Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 34
Filtrar
1.
PLoS One ; 19(4): e0302234, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38625889

RESUMO

It is challenging to detect arbitrary-shape text accurately and effectively in natural scenes. While many methods have been implemented for arbitrary-shape text detection, most cannot achieve real-time detection or meet practical needs. In this work, we propose a YOLOv6-based detector that can effectively implement arbitrary-shape text detection and achieve real-time detection. We include two additional branches in the neck part of the YOLOv6 network to adapt the network to text detection, and the output side uses the pixel aggregation (PA) algorithm to decouple the PA output to use it as the detection head of the model. Experiments on benchmark Total-Text, CTW1500, ICDAR2015, and MSRA-TD500 showed that the proposed method outperformed competing methods in terms of detection accuracy and running time. Specifically, our method achieved an F-measure of 84.1% at 291.8 FPS for 640 × 640 Total-Text images and an F-measure of 81.5% at 199.6 FPS for 896 × 896 ICDAR2015 incidental text images.


Assuntos
Algoritmos , Redes Neurais de Computação
2.
Kaohsiung J Med Sci ; 40(5): 467-476, 2024 May.
Artigo em Inglês | MEDLINE | ID: mdl-38523603

RESUMO

Combining epidermal growth factor receptor (EGFR) tyrosine kinase inhibitor (TKI) with an anti- vascular endothelial growth factor (VEGF) agent, bevacizumab or ramucirumab, is indicated for advanced lung adenocarcinoma harboring EGFR mutation. This study aimed to show the real-world data of combination therapy and compare the effectiveness between bevacizumab and ramucirumab in combination with an EGFR-TKI. This retrospective study enrolled 47 patients diagnosed of stage IV lung adenocarcinoma with exon 19 deletion or L858R point mutation, receiving a first-line EGFR-TKI with anti-VEGF agent, including 34 (72%) and 13 (28%) patients receiving bevacizumab and ramucirumab, respectively. The response rate was similar in both groups (p = 0.38). Patients receiving bevacizumab had similar progression free survival (PFS) as those receiving ramucirumab (median PFS: 21.9 vs. 24.2 months, p = 0.4871); similar finding was noted in overall survival (OS) (median OS: 33.5 months vs. not reached, p = 0.4618). Patients receiving ramucirumab experienced a significantly high-grade hypertension compared to those receiving bevacizumab (p = 0.0351). Multivariable Cox regression analysis found independent risk factors for worse PFS included poorer ECOG performance status, multiple (≥3) metastatic sites, brain metastasis, and pleural metastasis/effusion, while the type of anti-VEGF agent was not a risk factor. Pericardial metastasis/effusion was the only one independent risk factor for worse OS. In summary, ramucirumab may have similar effectiveness as bevacizumab in combination with an EGFR-TKI as first line therapy for advanced lung adenocarcinoma harboring susceptible EGFR mutation. Further large-scale registry-based cohort studies may be needed to validate our findings.


Assuntos
Anticorpos Monoclonais Humanizados , Bevacizumab , Carcinoma Pulmonar de Células não Pequenas , Receptores ErbB , Neoplasias Pulmonares , Mutação , Inibidores de Proteínas Quinases , Ramucirumab , Humanos , Masculino , Feminino , Receptores ErbB/genética , Receptores ErbB/antagonistas & inibidores , Bevacizumab/uso terapêutico , Bevacizumab/administração & dosagem , Anticorpos Monoclonais Humanizados/uso terapêutico , Pessoa de Meia-Idade , Idoso , Carcinoma Pulmonar de Células não Pequenas/tratamento farmacológico , Carcinoma Pulmonar de Células não Pequenas/genética , Carcinoma Pulmonar de Células não Pequenas/patologia , Neoplasias Pulmonares/tratamento farmacológico , Neoplasias Pulmonares/genética , Neoplasias Pulmonares/patologia , Inibidores de Proteínas Quinases/uso terapêutico , Protocolos de Quimioterapia Combinada Antineoplásica/uso terapêutico , Resultado do Tratamento , Adulto , Estudos Retrospectivos , Idoso de 80 Anos ou mais , Estadiamento de Neoplasias , Adenocarcinoma de Pulmão/tratamento farmacológico , Adenocarcinoma de Pulmão/genética , Adenocarcinoma de Pulmão/patologia
3.
Network ; : 1-29, 2024 Mar 03.
Artigo em Inglês | MEDLINE | ID: mdl-38433470

