{"id":"https://openalex.org/W4391947113","doi":"https://doi.org/10.1109/ocit59427.2023.10430808","title":"PMsec 2.0: A Security-By-Design Solution for Doctor\u2019s Dilemma Problem in Smart Healthcare","display_name":"PMsec 2.0: A Security-By-Design Solution for Doctor\u2019s Dilemma Problem in Smart Healthcare","publication_year":2023,"publication_date":"2023-12-13","ids":{"openalex":"https://openalex.org/W4391947113","doi":"https://doi.org/10.1109/ocit59427.2023.10430808"},"language":"en","primary_location":{"id":"doi:10.1109/ocit59427.2023.10430808","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ocit59427.2023.10430808","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 OITS International Conference on Information Technology (OCIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036912928","display_name":"Venkata K. V. V. Bathalapalli","orcid":"https://orcid.org/0000-0002-4487-3239"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Venkata K. V. V. Bathalapalli","raw_affiliation_strings":["University of North Texas,Dept. of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Dept. of Computer Science and Engineering","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070359867","display_name":"Saraju P. Mohanty","orcid":"https://orcid.org/0000-0003-2959-6541"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saraju P. Mohanty","raw_affiliation_strings":["University of North Texas,Dept. of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Dept. of Computer Science and Engineering","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062843590","display_name":"Elias Kougianos","orcid":"https://orcid.org/0000-0002-1616-7628"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elias Kougianos","raw_affiliation_strings":["University of North Texas,Electrical Engineering"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Electrical Engineering","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022570209","display_name":"Vasanth Iyer","orcid":"https://orcid.org/0000-0002-1909-4276"},"institutions":[{"id":"https://openalex.org/I152158401","display_name":"Grambling State University","ror":"https://ror.org/05mnb6484","country_code":"US","type":"education","lineage":["https://openalex.org/I152158401","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vasanth Iyer","raw_affiliation_strings":["Grambling State University,Computer Science and Digital Technologies"],"affiliations":[{"raw_affiliation_string":"Grambling State University,Computer Science and Digital Technologies","institution_ids":["https://openalex.org/I152158401"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087626448","display_name":"Bibhudutta Rout","orcid":"https://orcid.org/0000-0002-7748-1469"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bibhudutta Rout","raw_affiliation_strings":["University of North Texas,Dept. of Physics"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Dept. of Physics","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036912928"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":0.4018,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64613338,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"456","last_page":"461"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dilemma","display_name":"Dilemma","score":0.7791485786437988},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6280191540718079},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.5334418416023254},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48287275433540344},{"id":"https://openalex.org/keywords/security-dilemma","display_name":"Security dilemma","score":0.44364938139915466},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10305216908454895},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.07956638932228088}],"concepts":[{"id":"https://openalex.org/C2778496695","wikidata":"https://www.wikidata.org/wiki/Q254128","display_name":"Dilemma","level":2,"score":0.7791485786437988},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6280191540718079},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.5334418416023254},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48287275433540344},{"id":"https://openalex.org/C2776836860","wikidata":"https://www.wikidata.org/wiki/Q1543816","display_name":"Security dilemma","level":3,"score":0.44364938139915466},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10305216908454895},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.07956638932228088},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C191935318","wikidata":"https://www.wikidata.org/wiki/Q148","display_name":"China","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ocit59427.2023.10430808","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ocit59427.2023.10430808","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 OITS International Conference on Information Technology (OCIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2110871041","https://openalex.org/W2440225569","https://openalex.org/W2943373652","https://openalex.org/W2955419213","https://openalex.org/W3003319262","https://openalex.org/W3007203290","https://openalex.org/W3043269923","https://openalex.org/W3047315862","https://openalex.org/W3201909053","https://openalex.org/W4283157020","https://openalex.org/W4285199751","https://openalex.org/W4285205233","https://openalex.org/W4289929633","https://openalex.org/W4296340037","https://openalex.org/W4297539907","https://openalex.org/W4319778214","https://openalex.org/W4378800985"],"related_works":["https://openalex.org/W2388835557","https://openalex.org/W2366631176","https://openalex.org/W4317178495","https://openalex.org/W2368256804","https://openalex.org/W2898927220","https://openalex.org/W2471800291","https://openalex.org/W1995445082","https://openalex.org/W2802948878","https://openalex.org/W4230800277","https://openalex.org/W4238005926"],"abstract_inverted_index":{"The":[0,105,129],"rapid":[1],"adoption":[2,18],"of":[3,19,30,40],"Internet-of-Medical-Things":[4,20],"(IoMT)":[5,21],"has":[6,52,62,133],"revolutionized":[7],"e-health":[8],"systems,":[9],"particularly":[10,72],"in":[11,22,73],"remote":[12],"patient":[13,49],"monitoring.":[14],"With":[15],"the":[16,28,36,54,113],"growing":[17],"delivering":[23],"technologically":[24],"advanced":[25],"health":[26],"services,":[27],"security":[29,37,59,82],"Medtronic":[31],"devices":[32,44,118],"is":[33],"pivotal":[34],"as":[35],"and":[38,83,126,145],"privacy":[39],"data":[41],"from":[42],"these":[43],"are":[45],"directly":[46],"related":[47],"to":[48,86,102,122],"safety.":[50],"PUF":[51,97,121],"been":[53,63,134],"most":[55],"widely":[56],"adopted":[57],"hardware":[58],"primitive":[60],"which":[61],"successfully":[64],"integrated":[65],"with":[66],"various":[67],"Internet-of-Things":[68],"(IoT)":[69],"based":[70,143],"applications,":[71],"smart":[74],"healthcare":[75],"for":[76,98],"facilitating":[77,99],"device":[78],"security.":[79],"To":[80],"facilitate":[81],"access":[84,101],"control":[85],"IoMT":[87,103],"devices,":[88],"this":[89],"work":[90],"proposes":[91],"a":[92,141,146],"novel":[93],"cybersecurity":[94,131],"solution":[95,132],"using":[96,137],"global":[100],"devices.":[104],"proposed":[106,130],"framework":[107],"presents":[108],"an":[109],"approach":[110],"that":[111],"enables":[112],"patient\u2019s":[114],"body":[115],"area":[116],"network":[117],"supported":[119],"by":[120],"be":[123],"securely":[124],"accessible":[125],"controllable":[127],"globally.":[128],"experimentally":[135],"validated":[136],"state-of-the-art":[138],"SRAM":[139],"PUF,":[140,144],"delay":[142],"trusted":[147],"platform":[148],"module":[149],"(TPM)":[150],"primitive.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
