The impact of Internet of Things has been revolutionized in all fields of life, but its impact on the healthcare system has been significant due to its cutting edge transition. The role of Internet of Things becomes more dominant when it is supported by the features of mobile computing. The mobile computing extends the functionality of IoT in healthcare environment by bringing a massive support in the form of mobile health (m-health). In this research, a systematic literature review protocol is proposed to study how mobile computing assists IoT applications in healthcare, contributes to the current and future research work of IoT in the healthcare system, brings privacy and security in health IoT devices, and affects the IoT in the healthcare system. Furthermore, the intentions of the paper are to study the impacts of mobile computing on IoT in healthcare environment or smart hospitals in light of our systematic literature review protocol. The proposed study reports the papers that were included based on filtering process by title, abstract, and contents, and a total of 116 primary studies were included to support the proposed research. These papers were then analysed for research questions defined for the proposed study.
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, actuators, transceivers, or other wearable devices. Data in the IoT environment is susceptible to many threats, attacks, and risks. Therefore, a robust security mechanism is indispensable to cope with attacks, vulnerabilities, security, and privacy challenges related to IoT. In this research, a systematic literature review has been conducted to analyze the security of IoT devices and to provide the countermeasures in response to security problems and challenges by using mobile computing. A comprehensive and in-depth security analysis of IoT devices has been made in light of mobile computing, which is a novel approach. Mobile computing's technological infrastructures such as smartphones, services, policies, strategies, and applications are employed to tackle and mitigate these potential security threats. In this paper, the security challenges and problems of IoT devices are identified by a systematic literature review. Then, mobile computing has been used to address these challenges by providing potential security measures and solutions. Hardware and software-based solutions furnished by mobile computing towards the IoT security challenges have been elaborated. To the best of our knowledge, this is the first attempt to analyze the security issues and challenges of IoT in light of mobile computing and it will open a gateway towards future research. INDEX TERMS Internet of Things devices, Security, Mobile Computing, Mobile applications, Smartphone. I. Research Questions Keywords What are the security problems and challenges faced by IoT devices in the network? Inclusion Criteria Research papers published in English language were included Primary studies i.e. original research papers were selected Research papers, book chapters or magazines relevant to our main topic were selected Research papers ranges in years from 2011 to 2019 were included for the studies Exclusion Criteria Papers written other than English language are not included Papers did not answer research questions or did not define the topic properly were excluded Gray papers were excluded Elimination of duplicated papers Research papers with less than three pages were removed
Security has become a vital factor for any Internet of things network but it is of paramount importance for Internet of Health Things (IoHT). IoHT also known as Internet of Medical Things (IoMT) is integration of IoT and healthcare environment, where fragile data related to the patients is transmitted from IoT devices to server. During this transmission, if, any eavesdropping or intrusion occurs then it will not only lead to the serious mutilation of entire network but this data will be handled maliciously for wrong doings as well. Therefore, a proper security is indispensable for IoHT based equipments due to exposure to different attacks. Security of IoHT has been the burning issue in last couple of years. In this regard different security models, surveys, frameworks have been presented. In this paper, a proposed Identified Security Attributes (ISA) framework is presented to evaluate the security features of IoHT based device in healthcare environment. The proposed framework uses hybrid MCDM methods such as Analytical Hierarchical Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). This framework works in two phase: in first phase the weights of attributes are derived by using AHP method and in second phase security assessment of alternatives is performed based upon security criteria by using TOPSIS method. The outcomes of proposed security assessment framework demonstrate that the reliable and secure alternative among alternatives is selected in IoMT system. This approach can be used as a guideline for future use in IoMT systems or any other IoT based domain. To the best of our knowledge, it is novel approach to address the security assessment of IoT and these MCDM methods have never been used before for assessment and decision making in IoHT system for security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.