A Comparative Study in the Application of IoT in Health Care: Data Security in Telemedicine

In Zaigham Mahmood (ed.), Security, Privacy and Trust in the Iot Environment. Springer Verlag. pp. 181-202 (2019)
  Copy   BIBTEX

Abstract

Internet of Things is the backbone of telemedicine and its data security has become a significant concern that requires further attention. Therefore, this study was conducted with the aim of analyzing telemedicine systems, focusing on data security measures. Thirty peer-reviewed research studies published in 2018 were reviewed and compared according to certain parameters, viz., algorithms, IoT sensors, data encryption ability, communication mechanisms, mobile accessibility, protocols, software, and platforms. The results illustrate that transmitting sensitive medical data over the Internet has been identified as a major threat, and solutions such as ciphertext-policy attribute-based encryption and Secure Better Portable Graphics architecture have been developed to authenticate and protect data by concurrent encryption and Watermarking. Furthermore, the comparison reveals that data encryption is the most frequently used secure data transmission method and 32% of the reviewed studies have focused on this. Regarding the most frequently used technologies, Raspberry Pi3Edge platform, TCP/TCP/IP protocol, and ECG and temperature sensors have been discussed. Additionally, telemedicine has focused on standalone systems, and, in this context, integrated systems with micro-services are yet to be improved. Therefore, this study compares and analyzes the significant technical trends, security trends, widely used IoT sensors, platforms, and protocols; the aim is to help the researchers to gain a better insight into telemedicine to improve healthcare services by maximizing the capabilities of Internet of Things.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,423

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.

Analytics

Added to PP
2020-06-17

Downloads
4 (#1,807,317)

6 months
3 (#1,484,930)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references