RESUMO

As the number of patients increases, physicians are dealing with more and more cases of degenerative spine pathologies on a daily basis. To reduce the workload of healthcare professionals, we propose a modified Swin-UNet network model. Firstly, the Swin Transformer Blocks are improved using a residual post-normalization and scaling cosine attention mechanism, which makes the training process of the model more stable and improves the accuracy. Secondly, we use the log-space continuous position biasing method instead of the bicubic interpolation position biasing method. This method solves the problem of performance loss caused by the large difference between the resolution of the pretraining image and the resolution of the spine image. Finally, we introduce a segmentation smooth module (SSM) at the decoder stage. The SSM effectively reduces redundancy, and enhances the segmentation edge processing to improve the model's segmentation accuracy. To validate the proposed method, we conducted experiments on a real dataset provided by hospitals. The average segmentation accuracy is no less than 95%. The experimental results demonstrate the superiority of the proposed method over the original model and other models of the same type in segmenting the spinous processes of the vertebrae and the posterior arch of the spine.

4.
Sensors (Basel) ; 23(23)2023 Dec 02.
Artigo em Inglês | MEDLINE | ID: mdl-38067952

RESUMO

Due to frequent traffic accidents around the world, people often take out car insurance to mitigate their losses and receive compensation in a traffic accident. However, in the existing car insurance claims process, there are problems such as insurance fraud, inability to effectively track and transmit insurance data, cumbersome insurance procedures, and high insurance data storage costs. Since the immutability and traceability features of blockchain technology can prevent data manipulation and trace past data, we have used the Elliptic Curve Digital Signature Algorithm (ECDSA) to sign and encrypt car insurance data, ensuring both data integrity and security. We propose a blockchain and IPFS-based anticounterfeiting and traceable car insurance claims system to improve the above problems. We incorporate the Interplanetary File System (IPFS) to reduce the cost of storing insurance data. This study also attempts to propose an arbitration mechanism in the event of a car insurance dispute.

5.
Sensors (Basel) ; 23(13)2023 Jul 04.
Artigo em Inglês | MEDLINE | ID: mdl-37447987

RESUMO

Distributed Denial of Service (DDoS) attacks pose a significant threat to internet and cloud security. Our study utilizes a Poisson distribution model to efficiently detect DDoS attacks with a computational complexity of O(n). Unlike Machine Learning (ML)-based algorithms, our method only needs to set up one or more Poisson models for legitimate traffic based on the granularity of the time periods during preprocessing, thus eliminating the need for training time. We validate this approach with four virtual machines on the CDX 3.0 platform, each simulating different aspects of DDoS attacks for offensive, monitoring, and defense evaluation purposes. The study further analyzes seven diverse DDoS attack methods. When compared with existing methods, our approach demonstrates superior performance, highlighting its potential effectiveness in real-world DDoS attack detection.


Assuntos
Algoritmos , Internet , Aprendizado de Máquina
6.
J Oncol Pharm Pract ; 29(6): 1374-1380, 2023 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-36112905

RESUMO

BACKGROUND: Painful paronychia and pseudopyogenic granuloma (PG) are common adverse drug reactions (ADRs) associated with the use of epidermal growth factor receptor tyrosine kinase inhibitors (EGFR-TKIs) to treat non-small cell lung cancer (NSCLC). Multiple local management approaches have been tested with unsatisfactory results. We have introduced an occlusion therapy technique through which available topical drugs for longer than 2 years. METHODS: Based on the cancer registry and case management system of our hospital, from July 2019 to July 2020, we retrospectively enrolled patients with NSCLC who were treated with EGFR-TKIs and received applications of 0.5% timolol ophthalmic solution (TIMOPTOL XE 0.5%®) combined with a neomycin/tyrothricin ointment (Biomycin®) using the occlusion method to treat paronychia or PG. RESULTS: A total of 22 patients were enrolled, with a mean age of 66.5 years, most of whom were women (72.7%). Periungual lesion-related pain was reported by all patients, and periungual bleeding and PG were reported in 14% (3/22) and 64% (14/22) of patients, respectively. After the occlusion therapy application of timolol ophthalmic solution combined with neomycin/tyrothricin ointment twice daily, the overall response rate was 83.3%, including complete response in 18% (4/22) of cases and partial response in 68% (15/22) of cases. CONCLUSION: We presented an occlusion method using available topical beta-blockers and antibiotic ointment for EGFR-TKI-induced paronychia and PG in Taiwan. The result is favorable. Further randomized control trial is urgent to validate our findings.


