-title":"NHS ransomware attack spreads worldwide","volume":"189","author":"Collier","year":"2017","journal-title":"Can. Med Assoc. J."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"405","DOI":"10.26483\/ijarcs.v8i9.5045","article-title":"Survey of Various Security Attacks in Clouds Based Environments","volume":"8","author":"Oberoi","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Zaw, T.M., Thant, M., and Bezzateev, S.V. (2019, January 3\u20137). Database Security with AES Encryption, Elliptic Curve Encryption and Signature. Proceedings of the 2019 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), St. Petersburg, Russia.","DOI":"10.1109\/WECONF.2019.8840125"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1353-4858(17)30025-9","article-title":"Encryption as the cornerstone of big data security","volume":"2017","author":"Tankard","year":"2017","journal-title":"Netw. Secur."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Tariq, N., Asim, M., Al-Obeidat, F., Zubair Farooqi, M., Baker, T., Hammoudeh, M., and Ghafir, I. (2019). The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Sensors, 19.","DOI":"10.3390\/s19081788"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Sabt, M., Achemlal, M., and Bouabdallah, A. (2015, January 20\u201322). Trusted Execution Environment: What It is, and What It is Not. Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA, Helsinki, Finland.","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Van den Braak, S.W., Choenni, S., Meijer, R., and Zuiderwijk, A. (2012, January 4\u20137). Trusted third parties for secure and privacy-preserving data integration and sharing in the public sector. Proceedings of the 13th Annual International Conference on Digital Government Research 2012, College Park, MA, USA.","DOI":"10.1145\/2307729.2307752"},{"key":"ref_43","first-page":"183","article-title":"Cloud Computing Environment and Security Challenges: A Review","volume":"8","author":"Mushtag","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.jnca.2017.12.017","article-title":"A remotely keyed file encryption scheme under mobile cloud computing","volume":"106","author":"Yang","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/s11761-018-0240-6","article-title":"Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security","volume":"12","author":"Sandhia","year":"2018","journal-title":"Serv. Oriented Comput. Appl."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1109\/COMST.2018.2863956","article-title":"Security services using blockchains: A state of the art survey","volume":"21","author":"Salman","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s10586-020-03137-8","article-title":"A survey on boosting IoT security and privacy through blockchain","volume":"24","author":"Alfandi","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-019-1445-8","article-title":"A systematic review for enabling of develop a blockchain technology in healthcare application: Taxonomy, substantially analysis, motivations, challenges, recommendations and future direction","volume":"43","author":"Hussien","year":"2019","journal-title":"J. Med. Syst."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40854-019-0147-z","article-title":"A systematic review of blockchain","volume":"5","author":"Xu","year":"2019","journal-title":"Financ. Innov."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/COMST.2017.2749508","article-title":"Security, privacy, and access control in information-centric networking: A survey","volume":"20","author":"Tourani","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MC.2015.33","article-title":"Attribute-based access control","volume":"48","author":"Hu","year":"2015","journal-title":"Computer"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Sergeev, A., and Matulevi\u010dius, R. (2017, January 10\u201313). An Approach to Capture Role-Based Access Control Models from Spring Web Applications. Proceedings of the IEEE 21st International Enterprise Distributed Object Computing Conference (EDOC), Quebec City, QC, Canada.","DOI":"10.1109\/EDOC.2017.29"},{"key":"ref_53","unstructured":"(2021, September 01). OASIS eXtensable Access Control Markup Language. Available online: http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/TSUSC.2018.2793284","article-title":"Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security","volume":"5","author":"Jiang","year":"2020","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Rodrigues, M., Santos, R., Queir\u00f3s, A., Silva, A.G., Amaral, J., Goncalves, L.J., Pereira, A., and da Rocha, N.P. (2018, January 20\u201322). Meet SmartWalk, Smart Cities for Active Seniors. Proceedings