
You have already added 0 works in your ORCID record related to the merged Research product.
You have already added 0 works in your ORCID record related to the merged Research product.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Cyber Security Challenges and Effective Security Measures for IOT-based Intelligent Healthcare Systems

Aims and Background: In order to keep up with the rapid development of technology, cities must enhance their offerings in the areas of public security, medical care, transportation, and citizen well-being. Healthcare systems rely heavily on patient care. Patients' life and the services offered by doctors, nurses, clinicians, pharmaceutical companies, and governments stand to benefit from the implementation of Healthcare IoT. There has been a change in the medical industry, marked by the widespread adoption of wireless healthcare-monitoring-systems (HMS) in hospitals. Methodology: However, the Internet-of-Things (IoT) concept frequently ignores security-privacy for linked things. Security and privacy protections must be implemented systematically throughout the entire healthcare and remote health monitoring system, from the creation of equipment to their interconnection, communication, storage, and eventual destruction. This research investigates the risks associated with using smart health devices and provides recommendations for addressing those risks. The present security and privacy of IoT devices in healthcare systems, as well as the difficulties in adopting security frameworks, are discussed, and recommendations for addressing these issues are offered. Results: This study also contributes in two ways to the ongoing effort to investigate securityprivacy concerns in the circumstance of smart cities for healthcare purposes. Conclusion: Moreover, this article provides a summary of the many Internet of Things applications and the cyber threats they face. On the other hand, thorough assessments of methods to reduce cyber threats to 60% are presented.
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).0 popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.Average influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).Average impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.Average
