Ajou University repository

COVID-19: Secure Healthcare Internet of Things Networks, Current Trends and Challenges with Future Research Directions
  • Adil, Muhammad ;
  • Ali, Jehad ;
  • Jadoon, Muhammad Mohsin ;
  • Alotaibi, Sattam Rabia ;
  • Kumar, Neeraj ;
  • Farouk, Ahmed ;
  • Song, Houbing
Citations

SCOPUS

9

Citation Export

Publication Year
2023-05-16
Publisher
Association for Computing Machinery
Citation
ACM Transactions on Sensor Networks, Vol.19
Keyword
authentication of patient wearable devicesCOVID-19 and healthcare IoT applicationsData privacyhealthcare IoT applications
Mesh Keyword
'currentAuthentication of patient wearable deviceCOVID-19 and healthcare IoT applicationFuture research directionsHealthcare IoT applicationHealthcare technologySeizure temperatureSensitive datasWearable devicesWireless communication channels
All Science Classification Codes (ASJC)
Computer Networks and Communications
Abstract
The number of affirmed COVID-19 cases showed an enormous increase in the recent past throughout the globe. Keeping in view the catastrophic destruction of this devastating virus, there is a must-need situation to maximize the use of existing healthcare technologies such as the healthcare Internet of Things (H-IoT). In healthcare, patient wearable devices are widely recognized as a dormant technology with enormous capabilities to assess and combat various diseases, e.g., cough, seizure, temperature, heartbeat, and so on. As we know, in the H-IoT, patient-wearable devices are dispersed in an infrastructure-free environment that exposes them to several private and public coercion while accumulating and transmitting high sensitive data over the wireless communication channel. Therefore, security is the main concern of these applications, and thus, the primary focus of this article to outline the limitations and challenges in the present literature from 2019 to 2021, to identify the requirements of H-IoT applications used in the context of COVID-19. Following this, we will move one step ahead to explore the current security techniques adopted in these applications. Consequently, we will identify the network architectural, cryptographic, protocols, and operational security challenges during our study to recommend viable research directions and opportunities, which could be helpful and capable to minimize the network architecture, deployment, and maintenance cost with more productive outcomes.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/33567
DOI
https://doi.org/10.1145/3558519
Fulltext

Type
Article
Funding
The authors also would like to thank Taif University Researchers supporting project number (TURSP-2020/228), Taif University, Taif, Saudi Arabia.
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

ALI JEHAD Image
ALI JEHADJEHAD, ALI
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.