Assuntos
Hiperplasia Angiolinfoide com Eosinofilia , Carcinoma Pulmonar de Células não Pequenas , Neoplasias Pulmonares , Paroniquia , Humanos , Feminino , Idoso , Masculino , Carcinoma Pulmonar de Células não Pequenas/tratamento farmacológico , Neoplasias Pulmonares/tratamento farmacológico , Timolol/efeitos adversos , Hiperplasia Angiolinfoide com Eosinofilia/induzido quimicamente , Hiperplasia Angiolinfoide com Eosinofilia/tratamento farmacológico , Estudos Retrospectivos , Antibacterianos/efeitos adversos , Paroniquia/induzido quimicamente , Paroniquia/tratamento farmacológico , Pomadas/efeitos adversos , Taiwan , Inibidores de Proteínas Quinases/efeitos adversos , Neomicina/efeitos adversos , Receptores ErbB , Tirotricina/efeitos adversos , Soluções Oftálmicas/efeitos adversos , Mutação
7.
Sensors (Basel) ; 22(24)2022 Dec 10.
Artigo em Inglês | MEDLINE | ID: mdl-36560039

RESUMO

Everyone should be vaccinated, but the eligibility and safety of the vaccine are always overlooked by most people. The outbreak of COVID-19 has led many countries to intensify the development and production of the COVID-19 vaccine. and some countries have even required universal vaccination against this epidemic. However, such popularization of vaccination has also exposed various flaws in vaccine management that existed in the past, and vaccinators have become more concerned about the effectiveness of their vaccinations. In this paper, we propose a blockchain-based traceable vaccine management system. First, the system uses smart contracts to store the records generated during the whole process, from vaccine production to vaccination. Second, the proposed scheme uses the Edwards-curve digital signature algorithm (EdDSA) to guarantee the security and integrity of these data. Third, the system participants can access the corresponding data according to their authority to ensure the transparency of the whole system operation process. Finally, this paper will also conduct a security analysis of the whole system to ensure that the system can resist potential attacks by criminals.


Assuntos
COVID-19 , Vacinas , Humanos , Vacinas contra COVID-19 , COVID-19/prevenção & controle , Vacinação , Algoritmos
8.
Sensors (Basel) ; 22(23)2022 Dec 06.
Artigo em Inglês | MEDLINE | ID: mdl-36502237

RESUMO

In recent years, due to the rapid development of Internet of things (IoTs), various physical things (objects) in IoTs are smart enough to make their own decisions without the involvement of humans. The smart devices embedded in a drone can sense, collect, and transmit real-time data back to the controller from a designated environment via wireless communication technologies. The mobility, flexibility, reliability and energy efficiency of drones makes them more widely used in IoT environments such as commercial, military, entertainment applications, traffic surveillance and aerial photography. In a generalized IoD architecture, we have communications among the drones in a flying zone, among the drones and the control server, and also among the drones and authorized user. IoD still has many critical issues that need to be addressed, such as data access being carried out through a public channel and battery operated drones. To address these concerns in IoD communications, in this paper, an efficient authentication and secure communication scheme with privacy preservation is proposed and it only uses secure one-way hash function and bitwise XOR operations when control server, drone and user mutually authenticate each other. After the successful authentication, both IoD-based participants can agree on a common session key to secure the subsequent communication messages. The widely accepted ProVerif and BAN logic analysis have been used to assure that the proposed scheme is provably secure against existing well-known security attacks and ensures privacy. Finally, a comparative analysis is presented to demonstrate the proposed scheme preserves efficiency when compared to existing competitive schemes.


