Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 7 de 7
Filter
Add more filters










Database
Language
Publication year range
1.
PLoS One ; 19(7): e0304774, 2024.
Article in English | MEDLINE | ID: mdl-38985779

ABSTRACT

The IoT (Internet of Things) has played a promising role in e-healthcare applications during the last decade. Medical sensors record a variety of data and transmit them over the IoT network to facilitate remote patient monitoring. When a patient visits a hospital he may need to connect or disconnect medical devices from the medical healthcare system frequently. Also, multiple entities (e.g., doctors, medical staff, etc.) need access to patient data and require distinct sets of patient data. As a result of the dynamic nature of medical devices, medical users require frequent access to data, which raises complex security concerns. Granting access to a whole set of data creates privacy issues. Also, each of these medical user need to grant access rights to a specific set of medical data, which is quite a tedious task. In order to provide role-based access to medical users, this study proposes a blockchain-based framework for authenticating multiple entities based on the trust domain to reduce the administrative burden. This study is further validated by simulation on the infura blockchain using solidity and Python. The results demonstrate that role-based authorization and multi-entities authentication have been implemented and the owner of medical data can control access rights at any time and grant medical users easy access to a set of data in a healthcare system. The system has minimal latency compared to existing blockchain systems that lack multi-entity authentication and role-based authorization.


Subject(s)
Blockchain , Computer Security , Humans , Internet of Things , Confidentiality , Telemedicine
2.
Indian J Pediatr ; 2024 Jan 11.
Article in English | MEDLINE | ID: mdl-38206546

ABSTRACT

OBJECTIVES: To assess the growth pattern of preterm, very low birth weight (VLBW) appropriate for gestational age (AGA) infants on three different feeding regimens. METHODS: This prospective open label three-arm parallel randomized controlled trial was conducted at neonatal intensive care unit, Kasturba Hospital, Manipal. One hundred twenty VLBW (weight between 1000-1500 g and gestational age 28-32 wk) preterm AGA infants admitted from April 2021 through September 2022 were included. Three feeding regimens were compared: Expressed breast milk (EBM); EBM supplemented with Human milk fortifier (HMF); EBM supplemented with Preterm formula feed (PTF). Primary outcome measure was assessing the growth parameters such as weight, length, head circumference on three different feeding regimens at birth 2, 3, 4, 5 and 6 wk/discharge. Secondary outcomes included incidence of co-morbidities and cost-effectiveness. RESULTS: Of 112 infants analyzed, Group 2 supplemented with HMF showed superior growth outcomes by 6th wk/discharge of intervention, with mean weight of 2053±251 g, mean length of 44.6±1.9 cm, and mean head circumference of 32.9±1.4 cm. However, infants in Group 3, supplemented with PTF, registered mean weight of 1968±203 g, mean length of 43.6±2.0 cm, and mean head circumference of 32.0±1.6 cm. Infants exclusively on EBM presented with mean weight of 1873±256 g, mean length of 43.0±2.0 cm and mean head circumference of 31.4±1.6 cm. CONCLUSIONS: Addition of 1 g of HMF to 25 ml of EBM in neonates weighing 1000-1500 g showed better weight gain and head circumference at 6 wk/discharge, which was statistically significant. However, no significant differences in these parameters were observed at postnatal or 2, 3, 4, and 5 wk.

3.
Sensors (Basel) ; 23(20)2023 Oct 23.
Article in English | MEDLINE | ID: mdl-37896735

ABSTRACT

Internet security is a major concern these days due to the increasing demand for information technology (IT)-based platforms and cloud computing. With its expansion, the Internet has been facing various types of attacks. Viruses, denial of service (DoS) attacks, distributed DoS (DDoS) attacks, code injection attacks, and spoofing are the most common types of attacks in the modern era. Due to the expansion of IT, the volume and severity of network attacks have been increasing lately. DoS and DDoS are the most frequently reported network traffic attacks. Traditional solutions such as intrusion detection systems and firewalls cannot detect complex DDoS and DoS attacks. With the integration of artificial intelligence-based machine learning and deep learning methods, several novel approaches have been presented for DoS and DDoS detection. In particular, deep learning models have played a crucial role in detecting DDoS attacks due to their exceptional performance. This study adopts deep learning models including recurrent neural network (RNN), long short-term memory (LSTM), and gradient recurrent unit (GRU) to detect DDoS attacks on the most recent dataset, CICDDoS2019, and a comparative analysis is conducted with the CICIDS2017 dataset. The comparative analysis contributes to the development of a competent and accurate method for detecting DDoS attacks with reduced execution time and complexity. The experimental results demonstrate that models perform equally well on the CICDDoS2019 dataset with an accuracy score of 0.99, but there is a difference in execution time, with GRU showing less execution time than those of RNN and LSTM.

