Smart IoT Based Healthcare Sector
Smart IoT Based Healthcare Sector
https://doi.org/10.22214/ijraset.2023.50534
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Abstract: The Internet of Things (IoT) circumscribes the real-world commodity to communicate and interact with each other by
the help of Internet. The enormous growth in the field of IoT devices has drawn wide attention towards wireless-based area
networks (WBANs) to eliminate implications like lack of central entity, rigid security demands, mass data processing, low-latency
service provision and resource limitation. Moreover, this paper represents a broad discussion over IoT healthcare protocols. This
paper also brings us an extensive insight over the IoT surrounding healthcare over its privacy, challenges privacy, challenges,
and security issues. This paper also proposes a solution to reduce potential causes of human error and to provide with the best-
in-class efficiency in the healthcare sector. This paper highlights IoT based approach in the healthcare industry for higher
reliability and efficiency.
Keyword: IoT, Healthcare, Security, medical environment, sensors
I. INTRODUCTION
With the advancement in the technology day by day. The concept of IoT, Wireless Sensors and Data Science has undergone an
advance development phase. The importance of these concepts has always proved its worth by playing vital role in the society. All
these concepts have got prominent advantages like higher reliability, connectivity and communication. The IoT has brought us the
emergence and requirement for smart nations, smart cities, smart grids, and smart healthcare [1]. The most widespread application
of the IoT can be seen in the healthcare sector. The WBAN by the help of sensors help the healthcare sector in its day-to-day
operations. Due to its high advantages, it lacks in certain aspects such as cyber-attacks, lack of central-controller, resource
limitations and potential bottleneck. This paper also draws the attention towards the rigid security implications of the smart
healthcare model. Data privacy in the healthcare model can through access control rules which will ensure that only people with
authority has the right to make any necessary changes [2].
The major contributions of this research paper are presented below:
1) This paper presents the overview of the IoT applications for the healthcare system and provide a detail on its advantages and
implications related with it [3].
2) This paper discusses about issues and challenges faced by the healthcare services [4].
3) This paper researches the key healthcare challenges and its open issues and it also discusses about the cyber-attacks and
vulnerabilities [5].
This paper has been arranged in the following sequence such as: Section 2 discusses about standing IoT operations in the healthcare
system and what all implications it faces. Section 3 elaborates the threats from the cyber-attacks and features of IoT which can be
taken in account to overcome these vulnerabilities. The paper concludes in the Section 4 with future research direction.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2363
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
There is an urgent need of sophisticated system for fraud detection as well as protecting patients’ data. This can be achieved by
constant monitoring, automated discovery, and risk management system. As a healthcare organization your ‘devoted to offering the
best effective, efficient patients care [9].
A. Security Requirements
An innovative technology in this field is Internet of Things (IoT) which offers smart services and remote monitoring across
healthcare systems in accordance with a collection of interconnected networks and devices. The nature of IoT based healthcare
systems involves sensitive and personnel patients’ information, making security a key concern. For the need of modern living IoT
offers a wide range of applications in industries like agriculture, emergency services, transportation, logistics, and smart cities.
Additionally, one of the most appealing IoT application sector is healthcare sectors. IoT base healthcare solutions have security
needs that are comparable to those in traditional communication contexts [10]. To achieve the finest security systems in healthcare
following requirements should be followed:
1) Data Freshness: It is necessary to make sure that communication is current because each IoT healthcare network offers
sometimes varying measurements.
2) Fault Tolerance: A security system should remain working in the position of fraud detection such as device failure, or system
glitch.
3) Integrity: It should maintain complete data integrity while data is being transferred to devices.
4) Confidentiality: It should not allow any unauthorized users the access towards medical data.
5) Privacy: Due to network sharing of sensitive data, privacy concerns are must.
6) Authentication: It is the verification between two users who are communicating.
7) Resiliency: Even if some of the connected health devices are insecure, A security plan should nevertheless shield the network
device, and data from intrusion.
8) Secure Booting: A cryptographical signatures are generated when an item is powered at the first time for verification of its
authenticity and integrity.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2364
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
A. Standardization
As IoT is making its grip on healthcare sectors so as in the market. In the recent decades a lot of competition has increased in a
market of IoT. Many small businesses are growing to make new, efficient, and compatible IoT devices for healthcare but the major
problem is arising is that that they do not have enough man power to support their business thus, lacking in the aspect. There are
large number of devices connected through the network. There are different standards, protocols, languages that are used to connect
devices. The ownership and control of data are unclear because there are no rules that are widely acknowledged. This makes the IoT
integration of many devices in healthcare industries difficult.
