IoT in Healthcare: Breaching Security Issues

IoT in Healthcare: Breaching Security Issues

Somasundaram R, Mythili Thirugnanam
ISBN13: 9781522522966|ISBN10: 1522522964|EISBN13: 9781522522973
DOI: 10.4018/978-1-5225-2296-6.ch008
Cite Chapter Cite Chapter

MLA

Somasundaram R, and Mythili Thirugnanam. "IoT in Healthcare: Breaching Security Issues." Security Breaches and Threat Prevention in the Internet of Things, edited by N. Jeyanthi and R. Thandeeswaran, IGI Global, 2017, pp. 174-188. https://doi.org/10.4018/978-1-5225-2296-6.ch008

APA

Somasundaram R & Thirugnanam, M. (2017). IoT in Healthcare: Breaching Security Issues. In N. Jeyanthi & R. Thandeeswaran (Eds.), Security Breaches and Threat Prevention in the Internet of Things (pp. 174-188). IGI Global. https://doi.org/10.4018/978-1-5225-2296-6.ch008

Chicago

Somasundaram R, and Mythili Thirugnanam. "IoT in Healthcare: Breaching Security Issues." In Security Breaches and Threat Prevention in the Internet of Things, edited by N. Jeyanthi and R. Thandeeswaran, 174-188. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-2296-6.ch008

Export Reference

Mendeley
Favorite

Abstract

The fields of computer science and electronics have merged to result into one of the most notable technological advances in the form of realization of the Internet of Things. The market for healthcare services has increased exponentially at the same time security flaws could pose serious threats to the health and safety of patients using wearable technologies and RFID. The volume and sensitivity of data traversing the IoT environment makes dangerous to messages and data could be intercepted and manipulated while in transit. This scenario must absolutely respect the confidentiality and privacy of patient's medical information. Therefore, this chapter presents various security issues or vulnerabilities with respect to attacks and various situations how information will be attacked by the attacker in healthcare IoT. The working principle of healthcare IoT also discussed. The chapter concludes the performance of various attacks based on the past work. In the future this work can be extended to introduce a novel mechanism to resolve various security issues in healthcare IoT.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.