Enabling Artificial Intelligence of Things (AIoT) Healthcare Architectures and Listing Security Issues

Author:

Pise Anil Audumbar123ORCID,Almuzaini Khalid K.4ORCID,Ahanger Tariq Ahamed5ORCID,Farouk Ahmed6,pant Kumud7,Pareek Piyush Kumar8ORCID,Nuagah Stephen Jeswinde9ORCID

Affiliation:

1. FinalMile Consultants Private Limited, Johannesburg, South Africa

2. School of Computer Science and Applied Mathematics, University of the Witwatersrand, Johannesburg, South Africa

3. Department of Sustainable Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Saveetha Nagar, Chennai 602105, Thandalam, Tamil Nadu, India

4. National Center for Cybersecurity Technologies, Riyadh, Saudi Arabia

5. College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia

6. Department of Computer Science, Faculty of Computers and Artificial Intelligence, South Valley University, Hurghada, Egypt

7. Department of Biotechnology, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India

8. Department of Computer Science & Engineering & Head of IPR Cell, Nitte Meenakshi Institute of Technology, Bengaluru, India

9. Department of Electrical Engineering, Tamale Technical University, Tamale, Ghana

Abstract

A significant study has been undertaken in the areas of health care and administration of cutting-edge artificial intelligence (AI) technologies throughout the previous decade. Healthcare professionals studied smart gadgets and other medical technologies, along with the AI-based Internet of Things (IoT) (AIoT). Connecting the two regions makes sense in terms of improving care for rural and isolated resident individuals. The healthcare industry has made tremendous strides in efficiency, affordability, and usefulness as a result of new research options and major cost reductions. This includes instructions (AIoT-based) medical advancements can be both beneficial and detrimental. While the IoT concept undoubtedly offers a number of benefits, it also poses fundamental security and privacy concerns regarding medical data. However, resource-constrained AIoT devices are vulnerable to a number of assaults, which can significantly impair their performance. Cryptographic algorithms used in the past are inadequate for safeguarding IoT-enabled networks, presenting substantial security risks. The AIoT is made up of three layers: perception, network, and application, all of which are vulnerable to security threats. These threats can be aggressive or passive in nature, and they can originate both within and outside the network. Numerous IoT security issues, including replay, sniffing, and eavesdropping, have the ability to obstruct network communication. The AIoT-H application is likely to be explored in this research article due to its potential to aid with existing and different technologies, as well as bring useful solutions to healthcare security challenges. Additionally, every day, several potential problems and inconsistencies with the AIoT-H technique have been discovered.

Funder

National Center for Cybersecurity Technologies

Publisher

Hindawi Limited

Subject

General Mathematics,General Medicine,General Neuroscience,General Computer Science

Cited by 43 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Enhanced heart disease prediction in remote healthcare monitoring using IoT-enabled cloud-based XGBoost and Bi-LSTM;Alexandria Engineering Journal;2024-10

2. Attacks, Challenges, and Countermeasures for an Integrated IoT Framework;Internet of Things and Cloud Computing;2024-08-15

3. Artificial Intelligence of Things (AIoT) Technologies, Benefits and Applications;2024 4th International Conference on Emerging Smart Technologies and Applications (eSmarTA);2024-08-06

4. Artificial Intelligence of Things (AIoT) for smart agriculture: A review of architectures, technologies and solutions;Journal of Network and Computer Applications;2024-08

5. Security Challenges in Storing and Exchanging Medical Information;Advances in Medical Diagnosis, Treatment, and Care;2024-05-31

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3