Assuntos
Segurança Computacional , Privacidade , Humanos , Reprodutibilidade dos Testes , Tecnologia sem Fio , Comunicação
9.
Healthcare (Basel) ; 10(10)2022 Sep 22.
Artigo em Inglês | MEDLINE | ID: mdl-36292287

RESUMO

Electronic medical records (EMRs) are extremely private data in the medical industry. Clinicians use the patient data that the EMR stores to quickly assess a patient's status and save diagnostic information. In the conventional medical model, it is easy for duplicate exams, medical resource waste, or the loss of medical records to happen when a patient is transferred between several medical facilities due to problems with data sharing and exchange, inadequate data privacy, security, confidentiality, and difficulties with data traceability. This paper recommends a Hyperledger Fabric-based strategy to promote the exchange of EMR models. With the use of Hyperledger Fabric, EMR stakeholders can be brought into the channel to facilitate data sharing. Attribute-based access control (ABAC) allows users to design the data access control policy, and the data access control may improve security. Any record stored in the blockchain can be viewed using the Hyperledger Fabric feature and it cannot be altered or destroyed, ensuring data traceability. Through proxy re-encryption, which makes sure that the data is not leaked during data exchange, data secrecy can be ensured. A module for medical tokens has now been added. Many foreign medical institutions currently use the medical token system, and the system described in this paper can use the tokens to pay for some medical expenses. The tokens are obtained by the patient's initiative to share their EMR with the medical institution for research, which is how many foreign medical institutions currently use the medical token mechanism. This paradigm can encourage the growth of medical data by enabling stakeholders to collaborate and share EMR trust.

10.
Front Public Health ; 10: 888741, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36117608

RESUMO

Mental and emotional issues are the top-level concerns of public health worldwide. These issues surged during Coronavirus (COVID-19) pandemic due to varied medical, social, and personal reasons. The social determinants highlighted in the literature mainly focus on household solutions rather than on increasing the financial wellbeing of individuals, especially for the most vulnerable groups where the psychological distress coming from the social inequalities cannot be entirely treated. Hence, this study attempts to familiarize the financial capability (the financial literacy, attitude, skills and behavior required for effective financial management) construct into public health domain in the times of COVID-19 as a determinant of psychological distress, and also explores the role of gender in it. The study uses Ordinary Least Square (OLS) regression analysis and employs mental distress questions and Organization for Economic Cooperation and Development (OECD) 2018 financial capability toolkit to collect data from a large sample of households from all over Pakistan. It is inferred that the higher the financial capability, the lower the financial and mental distress during COVID-19. Additionally, females are less financially knowledgeable, depict poor financial behaviors, and face more psychological issues than their counterparts. Age and education are also linked to mental stress during COVID-19. Finally, gender plays a moderating role in financial behavior, and financial and mental stress of households. As evident, COVID-19 is not going away soon hence the findings are relevant for policymakers to proactively plan for the pandemic's upcoming waves and help people be better financially equipped to fight against this or any upcoming crisis, and achieve better mental and physical health.


Assuntos
COVID-19 , Angústia Psicológica , COVID-19/epidemiologia , Países em Desenvolvimento , Feminino , Humanos , Fatores Socioeconômicos , Estresse Psicológico/epidemiologia , Estresse Psicológico/psicologia
11.
Sensors (Basel) ; 22(18)2022 Sep 07.
Artigo em Inglês | MEDLINE | ID: mdl-36146106

RESUMO

As society advances, so does the total number of vehicles on the road, creating a massive consumer market for automobiles. According to statistics, a major portion of today's traffic difficulties are caused by accidents caused by subpar cars and auto parts. As a result, each country has, over time, enacted equivalent rules and regulations to prevent such tragedies. However, in the face of profit, some people are desperate enough to employ illegal parts and illegally modified cars, and auto fraud is rampant. As a result, we employ the blockchain of the symmetrical Blockchain's digital ledger and smart contract technology to build a decentralized supply chain system that can identify specific parts. In this study, we design and discuss the proposed system framework by user functions and the flow of parts based on blockchain, and we discuss communication protocols that use the symmetry and asymmetry cryptography, algorithms, properties, and security of the mechanism while providing related analysis and comparing the properties and costs of the system with other studies. Overall, the proposed method has the potential to successfully address the issue of automobile fraud.


Assuntos
Blockchain , Algoritmos , Humanos , Projetos de Pesquisa
12.
Sensors (Basel) ; 22(14)2022 Jul 10.
Artigo em Inglês | MEDLINE | ID: mdl-35890848

RESUMO

Smart devices have become an essential part of the architectures such as the Internet of Things (IoT), Cyber-Physical Systems (CPSs), and Internet of Everything (IoE). In contrast, these architectures constitute a system to realize the concept of smart cities and, ultimately, a smart planet. The adoption of these smart devices expands to different cyber-physical systems in smart city architecture, i.e., smart houses, smart healthcare, smart transportation, smart grid, smart agriculture, etc. The edge of the network connects these smart devices (sensors, aggregators, and actuators) that can operate in the physical environment and collects the data, which is further used to make an informed decision through actuation. Here, the security of these devices is immensely important, specifically from an authentication standpoint, as in the case of unauthenticated/malicious assets, the whole infrastructure would be at stake. We provide an updated review of authentication mechanisms by categorizing centralized and distributed architectures. We discuss the security issues regarding the authentication of these IoT-enabled smart devices. We evaluate and analyze the study of the proposed literature schemes that pose authentication challenges in terms of computational costs, communication overheads, and models applied to attain robustness. Hence, lightweight solutions in managing, maintaining, processing, and storing authentication data of IoT-enabled assets are an urgent need. From an integration perspective, cloud computing has provided strong support. In contrast, decentralized ledger technology, i.e., blockchain, light-weight cryptosystems, and Artificial Intelligence (AI)-based solutions, are the areas with much more to explore. Finally, we discuss the future research challenges, which will eventually help address the ambiguities for improvement.


Assuntos
Blockchain , Internet das Coisas , Inteligência Artificial , Cidades , Segurança Computacional
13.
J Clin Med ; 11(12)2022 Jun 12.
Artigo em Inglês | MEDLINE | ID: mdl-35743437

RESUMO

Patients with advanced non-small cell lung cancer (NSCLC) who harbor susceptible epidermal growth factor receptor (EGFR) mutations and are treated with EGFR tyrosine kinase inhibitors (TKIs) show longer progression-free survival (PFS) than those treated with chemotherapy. However, developed EGFR-TKI resistance limits PFS improvements. Currently, combination treatment with EGFR-TKIs and anti-angiogenic agents is considered a beneficial regimen for advanced-stage NSCLC harboring susceptible EGFR mutations. However, several trials reported osimertinib plus bevacizumab failed to show superior efficacy over osimertinib alone. However, subgroup analysis showed significantly longer PFS among patients with a history of smoking over those who never smoked. We performed a comprehensive systematic review and meta-analysis to evaluate the smoking status impact. At the end of the process, a total of 2068 patients from 11 randomized controlled trials (RCTs) were included in our meta-analysis. Overall, combination EGFR-TKI plus anti-angiogenic agent treatment showed significantly better PFS among patients with a smoking history (Hazard Ratio (HR) = 0.59, 95% confidence interval (CI) = 0.48-0.73). Erlotinib-based combination therapy showed positive PFS benefits regardless of smoking status (HR = 0.54, 95%CI = 0.41-0.71 for ever smoker, HR = 0.69, 95%CI = 0.54-0.87 for never smoker). Combination therapy prolonged PFS significantly regardless of ethnicity (HR: 0.64, 95% CI: 0.44-0.93 for Asian RCTs, HR: 0.55, 95% CI: 0.41-0.74 for global and non-Asian RCTs). PROSPERO registration number is CRD42022304198).

