References
- SIMSEK, Meryem, AIJAZ, Adnan, DOHLER, Mischa, et al. 5Genabled tactile internet. IEEE Journal on Selected Areas in Communications, 2016, vol. 34, no 3, p. 460-473 https://doi.org/10.1109/JSAC.2016.2525398
- Fettweis, Gerhard P. "The tactile internet: Applications and challenges." IEEE Vehicular Technology Magazine 9.1 (2014): 64-70. https://doi.org/10.1109/MVT.2013.2295069
- TANWAR, Sudeep, TYAGI, Sudhanshu, BUDHIRAJA, Ishan, et al. Tactile Internet for autonomous vehicles: Latency and reliability analysis. IEEE Wireless Communications, 2019, vol. 26, no 4, p. 66-72 https://doi.org/10.1109/mwc.2019.1800553
- MESHRAM, Dewanand A. et PATIL, Dipti D. 5G enabled tactile internet for tele-robotic surgery. Procedia Computer Science, 2020, vol. 171, p. 2618-2625. https://doi.org/10.1016/j.procs.2020.04.284
- WAZID, Mohammad, DAS, Ashok Kumar, et LEE, Jong-Hyouk. User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions. Pervasive and Mobile Computing, 2019, vol. 54, p. 71-85. https://doi.org/10.1016/j.pmcj.2019.02.004
- FETTWEIS, Gerhard P. et BOCHE, Holger. 6G: the personal tactile internet-and open questions for information theory. IEEE BITS the Information Theory Magazine, 2021, vol. 1, no 1, p. 71-82. https://doi.org/10.1109/MBITS.2021.3118662
- Wu, F., Li, X., Sangaiah, A. K., Xu, L., Kumari, S., Wu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727-737. https://doi.org/10.1016/j.future.2017.08.042
- DAS, Ashok Kumar, SUTRALA, Anil Kumar, ODELU, Vanga, et al. A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Personal Communications, 2017, vol. 94, no 3, p. 1899-1933. https://doi.org/10.1007/s11277-016-3718-6
- HIDAR, Tarik, ABOU EL KALAM, Anas, et BENHADOU, Siham. Ensuring the Security and Performances in Tactile Internet using Physical Unclonable Functions. In : 2019 4th World Conference on Complex Systems (WCCS). IEEE, 2019. p. 1-6.
- HIDAR, Tarik, ABOU EL KALAM, Anas, BENHADOU, Siham, et al. Using blockchain based authentication solution for the remote surgery in tactile internet. International Journal of Advanced Computer Science and Applications, 2021, vol. 12, no 2.
- Pauls, Friedrich, Robert Wittig, and Gerhard Fettweis. "A LatencyOptimized Hash-Based Digital Signature Accelerator for the Tactile Internet." International Conference on Embedded Computer Systems. Springer, Cham, 2019
- JIANG, Qi, MA, Jianfeng, YANG, Chao, et al. Efficient end-to-end authentication protocol for wearable health monitoring systems. Computers & Electrical Engineering, 2017, vol. 63, p. 182-195. https://doi.org/10.1016/j.compeleceng.2017.03.016
- T. Alladi, V. Chamola, and Naren, "HARCI: A two-way authentication protocol for three entity healthcare IoT networks," IEEE J. Sel. Areas Commun., vol. 39, no. 2, pp. 361-369, Feb. 2021 https://doi.org/10.1109/JSAC.2020.3020605
- Li, Jiliang, et al. "PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things." IEEE Internet of Things Journal 8.17 (2021): 13183-13195. https://doi.org/10.1109/JIOT.2021.3055827
- ACEVEDO, Javier, ULBRICHT, Marian, GABRIEL, Jennifer, et al. Hardware Accelerated Cryptography for Tactile Internet. In : European Wireless 2021; 26th European Wireless Conference. VDE, 2021. p. 1-8.
