Ajou University repository

COVID-19: Secure Healthcare Internet of Things Networks, Current Trends and Challenges with Future Research Directions
  • Adil, Muhammad ;
  • Ali, Jehad ;
  • Jadoon, Muhammad Mohsin ;
  • Alotaibi, Sattam Rabia ;
  • Kumar, Neeraj ;
  • Farouk, Ahmed ;
  • Song, Houbing
Citations

SCOPUS

9

Citation Export

DC Field Value Language
dc.contributor.authorAdil, Muhammad-
dc.contributor.authorAli, Jehad-
dc.contributor.authorJadoon, Muhammad Mohsin-
dc.contributor.authorAlotaibi, Sattam Rabia-
dc.contributor.authorKumar, Neeraj-
dc.contributor.authorFarouk, Ahmed-
dc.contributor.authorSong, Houbing-
dc.date.issued2023-05-16-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/33567-
dc.description.abstractThe number of affirmed COVID-19 cases showed an enormous increase in the recent past throughout the globe. Keeping in view the catastrophic destruction of this devastating virus, there is a must-need situation to maximize the use of existing healthcare technologies such as the healthcare Internet of Things (H-IoT). In healthcare, patient wearable devices are widely recognized as a dormant technology with enormous capabilities to assess and combat various diseases, e.g., cough, seizure, temperature, heartbeat, and so on. As we know, in the H-IoT, patient-wearable devices are dispersed in an infrastructure-free environment that exposes them to several private and public coercion while accumulating and transmitting high sensitive data over the wireless communication channel. Therefore, security is the main concern of these applications, and thus, the primary focus of this article to outline the limitations and challenges in the present literature from 2019 to 2021, to identify the requirements of H-IoT applications used in the context of COVID-19. Following this, we will move one step ahead to explore the current security techniques adopted in these applications. Consequently, we will identify the network architectural, cryptographic, protocols, and operational security challenges during our study to recommend viable research directions and opportunities, which could be helpful and capable to minimize the network architecture, deployment, and maintenance cost with more productive outcomes.-
dc.description.sponsorshipThe authors also would like to thank Taif University Researchers supporting project number (TURSP-2020/228), Taif University, Taif, Saudi Arabia.-
dc.language.isoeng-
dc.publisherAssociation for Computing Machinery-
dc.subject.mesh'current-
dc.subject.meshAuthentication of patient wearable device-
dc.subject.meshCOVID-19 and healthcare IoT application-
dc.subject.meshFuture research directions-
dc.subject.meshHealthcare IoT application-
dc.subject.meshHealthcare technology-
dc.subject.meshSeizure temperature-
dc.subject.meshSensitive datas-
dc.subject.meshWearable devices-
dc.subject.meshWireless communication channels-
dc.titleCOVID-19: Secure Healthcare Internet of Things Networks, Current Trends and Challenges with Future Research Directions-
dc.typeArticle-
dc.citation.titleACM Transactions on Sensor Networks-
dc.citation.volume19-
dc.identifier.bibliographicCitationACM Transactions on Sensor Networks, Vol.19-
dc.identifier.doi10.1145/3558519-
dc.identifier.scopusid2-s2.0-85166319861-
dc.identifier.urlhttp://dl.acm.org/citation.cfm?id=J981-
dc.subject.keywordauthentication of patient wearable devices-
dc.subject.keywordCOVID-19 and healthcare IoT applications-
dc.subject.keywordData privacy-
dc.subject.keywordhealthcare IoT applications-
dc.description.isoafalse-
dc.subject.subareaComputer Networks and Communications-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

ALI JEHAD Image
ALI JEHADJEHAD, ALI
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.