14.
Sensors (Basel) ; 22(12)2022 Jun 13.
Artigo em Inglês | MEDLINE | ID: mdl-35746256

RESUMO

Wireless Underground Sensor Networks (WUSNs) have been showing prospective supervising application domains in the underground region of the earth through sensing, computation, and communication. This paper presents a novel Deep Learning (DL)-based Cooperative communication channel model for Wireless Underground Sensor Networks for accurate and reliable monitoring in hostile underground locations. Furthermore, the proposed communication model aims at the effective utilization of cluster-based Cooperative models through the relay nodes. However, by keeping the cost effectiveness, reliability, and user-friendliness of wireless underground sensor networks through inter-cluster Cooperative transmission between two cluster heads, the determination of the overall energy performance is also measured. The energy co-operative channel allocation routing (ECCAR), Energy Hierarchical Optimistic Routing (EHOR), Non-Cooperative, and Dynamic Energy Routing (DER) methods were used to figure out how well the proposed WUSN works. The Quality of Service (QoS) parameters such as transmission time, throughput, packet loss, and efficiency were used in order to evaluate the performance of the proposed WUSNs. From the simulation results, it is apparently seen that the proposed system demonstrates some superiority over other methods in terms of its better energy utilization of 89.71%, Packet Delivery ratio of 78.2%, Average Packet Delay of 82.3%, Average Network overhead of 77.4%, data packet throughput of 83.5% and an average system packet loss of 91%.


Assuntos
Redes de Comunicação de Computadores , Aprendizado Profundo , Algoritmos , Comunicação , Estudos Prospectivos , Reprodutibilidade dos Testes , Tecnologia sem Fio
15.
Front Oncol ; 12: 873268, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35719987

RESUMO

Magnetic resonance imaging is the most generally utilized imaging methodology that permits radiologists to look inside the cerebrum using radio waves and magnets for tumor identification. However, it is tedious and complex to identify the tumorous and nontumorous regions due to the complexity in the tumorous region. Therefore, reliable and automatic segmentation and prediction are necessary for the segmentation of brain tumors. This paper proposes a reliable and efficient neural network variant, i.e., an attention-based convolutional neural network for brain tumor segmentation. Specifically, an encoder part of the UNET is a pre-trained VGG19 network followed by the adjacent decoder parts with an attention gate for segmentation noise induction and a denoising mechanism for avoiding overfitting. The dataset we are using for segmentation is BRATS'20, which comprises four different MRI modalities and one target mask file. The abovementioned algorithm resulted in a dice similarity coefficient of 0.83, 0.86, and 0.90 for enhancing, core, and whole tumors, respectively.

16.
Front Public Health ; 10: 909628, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35677767

RESUMO

The production, testing, and processing of signals without any interpretation is a crucial task with time scale periods in today's biological applications. As a result, the proposed work attempts to use a deep learning model to handle difficulties that arise during the processing stage of biomedical information. Deep Conviction Systems (DCS) are employed at the integration step for this procedure, which uses classification processes with a large number of characteristics. In addition, a novel system model for analyzing the behavior of biomedical signals has been developed, complete with an output tracking mechanism that delivers transceiver results in a low-power implementation approach. Because low-power transceivers are integrated, the cost of implementation for designated output units will be decreased. To prove the effectiveness of DCS feasibility, convergence and robustness characteristics are observed by incorporating an interface system that is processed with a deep learning toolbox. They compared test results using DCS to prove that all experimental scenarios prove to be much more effective for about 79 percent for variations with time periods.

17.
J Healthc Eng ; 2022: 2211065, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35310180

RESUMO

Blockchain technology is essentially a decentralized database maintained by relevant parties and has been widely used in various scenarios such as logistics and finance. In terms of applications in the medical field, it is becoming more and more important because the patient's symptoms may be related to a certain vaccine. Whether the patient has been vaccinated with this vaccine will lead to different diagnostic results by the doctor. However, in the current vaccination environment of many regions, the vaccination record (VR) can only be kept in the patient's vaccination booklet, which is easy to lose or destroy. Therefore, the doctor needs to retrieve the patient's VR through a centralized database maintained by the government, which is time-consuming and will increase the medical risk. This study proposes a traceable blockchain-based vaccination record storage and sharing system. In the proposed system, the patient gets the vaccination at any legal clinic and the VR can be saved accompanied by the signature into the blockchain center, which ensures traceability. When the patient visits the hospital for treatment, the doctor can obtain the detail of the VR from the blockchain center and then make a diagnosis. The security of the proposed system will be protected by the programmed smart contracts. Through mutual authentication, our system can also provide and guarantee data integrity and nonrepudiation. Moreover, the proposed system has resistance to replay and man-in-the-middle attacks, and the performance is good.


