Skip to main content
. 2022 Jul 24;22(15):5517. doi: 10.3390/s22155517

Table 3.

Comparative analysis of decentralized IoMT security schemes (blockchain method).

Author Year Objective Technique Used Type of Data Framework Pros Cons
Abdellatif et al. [113] 2021 Process large amounts of medical data Blockchain Medical data MEdge-Chain Remote monitoring, different actions for different data Security is not focused
Xu et al. [114] 2019 Fine-grained access control Blockchain (PoW) Health data Healthchain User can update key if suspicious Not suitable for high adversary
Liu et al. [115] 2019 Data sharing and privacy preservation Blockchain (DPoS) EHR file - Symptom matching communication High overhead
Lin et al. [116] 2021 Task offloading and data processing to resist malicious attacks Blockchain & MAC VR video and feedback - Common view of similar patients High computing capacity required
Garg et al. [117] 2020 Secure exchange of health-related confidential and private information Blockchain & ECC Health data BAKMP Dynamic node addition Expensive computation
Egala et al. [118] 2021 Efficient secure exchange for decentralized network Blockchain & ECC EHR file Fortified-Chain Low energy, fast response Ring tamper resistance instead of device