- DEAN, Thomas R. et GOLDSMITH, Andrea J. Physical-layer cryptography through massive MIMO. IEEE Transactions on Information Theory, 2017, vol. 63, no 8, p. 5419-5436. https://doi.org/10.1109/TIT.2017.2715187
- SHANTHARAMA, Prateek, THYAGATURU, Akhilesh S., et REISSLEIN, Martin. Hardware-accelerated platforms and infrastructures for network functions: A survey of enabling technologies and research studies. IEEE Access, 2020, vol. 8, p. 132021-132085. https://doi.org/10.1109/access.2020.3008250
- Outchakoucht, Aissam, ES-SAMAALI Hamza, and Jean Philippe Leroy. "Dynamic access control policy based on blockchain and machine learning for the internet of things." International journal of advanced Computer Science and applications 8.7 (2017).
- Es-Samaali, Hamza, Aissam Outchakoucht, and Jean Philippe Leroy. "A blockchain-based access control for big data." International Journal of Computer Networks and Communications Security 5.7 (2017): 137.
- MOUNNAN, Oussama, EL MOUATASIM, Abdelkrim, MANAD, Otman, et al. Privacy-aware and authentication based on blockchain with fault tolerance for IoT enabled fog computing. In : 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 2020. p. 347-352.
- MOUNNAN, Oussama, EL MOUATASIM, Abdelkrim, MANAD, Otman, et al. Privacy-aware and authentication based on blockchain with fault tolerance for IoT enabled fog computing. In : 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 2020. p. 347-352.
- Zhang, J. L., Qu, G., Lv, Y. Q., & Zhou, Q. (2014). A survey on silicon PUFs and recent advances in ring oscillator PUFs. Journal of computer science and technology, 29(4), 664-678. https://doi.org/10.1007/s11390-014-1458-1
- Standards for Basic Anesthetic Monitoring. Committee of Origin: Standards and Practice Parameters (Approved by the ASA House of Delegates on October 21, 1986, last amended on October 20, 2010, and last affirmed on October 28, 2016) https://www.asahq.org/~/media/Sites/ASAHQ/Files/Public/Resources/standards-guidelines/standards-for-basic-anestheticmonitoring.pdf (Accessed on July 18, 2022)
- Klein AA, Meek T, Allcock E, Cook TM, Mincher N, Morris C, and al. Recommendations for standards of monitoring during anaesthesia and recovery 2021: Guideline from the Association of Anaesthetists. Anaesthesia. 2021 Sep;76(9):1212-1223. doi: 10.1111/anae.15501.
- Chilkoti G, Wadhwa R, Saxena AK. Technological advances in perioperative monitoring: current concepts and clinical perspectives. J Anaesthesiol Clin Pharmacol. 2015;31:14-24. doi: 10.4103/0970-9185.150521.
- K. Tiwari, S. Kumar, and R. K. Tiwari, Fog assisted healthcare architecture for pre-operative support to reduce latency, Procedia Computer Science, vol. 167, pp. 1312-1324, 2020.
- Freschi C, Ferrari V, Melfi F, Ferrari M, Mosca F, Cuschieri A.Technical review of the da Vinci surgical telemanipulator. Int J Med Robot Comp. 2013;9(4):396-406.
- PETROVA, Marina, RIIHIJARVI, Janne, MAHONEN, Petri, et al. Performance study of IEEE 802.15. 4 using measurements and simulations. In : IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE, 2006. p. 487-492
- DODIS, Yevgeniy, REYZIN, Leonid, et SMITH, Adam. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In : International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, 2004. p. 523-540.
- Vigano, Luca. "Automated security protocol analysis with the AVISPA tool." Electronic Notes in Theoretical Computer Science 155 (2006): 61-86 https://doi.org/10.1016/j.entcs.2005.11.052
- Zhang, Y., Li, B., Liu, B., Hu, Y., & Zheng, H. (2021). A privacyaware PUFs-based multiserver authentication protocol in cloud-edge IoT systems using blockchain. IEEE Internet of Things Journal, 8(18), 13958-13974. https://doi.org/10.1109/JIOT.2021.3068410
- Abou El Houda, Z., Hafid, A. S., & Khoukhi, L. (2021, June). Blockchain-based Reverse Auction for V2V charging in smart grid environment. In ICC 2021-IEEE International Conference on Communications (pp. 1-6). IEEE
- Abou El Houda, Z., Hafid, A., & Khoukhi, L. (2019, December). Co-IoT: A collaborative DDoS mitigation scheme in IoT environment based on blockchain using SDN. In 2019 IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). IEEE.