Review Article
Security and Privacy in the Medical Internet of Things: A Review
Table 1
Security and privacy mechanisms and proposals for data encryption.
| Proposals | Technologies | Application | Details |
| [3] | Key management scheme | Resource-constrained nodes | Solving the issue of the limited resources available through strong encryption and authentication means | [4] | Lightweight private algorithm; DES | Data transmission | Strong encryption considering the characteristic of IoT | [5] | Cloud computing | Monitoring the elder’s biological data | Reducing the waste of medical resource | [6] | Authentication scheme | Mobile emergency medical systems | Guaranteeing the confidentiality of sensitive medical data |
|
|