IoT Security Issues, Challenges, Threats, and Solutions in Healthcare Applications

IoT Security Issues, Challenges, Threats, and Solutions in Healthcare Applications

Sudhakar Hallur, Roopa Kulkarni, Prashant P. Patavardhan, Vishweshkumar Aithal
DOI: 10.4018/978-1-7998-9132-1.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A majority of the applications now go wireless involving IoT as a technology to communicate to their respective destination. IoT is considered as a future of internet. The internet of things integration and efficient communication of the patient health monitoring parameters is the need of the hour in this pandemic. This chapter discusses the three-layer architecture involving hardware communication protocols supporting a layer of healthcare services and applications. Also, the data-guarantee, security and integrity issues, threats risks, and solutions involving deployment of efficient privacy, control, integration methods to confront various prominent and erroneous data manipulation techniques, malicious, and a series of cyber-attacks are proposed. The deployment of various efficient privacy and security protocols in IoT networks is of extreme need to ensure the confidentiality, access-control, authentication, and integrity of the health data transferred and to guarantee the availability of the services to the user at any point of time.
Chapter Preview
Top

Background

In clear words, the Internet of Things (IoT) is the arrangement of interconnected gadgets/tasks consented to all the organization components, for example, equipment, programming, availability of the organization, and some other required electronic/PC implies that eventually makes them responsive by supporting in information quarrel and assortment. In the event that we talk a touch more about IoT, it is past to an idea that fosters the in general engineering foundation which at last permits the incorporation and the viable trade of the information between the individual out of luck and the specialist organizations. The utilization of the IoT idea makes the reachability to the patients very valuable, which at last assistance to give them huge consideration so they can escape this illness. (Wang et al., 2020)

Key Terms in this Chapter

Monitoring: A continuous review of a review of a process from time to time.

Threats: A blockage or a disruptive process to some productive task that may lead to hampering of the expected outcome.

COVID-19: COVID-19 is a disease caused by a new strain of coronavirus. 'CO' stands for corona, 'VI' for virus, and 'D' for disease.

Resource: A source/input for some task, which provides an outcome.

Omissions: A skip of a step in the process of achieving an outcome.

Application (API): A graphical user interface or a software that helps user to interact with it for some purpose or outcome. Usually, a mobile or computer application.

Regulation: Moderating any parameter or bringing it to a predefined level.

Complete Chapter List

Search this Book:
Reset