Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

Cyber Security Challenges and Effective Security Measures for IOT-based Intelligent Healthcare Systems

In Press, (this is not the final "Version of Record"). Available online 31 January, 2024
Author(s): Abhijit T. Somnathea, N. Gopinath*, G. Deena, R. Anandh, Santosh kumar and Kanchan S. Tiwari
Published on: 31 January, 2024

DOI: 10.2174/0123520965276302240115075612

Price: $95

Abstract

Aims and Background: In order to keep up with the rapid development of technology, cities must enhance their offerings in the areas of public security, medical care, transportation, and citizen well-being. Healthcare systems rely heavily on patient care. Patients' life and the services offered by doctors, nurses, clinicians, pharmaceutical companies, and governments stand to benefit from the implementation of Healthcare IoT. There has been a change in the medical industry, marked by the widespread adoption of wireless healthcare-monitoring-systems (HMS) in hospitals.

Objectives and Methodology: However, the Internet-of-Things(IoT) concept frequently ignores security-privacy for linked things. Security and privacy protections must be implemented systematically throughout the entire healthcare and remote health monitoring system, from the creation of equipment to their interconnection, communication, storage, and eventual destruction. This research investigates the risks associated with using smart health devices and provides recommendations for addressing those risks. The present security and privacy of IoT devices in healthcare systems, as well as the difficulties in adopting security frameworks, are discussed, and recommendations for addressing these issues are offered.

Results and Conclusions: This study also contributes in two ways to the ongoing effort to investigate security-privacy concerns in the circumstance of smart cities for healthcare purposes. Moreover, this article provides a summary of the many Internet of Things applications and the cyber threats they face. On the other hand, thorough assessments of methods to reduce cyber threats to 60% are presented.


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy