Skip to content
2000
Volume 18, Issue 6
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

Aims and Background

In order to keep up with the rapid development of technology, cities must enhance their offerings in the areas of public security, medical care, transportation, and citizen well-being. Healthcare systems rely heavily on patient care. Patients' life and the services offered by doctors, nurses, clinicians, pharmaceutical companies, and governments stand to benefit from the implementation of Healthcare IoT. There has been a change in the medical industry, marked by the widespread adoption of wireless healthcare-monitoring-systems (HMS) in hospitals.

Methodology

However, the Internet-of-Things (IoT) concept frequently ignores security-privacy for linked things. Security and privacy protections must be implemented systematically throughout the entire healthcare and remote health monitoring system, from the creation of equipment to their interconnection, communication, storage, and eventual destruction. This research investigates the risks associated with using smart health devices and provides recommendations for addressing those risks. The present security and privacy of IoT devices in healthcare systems, as well as the difficulties in adopting security frameworks, are discussed, and recommendations for addressing these issues are offered.

Results

This study also contributes in two ways to the ongoing effort to investigate security-privacy concerns in the circumstance of smart cities for healthcare purposes.

Conclusion

Moreover, this article provides a summary of the many Internet of Things applications and the cyber threats they face. On the other hand, thorough assessments of methods to reduce cyber threats to 60% are presented.

Loading

Article metrics loading...

/content/journals/raeeng/10.2174/0123520965276302240115075612
2024-01-31
2025-11-04
Loading full text...

Full text loading...

