Powered by OpenAIRE graph
Found an issue? Give us feedback
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Cyber Security Challenges and Effective Security Measures for IOT-based Intelligent Healthcare Systems

Authors: Abhijit T. Somnathe; N. Gopinath; G. Deena; R. Anandh; Santosh Kumar; Kanchan S. Tiwari;

Cyber Security Challenges and Effective Security Measures for IOT-based Intelligent Healthcare Systems

Abstract

Aims and Background: In order to keep up with the rapid development of technology, cities must enhance their offerings in the areas of public security, medical care, transportation, and citizen well-being. Healthcare systems rely heavily on patient care. Patients' life and the services offered by doctors, nurses, clinicians, pharmaceutical companies, and governments stand to benefit from the implementation of Healthcare IoT. There has been a change in the medical industry, marked by the widespread adoption of wireless healthcare-monitoring-systems (HMS) in hospitals. Methodology: However, the Internet-of-Things (IoT) concept frequently ignores security-privacy for linked things. Security and privacy protections must be implemented systematically throughout the entire healthcare and remote health monitoring system, from the creation of equipment to their interconnection, communication, storage, and eventual destruction. This research investigates the risks associated with using smart health devices and provides recommendations for addressing those risks. The present security and privacy of IoT devices in healthcare systems, as well as the difficulties in adopting security frameworks, are discussed, and recommendations for addressing these issues are offered. Results: This study also contributes in two ways to the ongoing effort to investigate securityprivacy concerns in the circumstance of smart cities for healthcare purposes. Conclusion: Moreover, this article provides a summary of the many Internet of Things applications and the cyber threats they face. On the other hand, thorough assessments of methods to reduce cyber threats to 60% are presented.

  • BIP!
    Impact byBIP!
    citations
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
citations
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average