of the TISHW 2018\u2014The 2nd International Conference on Technology and Innovation in Sports, Health and Wellbeing, Thessaloniki, Greece.","DOI":"10.1109\/TISHW.2018.8559493"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Queir\u00f3s, A., Silva, A., Sim\u00f5es, P., Santos, C., Matrins, C., da Rocha, N.P., and Rogrigues, M. (2018, January 20\u201322). SmartWalk: Personas and scenarios definition and functional requirements. Proceedings of the TISHW 2018\u2014The 2nd International Conference on Technology and Innovation in Sports, Health and Wellbeing Thessaloniki, Thessaloniki, Greece.","DOI":"10.1109\/TISHW.2018.8559574"},{"key":"ref_57","unstructured":"(2021, September 01). What Is the Awareness API?. Available online: https:\/\/developers.google.com\/awareness\/overview#context-types."},{"key":"ref_58","unstructured":"Leit\u00e3o, R., and Silva, P.A. (2012, January 19\u201321). Target and Spacing Sizes for Smartphone User Interfaces for Older Adults: Design Patterns Based on an Evaluation with Users. Proceedings of the 19th Conference on Pattern Languages of Programs, Tucson, AZ, USA."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., and Wincler, M. (2011). Elderly User Evaluation of Mobile Touchscreen Interactions. Proceedings of the Human-Computer Interaction\u2014INTERACT 2011, Lisbon, Portugal, 5\u20139 September 2011, Springer.","DOI":"10.1007\/978-3-642-23771-3"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/j.procs.2014.02.041","article-title":"Design and Evaluation of a Mobile User Interface for Older Adults: Navigation, Interaction and Visual Design Recommendations","volume":"27","author":"Barros","year":"2014","journal-title":"Procedia Comput. Sci."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/BF00992539","article-title":"Cue utilization in emotion attribution from auditory stimuli","volume":"1","author":"Scherer","year":"1997","journal-title":"Motiv. Emot."},{"key":"ref_62","unstructured":"(2021, September 01). FHIR Release 3 (STU). Available online: https:\/\/www.hl7.org\/fhir\/resourcelist.html."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.clsr.2015.12.004","article-title":"Data security and multi-factor authentication: Analysis of requirements under EU law and in selected EU Member States","volume":"32","author":"Kennedy","year":"2016","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Jones, M., Bradley, J., and Sakimura, N. (2015). RFC 7519, Json Web Token (JWT), IEFT.","DOI":"10.17487\/RFC7519"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Rosa, M., Barraca, J.P., and da Rocha, N.P. (2019, January 16\u201319). Access Control for Social Care Platforms Using Fast Healthcare Interoperability Resources. Proceedings of the World Conference on Information Systems and Technologies, La Toja Island, Spain.","DOI":"10.1007\/978-3-030-16187-3_10"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Rosa, M., Barraca, J.P., and da Rocha, N.P. (2019, January 16\u201319). Logging Integrity with Blockchain Structures. Proceedings of the World Conference on Information Systems and Technologies, La Toja Island, Spain.","DOI":"10.1007\/978-3-030-16187-3_9"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Cerdeira, D., Santos, N., Fonseca, P., and Pinto, S. (2020, January 18\u201320). SoK: Understanding the Prevailing Security Vulnerabilities in Trust Zone-assisted TEE Systems. Proceedings of the 2020 IEEE Symposium on Security and Privacy, San Francisco, CA, USA.","DOI":"10.1109\/SP40000.2020.00061"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-021-02000-7","article-title":"A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city","volume":"2021","author":"Xie","year":"2021","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"6632747","DOI":"10.1155\/2021\/6632747","article-title":"SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things","volume":"2021","author":"Sylla","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_70","first-page":"5379","article-title":"Developed security and privacy algorithms for cyber physical system","volume":"11","author":"Khudhur","year":"2021","journal-title":"Int. J. Electr. Comput. Eng."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/21\/7323\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:25:27Z","timestamp":1760167527000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/21\/7323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,3]]},"references-count":70,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2021,11]]}},"alternative-id":["s21217323"],"URL":"https:\/\/doi.org\/10.3390\/s21217323","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,11,3]]}}}