References

  1. RawatR. MahorV. GargB. ChouhanM. PachlasiyaK. TelangS. Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID. Lessons from COVID-19.Academic Press202240542510.1016/B978‑0‑323‑99878‑9.00016‑9
    [Google Scholar]
  2. ReddyP.C.S. SuryanarayanaG. YadalaS. Data analytics in farming: rice price prediction in Andhra Pradesh.In 2022 5th International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT).202215
    [Google Scholar]
  3. Bahalul HaqueA.K.M. BhushanB. NawarA. TalhaK.R. AyeshaS.J. Attacks and countermeasures in IoT based smart healthcare applications.Recent Advances in Internet of Things and Machine Learning: Real-World Applications.ChamSpringer International Publishing2022679010.1007/978‑3‑030‑90119‑6_6
    [Google Scholar]
  4. SucharithaY. Shaker ReddyP.C. An autonomous adaptive enhancement method based on learning to optimize heterogeneous network selection.Int. J. Sensors Wirel. Commun. Control202212749550910.2174/2210327912666221012154428
    [Google Scholar]
  5. MainettiC. L. An IoT-aware architecture for smart healthcare systems.IEEE Internet Things J.20152611
    [Google Scholar]
  6. AshreethaB. DeviM.R. KumarU.P. ManiM.K. SahuD.N. ReddyP.C.S. Soft optimization techniques for automatic liver cancer detection in abdominal liver images.Int. J. Health Sci.2022108201083110.53730/ijhs.v6nS1.7597
    [Google Scholar]
  7. AminS.U. HossainM.S. Edge intelligence and internet of things in healthcare: A survey.IEEE Access20219455910.1109/ACCESS.2020.3045115
    [Google Scholar]
  8. ChillakuruP. MadiajaganM. PrashanthK.V. AmbalaS. Shaker ReddyP.C. PavanJ. Enhancing wind power monitoring through motion deblurring with modified GoogleNet algorithm.Soft Comput.202311110.1007/s00500‑023‑08358‑8
    [Google Scholar]
  9. KumarK. PandeS.V. KumarT.C.A. SainiP. ChaturvediA. ReddyP.C.S. ShahK.B. Intelligent controller design and fault prediction using machine learning model.Int. Trans. Electr. Energy Syst.202320231910.1155/2023/1056387
    [Google Scholar]
  10. MuthappaK.A. NishaA.S.A. ShastriR. AvasthiV. ReddyP.C.S. Design of high-speed, low-power non-volatile master slave flip flop (NVMSFF) for memory registers designs.Appl. Nanosci.20231385369537810.1007/s13204‑023‑02814‑5
    [Google Scholar]
  11. BhardwajV. JoshiR. GaurA.M. IoT-based smart health monitoring system for COVID-19.SN comput. sci.20223213710.1007/s42979‑022‑01015‑135079705
    [Google Scholar]
  12. ZhuH. WuC.K. KooC.H. TsangY.T. LiuY. ChiH.R. TsangK.F. Smart healthcare in the era of internet-of-things.IEEE Consum. Electron. Mag.201985263010.1109/MCE.2019.2923929
    [Google Scholar]
  13. SucharithaY. ReddyP.C.S. SuryanarayanaG. Network intrusion detection of drones using recurrent neural networks. Drone Technology: Future Trends and Practical Applications2023375392
    [Google Scholar]
  14. TaiwoO. EzugwuA. E. Smart healthcare support for remote patient monitoring during covid-19 quarantine.Inform. Med. Unlocked202020100428
    [Google Scholar]
  15. GopinathN. ShyryS.P. Secured: quantum key distribution (SQKD) for solving side-channel attack to enhance security, based on shifting and binary conversion for securing data (SBSD) frameworks.Soft Comput.202218
    [Google Scholar]
  16. SucharithaY. ReddyP.C.S. ChittiT.N. Deep learning based framework for crop yield prediction. AIP Conf Proc.202325481810.1063/5.0118526
    [Google Scholar]
  17. AlabdulatifA. KhalilI. YiX. GuizaniM. Secure edge of things for smart healthcare surveillance framework.IEEE Access20197310103102110.1109/ACCESS.2019.2899323
    [Google Scholar]
  18. GopinathN. Prayla ShyryS. Enhancing the cloud security using side channel attack free QKD with entangled fuzzy logic.J. Intell. Fuzzy Syst.202211110.3233/JIFS‑220398
    [Google Scholar]
  19. ShanmugarajaP. BhardwajM. MehbodniyaA. An Efficient Clustered M-path Sinkhole Attack Detection (MSAD) Algorithm for Wireless Sensor Networks.Ad. Hoc. Sens. Wirel. Netw.202355
    [Google Scholar]
  20. Al-ShareedaM.A. ManickamS. COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing.Int. J. Environ. Res. Public Health202219231561810.3390/ijerph19231561836497709
    [Google Scholar]
  21. Al-ShareedaM.A. AnbarM. ManickamS. HasbullahI.H. Se-cppa: A secure and efficient conditional privacy-preserving authentication scheme in vehicular ad-hoc networks.Sensors20212124820610.3390/s2124820634960311
    [Google Scholar]
  22. Al-ShareedaM.A. AnbarM. ManickamS. HasbullahI.H. Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks.IEEE Access2021911322611323810.1109/ACCESS.2021.3104148
    [Google Scholar]
  23. TianS. YangW. GrangeJ.M.L. WangP. HuangW. YeZ. Smart healthcare: Making medical care more intelligent.J. Glob. Health201933626510.1016/j.glohj.2019.07.001
    [Google Scholar]
  24. SheikC.S. ReeseB.K. TwingK.I. SylvanJ.B. GrimS.L. SchrenkM.O. SoginM.L. ColwellF.S. Identification and removal of contaminant sequences from ribosomal gene databases: Lessons from the census of deep life.Front. Microbiol.2018984010.3389/fmicb.2018.0084029780369
    [Google Scholar]
  25. PerwejY. HaqK. ParwejF. MM. HassanM. The internet of things (IoT) and its application domains.Int. J. Comput. Appl.201918249364910.5120/ijca2019918763