4.
Sensors (Basel) ; 23(12)2023 Jun 06.
Article in English | MEDLINE | ID: mdl-37420546

ABSTRACT

Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor's algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The National Institute of Standards and Technology (NIST) has started looking for a post-quantum encryption algorithm that is resistant to the development of future quantum computers as a response to this security concern. The current focus is on standardizing asymmetric cryptography that should be impenetrable by a quantum computer. This has become increasingly important in recent years. Currently, the process of standardizing asymmetric cryptography is coming very close to being finished. This study evaluated the performance of two post-quantum cryptography (PQC) algorithms, both of which were selected as NIST fourth-round finalists. The research assessed the key generation, encapsulation, and decapsulation operations, providing insights into their efficiency and suitability for real-world applications. Further research and standardization efforts are required to enable secure and efficient post-quantum encryption. When selecting appropriate post-quantum encryption algorithms for specific applications, factors such as security levels, performance requirements, key sizes, and platform compatibility should be taken into account. This paper provides helpful insight for post-quantum cryptography researchers and practitioners, assisting in the decision-making process for selecting appropriate algorithms to protect confidential data in the age of quantum computing.


Subject(s)
Computer Security , Computing Methodologies , Quantum Theory , Algorithms , Computers
5.
Sensors (Basel) ; 23(12)2023 Jun 07.
Article in English | MEDLINE | ID: mdl-37420557

ABSTRACT

Traffic accidents present significant risks to human life, leading to a high number of fatalities and injuries. According to the World Health Organization's 2022 worldwide status report on road safety, there were 27,582 deaths linked to traffic-related events, including 4448 fatalities at the collision scenes. Drunk driving is one of the leading causes contributing to the rising count of deadly accidents. Current methods to assess driver alcohol consumption are vulnerable to network risks, such as data corruption, identity theft, and man-in-the-middle attacks. In addition, these systems are subject to security restrictions that have been largely overlooked in earlier research focused on driver information. This study intends to develop a platform that combines the Internet of Things (IoT) with blockchain technology in order to address these concerns and improve the security of user data. In this work, we present a device- and blockchain-based dashboard solution for a centralized police monitoring account. The equipment is responsible for determining the driver's impairment level by monitoring the driver's blood alcohol concentration (BAC) and the stability of the vehicle. At predetermined times, integrated blockchain transactions are executed, transmitting data straight to the central police account. This eliminates the need for a central server, ensuring the immutability of data and the existence of blockchain transactions that are independent of any central authority. Our system delivers scalability, compatibility, and faster execution times by adopting this approach. Through comparative research, we have identified a significant increase in the need for security measures in relevant scenarios, highlighting the importance of our suggested model.


Subject(s)
Blockchain , Driving Under the Influence , Internet of Things , Humans , Accidents, Traffic/prevention & control , Blood Alcohol Content
6.
Sensors (Basel) ; 23(11)2023 Jun 01.
Article in English | MEDLINE | ID: mdl-37299993

ABSTRACT

Internet of Things (IoT) has made significant strides in energy management systems recently. Due to the continually increasing cost of energy, supply-demand disparities, and rising carbon footprints, the need for smart homes for monitoring, managing, and conserving energy has increased. In IoT-based systems, device data are delivered to the network edge before being stored in the fog or cloud for further transactions. This raises worries about the data's security, privacy, and veracity. It is vital to monitor who accesses and updates this information to protect IoT end-users linked to IoT devices. Smart meters are installed in smart homes and are susceptible to numerous cyber attacks. Access to IoT devices and related data must be secured to prevent misuse and protect IoT users' privacy. The purpose of this research was to design a blockchain-based edge computing method for securing the smart home system, in conjunction with machine learning techniques, in order to construct a secure smart home system with energy usage prediction and user profiling. The research proposes a blockchain-based smart home system that can continuously monitor IoT-enabled smart home appliances such as smart microwaves, dishwashers, furnaces, and refrigerators, among others. An approach based on machine learning was utilized to train the auto-regressive integrated moving average (ARIMA) model for energy usage prediction, which is provided in the user's wallet, to estimate energy consumption and maintain user profiles. The model was tested using the moving average statistical model, the ARIMA model, and the deep-learning-based long short-term memory (LSTM) model on a dataset of smart-home-based energy usage under changing weather conditions. The findings of the analysis reveal that the LSTM model accurately forecasts the energy usage of smart homes.


Subject(s)
Blockchain , Internet of Things , Machine Learning , Memory, Long-Term , Microwaves
7.
PeerJ Comput Sci ; 7: e472, 2021.
Article in English | MEDLINE | ID: mdl-33954246

ABSTRACT

Online reviews regarding different products or services have become the main source to determine public opinions. Consequently, manufacturers and sellers are extremely concerned with customer reviews as these have a direct impact on their businesses. Unfortunately, to gain profit or fame, spam reviews are written to promote or demote targeted products or services. This practice is known as review spamming. In recent years, Spam Review Detection problem (SRD) has gained much attention from researchers, but still there is a need to identify review spammers who often work collaboratively to promote or demote targeted products. It can severely harm the review system. This work presents the Spammer Group Detection (SGD) method which identifies suspicious spammer groups based on the similarity of all reviewer's activities considering their review time and review ratings. After removing these identified spammer groups and spam reviews, the resulting non-spam reviews are displayed using diversification technique. For the diversification, this study proposed Diversified Set of Reviews (DSR) method which selects diversified set of top-k reviews having positive, negative, and neutral reviews/feedback covering all possible product features. Experimental evaluations are conducted on Roman Urdu and English real-world review datasets. The results show that the proposed methods outperformed the existing approaches when compared in terms of accuracy.

SELECTION OF CITATIONS
SEARCH DETAIL
...