系统回顾安全漏洞,以防止网络攻击的类型

Ahmed Bouriche, S. Bouriche
{"title":"系统回顾安全漏洞,以防止网络攻击的类型","authors":"Ahmed Bouriche, S. Bouriche","doi":"10.54489/ijcim.v2i2.107","DOIUrl":null,"url":null,"abstract":"And here's a summary of latest developments in Internet of Things (IoT) integrated devices, wireless connections, and biosensing which have contributed in the fast development of wearable sensor implantation. This study also discusses the applications of the internet of medical things (IoMT), which now has attracted considerable interest as an environment of networked clinical systems, computational capabilities, and medical sensors designed to improve the quality of healthcare services. The perspective of healthcare and lifestyle can indeed be totally transformed by AI technology based on 5G. The aim of this proposed research design is to investigate risks which might undermine the credibility, confidentiality, and security of IoMT platforms in consideration of the relevance of IoT platforms and 5G networks. \nMoreover, there have been cutting-edge blockchain-based techniques which can aid in enhancing IoMT network security. IoMT has indeed been discovered to be vulnerable to a range of attacks, notably malware, DoS attacks, and wiretapping attacks. IoMT is additionally prone to a range of issues, involving safety, privacy, and anonymity. There are revolutionary cryptography solutions, such as password protection, authentication protocols, and data encryption, which can aid in improving the security and trustworthiness of IoMT devices despite the different of security risks.","PeriodicalId":104992,"journal":{"name":"International Journal of Computations, Information and Manufacturing (IJCIM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A SYSTEMATIC REVIEW ON SECURITY VULNERABILITIES TO PREVENY TYPES OF ATTACKS IN IOMT\",\"authors\":\"Ahmed Bouriche, S. Bouriche\",\"doi\":\"10.54489/ijcim.v2i2.107\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"And here's a summary of latest developments in Internet of Things (IoT) integrated devices, wireless connections, and biosensing which have contributed in the fast development of wearable sensor implantation. This study also discusses the applications of the internet of medical things (IoMT), which now has attracted considerable interest as an environment of networked clinical systems, computational capabilities, and medical sensors designed to improve the quality of healthcare services. The perspective of healthcare and lifestyle can indeed be totally transformed by AI technology based on 5G. The aim of this proposed research design is to investigate risks which might undermine the credibility, confidentiality, and security of IoMT platforms in consideration of the relevance of IoT platforms and 5G networks. \\nMoreover, there have been cutting-edge blockchain-based techniques which can aid in enhancing IoMT network security. IoMT has indeed been discovered to be vulnerable to a range of attacks, notably malware, DoS attacks, and wiretapping attacks. IoMT is additionally prone to a range of issues, involving safety, privacy, and anonymity. There are revolutionary cryptography solutions, such as password protection, authentication protocols, and data encryption, which can aid in improving the security and trustworthiness of IoMT devices despite the different of security risks.\",\"PeriodicalId\":104992,\"journal\":{\"name\":\"International Journal of Computations, Information and Manufacturing (IJCIM)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computations, Information and Manufacturing (IJCIM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.54489/ijcim.v2i2.107\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computations, Information and Manufacturing (IJCIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54489/ijcim.v2i2.107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

本文总结了物联网(IoT)集成设备、无线连接和生物传感的最新发展,这些都为可穿戴传感器植入的快速发展做出了贡献。本研究还讨论了医疗物联网(IoMT)的应用,作为网络临床系统、计算能力和旨在提高医疗服务质量的医疗传感器的环境,它现在已经引起了相当大的兴趣。基于5G的人工智能技术确实可以彻底改变医疗和生活方式的视角。本研究设计的目的是考虑到物联网平台和5G网络的相关性,调查可能破坏物联网平台可信度、保密性和安全性的风险。此外,有一些基于区块链的尖端技术可以帮助提高IoMT网络的安全性。IoMT确实被发现容易受到一系列攻击,特别是恶意软件、DoS攻击和窃听攻击。此外,IoMT还容易出现一系列问题,包括安全性、隐私性和匿名性。尽管存在不同的安全风险,但密码保护、身份验证协议和数据加密等革命性的加密解决方案有助于提高IoMT设备的安全性和可信度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A SYSTEMATIC REVIEW ON SECURITY VULNERABILITIES TO PREVENY TYPES OF ATTACKS IN IOMT
And here's a summary of latest developments in Internet of Things (IoT) integrated devices, wireless connections, and biosensing which have contributed in the fast development of wearable sensor implantation. This study also discusses the applications of the internet of medical things (IoMT), which now has attracted considerable interest as an environment of networked clinical systems, computational capabilities, and medical sensors designed to improve the quality of healthcare services. The perspective of healthcare and lifestyle can indeed be totally transformed by AI technology based on 5G. The aim of this proposed research design is to investigate risks which might undermine the credibility, confidentiality, and security of IoMT platforms in consideration of the relevance of IoT platforms and 5G networks. Moreover, there have been cutting-edge blockchain-based techniques which can aid in enhancing IoMT network security. IoMT has indeed been discovered to be vulnerable to a range of attacks, notably malware, DoS attacks, and wiretapping attacks. IoMT is additionally prone to a range of issues, involving safety, privacy, and anonymity. There are revolutionary cryptography solutions, such as password protection, authentication protocols, and data encryption, which can aid in improving the security and trustworthiness of IoMT devices despite the different of security risks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Big Data Analytics in Healthcare: Exploring the Role of Machine Learning in Predicting Patient Outcomes and Improving Healthcare Delivery Technology Acceptance Model and Attitude of Consumers towards Online Shopping with Special Reference to UAE Impact of Big Data on Supply Chain Performance through Demand Forecasting Impact of Information Security on Online Operations: The Mediating Role of Risk Management Improving Heart Disease Prediction Accuracy Using a Hybrid Machine Learning Approach: A Comparative study of SVM and KNN Algorithms
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1