Healthcare Internet of Things (H-IoT): Current Trends, Future Prospects, Applications, Challenges, and Security Issues

被引:44
作者
Kumar, Mohit [1 ]
Kumar, Ashwani [2 ]
Verma, Sahil [3 ]
Bhattacharya, Pronaya [4 ]
Ghimire, Deepak [5 ]
Kim, Seong-heum [5 ]
Hosen, A. S. M. Sanwar [6 ]
机构
[1] MIT Art Design & Technol Univ, Dept IT, Pune 412201, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Delhi NCR Campus, Ghaziabad 201204, India
[3] Uttranchal Univ, Dept Comp Sci & Engn, Dehra Dun 248007, India
[4] Amity Univ, Amity Sch Engn & Technol, Dept Comp Sci & Engn, Res & Innovat Cell, Kolkata 700157, India
[5] Soongsil Univ, Coll Informat Technol, Sch AI Convergence, Seoul 06978, South Korea
[6] Woosong Univ, Dept Artificial Intelligence & Big Data, Daejeon 34606, South Korea
基金
新加坡国家研究基金会;
关键词
healthcare; IoT; big data; block chain; edge computing; software defined networks; machine learning; deep learning; BIG DATA; ENABLING TECHNOLOGIES; SYSTEM; FRAMEWORK; CLOUD; PREDICTION; BLOCKCHAIN; ALGORITHM; STORAGE;
D O I
10.3390/electronics12092050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advancements in Healthcare Internet of Things (H-IoT) systems have created new opportunities and solutions for healthcare services, including the remote treatment and monitoring of patients. In addition, the security and privacy of personal health data must be ensured during data transfer. Security breaches in H-IoT can have serious safety and legal implications. This comprehensive review provides insights about secured data accession by employing cryptographic platforms such as H-IoT in big data, H-IoT in blockchain, H-IoT in machine learning and deep learning, H-IoT in edge computing, and H-IoT in software-defined networks. With this information, this paper reveals solutions to mitigate threats caused by different kinds of attacks. The prevailing challenges in H-IoT systems, including security and scalability challenges, real-time operating challenges, resource constraints, latency, and power consumption challenges are also addressed. We also discuss in detail the current trends in H-IoT, such as remote patient monitoring and predictive analytics. Additionally, we have explored future prospects, such as leveraging health data for informed strategic planning. A critical analysis performed by highlighting the prevailing limitations in H-IoT systems is also presented. This paper will hopefully provide future researchers with in-depth insights into the selection of appropriate cryptographic measures to adopt an energy-efficient and resource-optimized healthcare system.
引用
收藏
页数:19
相关论文
共 88 条
[1]  
Abhishek G., 2012, Network intrusion detection types and analysis of their tools
[2]  
department of computer science and information technology
[3]   A Highly Effective Route for Real-Time Traffic Using an IoT Smart Algorithm for Tele-Surgery Using 5G Networks [J].
Abujassar, Radwan S. ;
Yaseen, Husam ;
Al-Adwan, Ahmad Samed .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2021, 10 (02)
[4]   Approaches Based on Artificial Intelligence and the Internet of Intelligent Things to Prevent the Spread of COVID-19: Scoping Review [J].
Adly, Aya Sedky ;
Adly, Afnan Sedky ;
Adly, Mahmoud Sedky .
JOURNAL OF MEDICAL INTERNET RESEARCH, 2020, 22 (08)
[5]   A Framework for Pandemic Prediction Using Big Data Analytics [J].
Ahmed, Imran ;
Ahmad, Misbah ;
Jeon, Gwanggil ;
Piccialli, Francesco .
BIG DATA RESEARCH, 2021, 25
[6]  
Akhtar MAK, 2021, Advancements in security and privacy initiatives for multimedia images, P214
[7]   PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices [J].
Alabdulkarim, Alia ;
Al-Rodhaan, Mznah ;
Ma, Tinghuai ;
Tian, Yuan .
SENSORS, 2019, 19 (01)
[8]   A Novel Low-Latency and Energy-Efficient Task Scheduling Framework for Internet of Medical Things in an Edge Fog Cloud System [J].
Alatoun, Kholoud ;
Matrouk, Khaled ;
Mohammed, Mazin Abed ;
Nedoma, Jan ;
Martinek, Radek ;
Zmij, Petr .
SENSORS, 2022, 22 (14)
[9]   Evolving CNN with Paddy Field Algorithm for Geographical Landmark Recognition [J].
Bansal, Kanishk ;
Singh, Amar ;
Verma, Sahil ;
Kavita ;
Jhanjhi, Noor Zaman ;
Shorfuzzaman, Mohammad ;
Masud, Mehedi .
ELECTRONICS, 2022, 11 (07)
[10]   STHM: A Secured and Trusted Healthcare Monitoring Architecture Using SDN and Blockchain [J].
Barka, Ezedin ;
Dahmane, Sofiane ;
Kerrache, Chaker Abdelaziz ;
Khayat, Mohamad ;
Sallabi, Farag .
ELECTRONICS, 2021, 10 (15)