The disparities in their network communication protocol makes it difficult for healthcare users to aggregate data, even when the
devices are connected. There are no set protocols for these devices. The adaptation and functionalities of IoT healthcare systems are
in doubt without device compatibility. Because of this, standardization in IoT healthcare is still an open issue. The secret to
developing protocols that are universally approved intermobility across medical device is standardization. By ensuring that their
software and hardware are compatible, companies can lower their overall cost of data collection while maintaining the system
security and avoiding the protocols gaps. Therefore, there is a need to raise the issue to standardized communication and protocols
[14].
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2365
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
B. Security Challenges
In the last few decades, healthcare industries are the victims of most cyber-attacks. Due to shared network in IoT it becomes easier
for the hackers to hack into the system. Because of the use of cloud and web software, security concerns have come in the limelight.
Securing any data transfer within an across business can be difficult. Basically, no health care facilities, no matter how strong its
cyber security posture is completely impervious to intrusion.
Thus, making security the most debatable issue in healthcare. Securing patients personnel information is must, and privacy to their
data should be maintain. IoT devices are designed in such a way it collects, store, and transfer data, anytime anywhere. Thus, hacker
use this system to steal patients’ information, sometimes selling or using the information against them. Hackers forged Ids to get
narcotics so they can abuse their futures. IoT based healthcare are architecture is not effectively safeguard and fails to ensure the
privacy and security of data because of the repeat’s Ids.’ It becomes necessary to safeguard medical devices that are connected to
each from any kind of unauthorized access to protect their patient’s welfare. Many other pieces of equipment’s utilized in healthcare
sectors are connected to cloud and as a result are the part of IoT along with connected medical devices. In order to protect patients
and healthcare workers other gadgets like phones, cameras, etc. should be protected [15].
1) Ransomware Attacks
In recent years, hospitals have been the target of ransomware attacks. The healthcare industries experience the greatest number of
ransomwares assaults, according to FBIs’ 2021 internet crime reports. Healthcare got 148 complaints to the FBIs’ internet crime
complaints center more than twice as many as the financial sector. The use of ransomware is developing and becoming more
complex. Software vulnerability, exploitation, Phishing, Remote Desktop protocol (RDP) exploitation are the most popular attack
strategies. The Conti ransomware gang is responsible for numerous healthcare attacks. Conti conduct business as usual, complete
with performance evaluation, an HR department and even an employee of the month [16].
4) Data Protection
The healthcare industry is a networked environment allowing the patients information to be exchanged and controlled by the
varieties of parties and from several end points, each with its own level of securities for securing that information. Medical data is
considered especially valuable for cyber criminals because of its sensitivity. Therefore, it is essential that businesses employ
healthcare data security that will enhance patients care, safeguards key resources, and satisfy regulatory requirements. Due to an
increase in data protection violation, data security in healthcare application is becoming a bigger problem.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2366
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Providing the incidence has the potential to result in considerable harm or substantial distress to those effective, the act being
reported to the Information Commissioner Office (ICO) can serve as a financial penalty for a major violation of data protection act.
To make a system secure and protect the data from breaches industry should focus on the loopholes and weak spots that are most
vulnerable and likely to be used by cyber criminals for data breaching. To secure data industries should not go for various system
that design by different IoT designers because the diverse will be the system more loopholes it will create giving better opportunities
to the criminals to hack into the system. To harm patients and doctors, hackers attempt to hack data. When working with sensitive
information while on the go, both patients and doctors are vulnerable to the threat of a data breach [20].
IV. CONCLUSION
IoT has revolutionized all the industries. It has highly impacted the medical industry with two major outcomes lowered costs and
increased efficiency. The regular improvisation in medical sector by the IoT has resulted in improved patient care. The IoT has
evolved from building machine to machine communication and automation towards the smallest and best quality of sensors. Our
research paper has elaborated a review on the security of the IoT based healthcare systems. In this paper we have briefly discussed
the challenges of the IoT based healthcare system. Our paper reviews the potential challenges and threats in the IoT based healthcare
sector and it suggests the opportunities which are yet to be overcome in the healthcare marks.
