100% (1)
page:
5 pages/≈1375 words
Sources:
0
Style:
APA
Subject:
Technology
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 27
Topic:

Security Challenges in IoT Healthcare Research Assignment

Other (Not Listed) Instructions:

IoT Healthcare Security

Security Requirements

Confidentiality

Integrity

Authentication

Other (Not Listed) Sample Content Preview:

Security Challenges in IoT Healthcare
Student’s Name
Institutional Affiliation
Security Challenges in IoT Healthcare
Internet of things (IoT) refers to the process of inter-networking of physical devices such as vehicles, buildings, actuators, electronics, software, sensors as well networking connectivity that helps these objects to exchange data. In other words, IoT is a system of interconnected computing devices, objects, animals, people as well as both mechanical and digital machines to boost the transmission of data with the aid of unique identifiers without requiring either human-to-human or human-to-computer interaction. In the intensity of the internet growth, IoT systems are also victims of cybercrime since it is applied in many practices such as banking, healthcare, government systems, army, and other business operations that prone to crime. As a preventive measure, there are security control strategy that are installed to protect the objectivity and enhance the effectiveness of the system. Security requirements for IoT-based healthcare solutions have similar elements and functions similar to those in standard communications scenarios. Consequently, to attain a secured services, it is essential to pay much attention on aspects of confidentiality, integrity, authentication, availability, authorization, fault tolerance and self-healing mechanism
First, confidentiality is a vital principle that guarantees maximum protection of medical information against unauthorized personnel. This is boosted by gears such as passwords protected system, random checks, strict administrative procedures, restricted print permission, data encryption, physical guarding and limited access of data by staffs to keep data private. In addition, private messages tend to hide their contents to eavesdroppers and other malicious hackers. Second, integrity is about honesty to boost credibility of an institution or a particular process. Integrity ensures that the protection of medical information for unauthorized users is robust. In addition, confidential messages resist revealing their content to eavesdroppers who can be hunting down such data for their personal gain. Third, authentication enables an IoT health device to ensure the identity of the peer with which it is communicating. This helps to identify foreign attacks of malicious personnel on the security devices. Fourth, Availability guarantees survivability and accessibility of both local and cloud IoT healthcare services to the authorized staff when needed. This is done by limiting access of the vital information from reach of other members. Fifth, authorization is a set of guidelines and rules that are programmed to allow only the approved personnel to access the network services or resources. This can be done through administrative policies and use of gadgets that allows only authorized persons to access certain materials. Sixth, fault tolerance entails setting up security devices in a manner that they will continue working and and delivering security services even if they are damaged or they experiencing problems such as software glitch, device compromise and device failure. This helps to remove cases of sidestepping and ensure the security system to operate 24/7. Lastly, through self-healing, medical device in an IoT healthcare network are set to remain working upon device failures especially due to lack of energy.
Security Challenges
However, IoT healthcare security measures and plans are not inevitable from shortcoming or limitation because IoT security requirements are not ensured by traditional security techniques, novel counter strategies are required to sought new challenges posed by the IoT. The Challenges for secure IoT healthcare services include; computation limitation, memory limitations energy limitations, scalability, communications media, multiplicity of devices and dynamic security update
Computational limitations refers to the shortcomings that are inevitable as they are inbuilt by the manufacturers of the security devices and cannot be easily adjusted. Typically, IoT health machines are rooted with less speedy processors. For example, the central processing unit (CPU) embedded in such gadgets tend to be less speedy thus becoming less very powerful. In addition, these devices cannot perform computationally expensive operations since they are not designed with features that can carry out such procedures. A sensor acuter is the only device that can undertake such roles. Therefore, settle to a solution that can eliminate or minimizes resource consumption and thus maximizes security performance is a challenging task.
Another problem is the memory limitations since most of IoT healthcare devices have low on-device memory. Such gadgets are initiated using a rooted operating system (OS), system software, and an application binary. Consequently, their memory may not be adequate to implement complex security protocols.
Energy limitations involves aspects problems such as power outage or insufficient energy or small machines that uses unreliable source of energy such as batteries to operate For example, a typical IoT healthcare system comprises of small health devices that are restricted to batteries as source of power like a body temperature and BP sensors, Such devices safeguard energy using power-saving mode when no sensor reading necessitates to be described. In addition, they operate at a low CPU speed if there is nothing significant to be administered. Therefore, the energy constraint property of IoT health devices makes finding an energy-aware security solution challenging especially with the pressure from environmental regulations and compliance
The problem of device mobility has post to be challenge to manufactures as setting up security systems is a bit tedious. Generally, healthcare device...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!