References
[1]. Cano, M. D., & Cañavate-Sanchez, A. (2020).
Preserving data privacy in the internet of medical things
using dual signature ECDSA. Security and Communication
Networks, 2020. https://doi.org/10.1155/2020/4960964
[2]. Elhoseny, M., Thilakarathne, N. N., Alghamdi, M. I.,
Mahendran, R. K., Gardezi, A. A., Weerasinghe, H., &
Welhenge, A. (2021). Security and privacy issues in
medical internet of things: Overview, countermeasures,
challenges and future directions. Sustainability, 13(21),
11645. https://doi.org/10.3390/su132111645
[3]. Goy, A., Nishtar, S., & Dzau, V. J. (2019). Health and
Healthcare in the Fourth Industrial Revolution: Global
Future Council on the Future of Health and Healthcare
2016-2018. World Economic Forum, 1-45.
[4]. Khadidos, A. O., Shitharth, S., Khadidos, A. O.,
Sangeetha, K., & Alyoubi, K. H. (2022). Healthcare data
security using IoT sensors based on random hashing
mechanism. Journal of Sensors, 2022. https://doi.org/10.1155/2022/8457116
[5]. Nagy, J., Oláh, J., Erdei, E., Máté, D., & Popp, J.
(2018). The role and impact of Industry 4.0 and the
internet of things on the business strategy of the value
chain-The case of Hungary. Sustainability, 10(10), 3491.
https://doi.org/10.3390/su10103491
[6]. Paul, S., Riffat, M., Yasir, A., Mahim, M. N., Sharnali, B.
Y., Naheen, I. T., & Kulkarni, A. (2021). Industry 4.0
applications for medical/healthcare services. Journal of
Sensor and Actuator Networks, 10(3), 1-32. https://doi.org/10.3390/jsan10030043
[7]. Popov, V. V., Kudryavtseva, E. V., Kumar Katiyar, N.,
Shishkin, A., Stepanov, S. I., & Goel, S. (2022). Industry 4.0
and digitalisation in healthcare. Materials, 15(6), 2140.
https://doi.org/10.3390/ma15062140
[8]. Pradhan, B., Bhattacharyya, S., & Pal, K. (2021). IoT-based
applications in healthcare devices. Journal of
Healthcare Engineering, 2021. https://doi.org/10.1155/2021/6632599
[9]. Rehman, A., Abbas, S., Khan, M. A., Ghazal, T. M.,
Adnan, K. M., & Mosavi, A. (2022). A secure healthcare
5.0 system based on blockchain technology entangled
with federated learning technique. Computers in Biology
and Medicine, 150, 106019. https://doi.org/10.1016/j.compbiomed.2022.106019
[10]. Salih, F. I., Bakar, N. A. A., Hassan, N. H., Yahya, F.,
Kama, N., & Shah, J. (2019). IoT security risk management model for healthcare industry. Malaysian Journal of
Computer Science, 131-144. https://doi.org/10.22452/mjcs.sp2019no3.9
[11]. Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K.,
Agrawal, A., Kumar, R., & Ahmad Khan, R. (2020).
Healthcare data breaches: Insights and implications.
Healthcare, 8(2), 1-18. https://doi.org/10.3390/healthcare8020133