IoT Security Issues, Challenges, Threats, and Solutions in Healthcare Applications

IoT Security Issues, Challenges, Threats, and Solutions in Healthcare Applications

Sudhakar Hallur, Roopa Kulkarni, Prashant P. Patavardhan, Vishweshkumar Aithal
ISBN13: 9781799891321|ISBN10: 1799891321|ISBN13 Softcover: 9781799891338|EISBN13: 9781799891345
DOI: 10.4018/978-1-7998-9132-1.ch007
Cite Chapter Cite Chapter

MLA

Hallur, Sudhakar, et al. "IoT Security Issues, Challenges, Threats, and Solutions in Healthcare Applications." Integrating AI in IoT Analytics on the Cloud for Healthcare Applications, edited by D. Jeya Mala, IGI Global, 2022, pp. 104-130. https://doi.org/10.4018/978-1-7998-9132-1.ch007

APA

Hallur, S., Kulkarni, R., Patavardhan, P. P., & Aithal, V. (2022). IoT Security Issues, Challenges, Threats, and Solutions in Healthcare Applications. In D. Jeya Mala (Ed.), Integrating AI in IoT Analytics on the Cloud for Healthcare Applications (pp. 104-130). IGI Global. https://doi.org/10.4018/978-1-7998-9132-1.ch007

Chicago

Hallur, Sudhakar, et al. "IoT Security Issues, Challenges, Threats, and Solutions in Healthcare Applications." In Integrating AI in IoT Analytics on the Cloud for Healthcare Applications, edited by D. Jeya Mala, 104-130. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-9132-1.ch007

Export Reference

Mendeley
Favorite

Abstract

A majority of the applications now go wireless involving IoT as a technology to communicate to their respective destination. IoT is considered as a future of internet. The internet of things integration and efficient communication of the patient health monitoring parameters is the need of the hour in this pandemic. This chapter discusses the three-layer architecture involving hardware communication protocols supporting a layer of healthcare services and applications. Also, the data-guarantee, security and integrity issues, threats risks, and solutions involving deployment of efficient privacy, control, integration methods to confront various prominent and erroneous data manipulation techniques, malicious, and a series of cyber-attacks are proposed. The deployment of various efficient privacy and security protocols in IoT networks is of extreme need to ensure the confidentiality, access-control, authentication, and integrity of the health data transferred and to guarantee the availability of the services to the user at any point of time.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.