Assuntos
Blockchain , Gerenciamento de Dados , Registros Eletrônicos de Saúde , Humanos , Tecnologia , Vacinação
18.
Sensors (Basel) ; 22(3)2022 Jan 29.
Artigo em Inglês | MEDLINE | ID: mdl-35161818

RESUMO

WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it's vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs' success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The lack of a clear and unified study in terms of signcryption solutions can offer a bird's eye view of WBANs. Based on the most recent signcryption papers, we analyzed WBAN's communication architecture, security requirements, and the primary problems in WBANs to meet the aforementioned objectives. This survey also includes the most up to date signcryption security techniques in WBANs environments. By identifying and comparing all available signcryption techniques in the WBANs sector, the study will aid the academic community in understanding security problems and causes. The goal of this survey is to provide a comparative review of the existing signcryption security solutions and to analyze the previously indicated solution given for WBANs. A multi-criteria decision-making approach is used for a comparative examination of the existing signcryption solutions. Furthermore, the survey also highlights some of the public research issues that researchers must face to develop the security features of WBANs.


Assuntos
Segurança Computacional , Tecnologia sem Fio , Algoritmos , Confidencialidade , Humanos
19.
Sensors (Basel) ; 22(3)2022 Feb 02.
Artigo em Inglês | MEDLINE | ID: mdl-35161893

RESUMO

Internet of Things (IoT) technology is now widely used in energy, healthcare, services, transportation, and other fields. With the increase in industrial equipment (e.g., smart mobile terminals, sensors, and other embedded devices) in the Internet of Things and the advent of Industry 4.0, there has been an explosion of data generated that is characterized by a high volume but small size. How to manage and protect sensitive private data in data sharing has become an urgent issue for enterprises. Traditional data sharing and storage relies on trusted third-party platforms or distributed cloud storage, but these approaches run the risk of single-node failure, and third parties and cloud storage providers can be vulnerable to attacks that can lead to data theft. To solve these problems, this paper proposes a Hyperledger Fabric blockchain-based secure data transfer scheme for enterprises in the Industrial Internet of Things (IIOT). We store raw data in the IIoT in the InterPlanetary File System (IPFS) network after encryption and store the Keyword-index table we designed in Hyperledger Fabric blockchain, and enterprises share the data by querying the Keyword-index table. We use Fabric's channel mechanism combined with our designed Chaincode to achieve privacy protection and efficient data transmission while using the Elliptic Curve Digital Signature Algorithm (ECDSA) to ensure data integrity. Finally, we performed security analysis and experiments on the proposed scheme, and the results show that overall the data transfer performance in the IPFS network is generally better than the traditional network, In the case of transferring 5 MB file size data, the transmission speed and latency of IPFS are 19.23 mb/s and 0.26 s, respectively, and the IPFS network is almost 4 times faster than the TCP/IP network while taking only a quarter of the time, which is more advantageous when transferring small files, such as data in the IIOT. In addition, our scheme outperforms the blockchain systems mainly used today in terms of both throughput, latency, and system overhead. The average throughput of our solution can reach 110 tps (transactions are executed per second), and the minimum throughput in experimental tests can reach 101 tps.

20.
Sensors (Basel) ; 22(2)2022 Jan 11.
Artigo em Inglês | MEDLINE | ID: mdl-35062490

RESUMO

Internet of Things (IoT) device security is one of the crucial topics in the field of information security. IoT devices are often protected securely through firmware update. Traditional update methods have their shortcomings, such as bandwidth limitation and being attackers' easy targets. Although many scholars proposed a variety of methods that are based on the blockchain technology to update the firmware, there are still demerits existing in their schemes, including large storage space and centralized stored firmware. In summary, this research proposes a highly secure and efficient protection mechanism that is based on the blockchain technology to improve the above disadvantages. Therefore, this study can reduce the need of storage space and improve system security. The proposed system has good performance in some events, including firmware integrity, security of IoT device connection, system security, and device anonymity. Furthermore, we confirm the high security and practical feasibility of the proposed system by comparing with the existing methods.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...