    [Google Scholar]
  26. MohammedB.A. Al-ShareedaM.A. ManickamS. Al-MekhlafiZ.G. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks.IEEE Access202311185711858110.1109/ACCESS.2023.3247222
    [Google Scholar]
  27. Al-ShareedaM.A. ManickamS. Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks.IEEE Access20221012060612061510.1109/ACCESS.2022.3222488
    [Google Scholar]
  28. Shaker ReddyP.C. SucharithaY. A design and challenges in energy optimizing CR-wireless sensor networks.Recent Adv. Comput. Sci. Commun.20231658292
    [Google Scholar]
  29. GopinathN. PBSK (Parity Bit Interleaved Shift Key) based distribution for controlling side channel attacks.2022 Third International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE). IEEE2022
    [Google Scholar]
  30. SayeeramD. KatteT.V. BhatiaS. Jai KumarA. KumarA. JayashreeG. RachanaD.S. Nalla ReddyH.V. Arvind RasalkarA. MalempatiR.L. Reddy SD.N. Identification of potential biomarkers for lung adenocarcinoma.Heliyon2020611e0545210.1016/j.heliyon.2020.e0545233251353
    [Google Scholar]
  31. AliA. AlmaiahM.A. HajjejF. PashaM.F. FangO.H. KhanR. TeoJ. ZakaryaM. An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network.Sensors202222257210.3390/s2202057235062530
    [Google Scholar]
  32. SreedeviA.G. Nitya HarshithaT. SugumaranV. ShankarP. Application of cognitive computing in healthcare, cybersecurity, big data and IoT: A literature review.Inf. Process. Manage.202259210288810.1016/j.ipm.2022.102888
    [Google Scholar]
  33. MolokommeD.N. OnumanyiA.J. Abu-MahfouzA.M. Edge intelligence in Smart Grids: A survey on architectures, offloading models, cyber security measures, and challenges.J. Sens. Actuator Netw.20221134710.3390/jsan11030047
    [Google Scholar]
  34. NamasudraS. SharmaP. CrespoR.G. ShanmuganathanV. Blockchain-based medical certificate generation and verification for IoT-based healthcare systems.IEEE Consum. Electron. Mag.2023122839310.1109/MCE.2021.3140048
    [Google Scholar]
  35. AbdulmalekS. NasirA. JabbarW.A. AlmuhayaM.A.M. BairagiA.K. KhanM.A.M. KeeS.H. IoT-based healthcare-monitoring system towards improving quality of life: A review.Healthcare20221010199310.3390/healthcare1010199336292441
    [Google Scholar]
  36. TingL. KhanM. SharmaA. AnsariM.D. A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.J. Intell. Syst.202231122123610.1515/jisys‑2022‑0012
    [Google Scholar]
  37. RiazA.R. GilaniS.M.M. NaseerS. AlshmranyS. ShafiqM. ChoiJ.G. Applying adaptive security techniques for risk analysis of internet of things (IoT)-based smart agriculture.Sustainability202214171096410.3390/su141710964
    [Google Scholar]
  38. BasharatA. MohamadM.M.B. KhanA. Machine learning techniques for intrusion detection in Smart Healthcare Systems: A comparative analysis.2022 4th International Conference on Smart Sensors and Application (ICSSA)202210.1109/ICSSA54161.2022.9870973
    [Google Scholar]
  39. NayakJ. MeherS.K. SouriA. NaikB. VimalS. Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection.J. Supercomput.20227813148661489110.1007/s11227‑022‑04453‑z35431452
    [Google Scholar]
  40. AlteraziH.A. KshirsagarP.R. ManoharanH. SelvarajanS. AlhebaishiN. SrivastavaG. LinJ.C.W. Prevention of cyber security with the internet of things using particle swarm optimization.Sensors20222216611710.3390/s2216611736015878
    [Google Scholar]
  41. HasanM.K. GhazalT.M. SaeedR.A. PandeyB. GohelH. EshmawiA.A. Abdel-KhalekS. AlkhassawnehH.M. A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things.IET Commun.202216542143210.1049/cmu2.12301
    [Google Scholar]
  42. WhaiduzzamanM. BarrosA. ChandaM. BarmanS. SultanaT. RahmanM.S. RoyS. FidgeC. A review of emerging technologies for IoT-based smart cities.Sensors20222223927110.3390/s2223927136501973
    [Google Scholar]
  43. HazmanC. GuezzazA. BenkiraneS. AzrourM. lIDS-SIoEL: Intrusion detection framework for IoT-based smart environments security using ensemble learning.Cluster. Comput.2022115
    [Google Scholar]
  44. SabaT. RehmanA. SadadT. KolivandH. BahajS.A. Anomaly-based intrusion detection system for IoT networks through deep learning model.Comput. Electr. Eng.20229910781010.1016/j.compeleceng.2022.107810
    [Google Scholar]
  45. KsibiS. JaidiF. BouhoulaA. A comprehensive study of security and cyber-security risk management within e-health systems: Synthesis, analysis and a novel quantified approach.Mob. Netw. Appl.2022121
    [Google Scholar]
  46. HaddawayN. R. PageM. J. PritchardC. C. McGuinnessL. A. PRISMA2020: An R package and Shiny app for producing PRISMA 2020-compliant flow diagrams, with interactivity for optimised digital transparency and Open Synthesis.Campbell Syst. Rev.202218e123010.1002/cl2.1230
    [Google Scholar]
/content/journals/raeeng/10.2174/0123520965276302240115075612
Loading
/content/journals/raeeng/10.2174/0123520965276302240115075612
Loading

Data & Media loading...


  • Article Type:
    Review Article
Keyword(s): Attacks; cyber security; HMS; IoT; privacy; vulnerability
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test