REFERENCES
[1] Bhatt and S. Chakraborty, “Real-time healthcare monitoring using Smart Systems: A step towards healthcare service orchestration Smart Systems for futuristic
healthcare,” 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), 2021.
[2] D. Anand and A. Kumar, “IOT‐based Automated Healthcare System,” Advanced Healthcare Systems, pp. 335–350, 2022.
[3] Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IOT security: An exhaustive survey on IOT vulnerabilities and a
first empirical look on internet-scale IOT exploitations. IEEE Communications Surveys & Tutorials, 21(3), 2702–2733.
https://doi.org/10.1109/comst.2019.2910750
[4] H. Yüksel, “IOT-based Smart Healthcare Monitoring System,” Healthcare Monitoring and Data Analysis using IoT: Technologies and applications, pp. 71–98,
2022.
[5] Y. Maleh, M. Shojafar, A. Darwish, and A. Haqiq, “Cyber-physical systems: Vulnerabilities, attacks and threats,” Cybersecurity and Privacy in Cyber-Physical
Systems, pp. 1–1, 2019.
[6] Meneghello, F., Calore, M., Zucchetto, D., Polese, M., & Zanella, A. (2019). IOT: Internet of threats? A survey of practical security vulnerabilities in real IOT
devices. IEEE Internet of Things Journal, 6(5), 8182–8201. https://doi.org/10.1109/jiot.2019.2935189
[7] Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2018). Evaluating critical security issues of the IOT World: Present and future challenges. IEEE Internet of
Things Journal, 5(4), 2483–2495. https://doi.org/10.1109/jiot.2017.2767291
[8] Taimoor, N., & Rehman, S. (2022). Reliable and resilient AI and IOT-based personalised healthcare services: A survey. IEEE Access, 10, 535–563.
https://doi.org/10.1109/access.2021.3137364
[9] D. Roach, “Use of comparative vacuum monitoring sensors for automated, wireless health monitoring of bridges and infrastructure,” Maintenance, Safety,
Risk, Management and Life-Cycle Performance of Bridges, pp. 2747–2751, 2018.
[10] Y. Yang and C. Stohl, “The appropriation of traditional media content in online contexts: A South Korean textbook case,” Communication Monographs, vol.
87, no. 1, pp. 92–113, 2019.
[11] M. S. Husain and D. M. Haroon, “An enriched information security framework from various attacks in the IOT,” International Journal of Innovative Research
in Computer Science & Technology, vol. 8, no. 4, 2020.
[12] D. Gupta, S. Rani, and S. H. Shah, “ICN‐Fog computing for iot‐based Healthcare,” IoT‐Enabled Smart Healthcare Systems, Services and Applications, pp. 19–
37, 2022.
[13] Kashyap, A. Kumar, A. Kumar, and Y.-C. Hu, “A systematic survey on fog and IOT Driven Healthcare: Open challenges and research issues,” Electronics, vol.
11, no. 17, p. 2668, 2022.
[14] N. K. Narang, “IOT standards: Mentor's musings on ‘Standardization imperatives for digital transformation of healthcare,’” IEEE Internet of Things Magazine,
vol. 4, no. 2, pp. 52–59, 2021.
[15] B. Chander, “Wireless Body Sensor Networks for Patient Health Monitoring,” Advances in Healthcare Information Systems and Administration, pp. 132–154,
2020.
[16] N. A. Hassan, “Enterprise defense strategies against ransomware attacks,” Ransomware Revealed, pp. 115–154, 2019.
[17] I. P. McLoughlin, K. Garrety, R. Wilson, P. Yu, and A. Dalley, “The troubled history of implementing ehrs,” The Digitalization of Healthcare, pp. 23–40, 2017.
[18] A. Sabban, “Wearable antennas in vicinity of human body for 5G, IOT and medical applications,” Wearable Systems and Antennas Technologies for 5G, IOT
and Medical Systems, pp. 491–517, 2020.
[19] A. Sawabe and T. Iwai, “A QoS model to identify required qos for guaranteeing quality of internet video streaming services,” ICC 2021 - IEEE International
Conference on Communications, 2021.
[20] D. Hallinan, “Opinions ∙ data protection without data: Could data protection law apply without personal data being processed?,” European Data Protection Law
Review, vol. 5, no. 3, pp. 293–299, 2019
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2367