Table 6 A comparative analysis of security functions against related schemes.

From: A secured remote patient monitoring framework for IoMT ecosystems

Parameter

25

28

29

Proposed

A1

Y

N

Y

Y

A2

Y

Y

Y

Y

A3

N

Y

N

Y

A4

N

Y

Y

Y

  1. Attacks A1: Interception; A2: Tampering (Alteration); A3: DoS; A4: Unauthorized Access Y shows parameter is present; N shows parameter is absent.