Smart Inventory System for Expiry Date Tracking
Volume-7 | Issue-2

Exploiting Vulnerabilities in Weak CAPTCHA Mechanisms within DVWA
Volume-7 | Issue-2

Investigating Process Scheduling Techniques for Optimal Performance and Energy Efficiency in Operating Systems
Volume-6 | Issue-4

Gamification in Mobile Apps: Assessing the Effects on Customer Engagement and Loyalty in the Retail Industry
Volume-5 | Issue-4

AI based Identification of Students Dress Code in Schools and Universities
Volume-6 | Issue-1

Review on Sanskrit Sandhi Splitting using Deep Learning Techniques
Volume-6 | Issue-2

AI-Powered Data Interaction: A Natural Language Chatbot for CSV, Excel, and SQL Files
Volume-7 | Issue-1

A Comprehensive Study of Zero-Day Attacks
Volume-5 | Issue-3

TF-IDF Vectorization and Clustering for Extractive Text Summarization
Volume-6 | Issue-1

A Review on Cryptocurrency and its Advancements in Present World
Volume-4 | Issue-4

AUTOMATION USING IOT IN GREENHOUSE ENVIRONMENT
Volume-1 | Issue-1

Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4

Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2

Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2

VIRTUAL REALITY GAMING TECHNOLOGY FOR MENTAL STIMULATION AND THERAPY
Volume-1 | Issue-1

Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain
Volume-3 | Issue-3

Analysis of Natural Language Processing in the FinTech Models of Mid-21st Century
Volume-4 | Issue-3

PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3

Image Augmentation based on GAN deep learning approach with Textual Content Descriptors
Volume-3 | Issue-3

Comparative Analysis for Personality Prediction by Digital Footprints in Social Media
Volume-3 | Issue-2

Home / Archives / Volume-6 / Issue-2 / Article-5

Volume - 6 | Issue - 2 | june 2024

Blockchain-Powered Secure Communication Protocol for the Internet of Medical Things (IoMT) Open Access
Dinesh Kumar M  , N. Santhiyakumari  122
Pages: 167-178
Full Article PDF pdf-white-icon
Cite this article
M, Dinesh Kumar, and N. Santhiyakumari. "Blockchain-Powered Secure Communication Protocol for the Internet of Medical Things (IoMT)." Journal of Information Technology and Digital World 6, no. 2 (2024): 167-178
Published
29 May, 2024
Abstract

The Internet of Medical Things (IoMT) through network technology provides smart medical devices, equipment, and software to connect different patients and users with medical information. Integrating Blockchain technology into IoMT-based healthcare IoT solutions increases security and privacy. Blockchain’s decentralized architecture ensures data integrity, confidentiality, and traceability of patient information throughout its entire lifecycle. It solves deficiencies in data storage, transmission, and computation in the IoT ecosystem by using encryption technology and smart contracts. This integration provides real-world benefits such as creating tamper-proof documents and building trust between patients and doctors. The research helps improve the security of healthcare systems and highlights the important role of Blockchain in protecting sensitive medical data in the IoT environment.

Keywords

Blockchain technology Internet of Medical Things (IoMT) Health monitoring systems Data security Privacy protection Cryptographic techniques Smart contracts Healthcare data management

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here