2023
DOI: 10.3991/ijoe.v19i02.37069
|View full text |Cite
|
Sign up to set email alerts
|

Data Security Mechanisms, Approaches, and Challenges for e-Health Smart Systems

Abstract: In the new era, the trend of using wearable devices and smart accessories gained considerable popularity and become a necessity utility for human life due to their major role to keep monitoring health conditions and providing healthcare services. The combination of IoT networks with edge computing paradigms develops an intelligent e-health system that aims to monitor different real-time scenarios. The deployment of an e-health system exposes several challenges regarding the security and privacy aspects, partic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 68 publications
0
1
0
Order By: Relevance
“…RL emerges as an effective method for malware detection in IoMT, leveraging feedback mechanisms to enhance decision-making. Studies by Alavizadeh et al [14] and Rafik et al [15] demonstrate RL's efficacy, with deep Q-learning algorithms detecting intrusions with high accuracy. RL's adaptability to evolving threats and its real-time operation highlight its potential in securing IoMT devices, despite challenges such as the need for substantial training data and algorithm complexity.…”
Section: Reinforcement Learningmentioning
confidence: 99%
“…RL emerges as an effective method for malware detection in IoMT, leveraging feedback mechanisms to enhance decision-making. Studies by Alavizadeh et al [14] and Rafik et al [15] demonstrate RL's efficacy, with deep Q-learning algorithms detecting intrusions with high accuracy. RL's adaptability to evolving threats and its real-time operation highlight its potential in securing IoMT devices, despite challenges such as the need for substantial training data and algorithm complexity.…”
Section: Reinforcement Learningmentioning
confidence: 99%
“…This must be designed from an overall system security perspective and ensure that security requirements are fully considered when designing and implementing the system. Software design and architecture based on security best practices implement appropriate authorization and access control mechanisms, as well as effective authentication and authorization mechanisms [9][10]. Sensitive data must be encrypted, stored, transmitted and processed using appropriate encryption algorithms and protocols to ensure that data is not easily stolen, altered or disclosed during storage and transmission.…”
Section: Versioning and Updatingmentioning
confidence: 99%
“…Edge computing is considered a closer resource gateway to the end user [1], which offers low latency, storage, and computing resources. This technology is exploited to enable the cryptographic tool GPG for conducting data processing operations, based on various supported cryptographic mechanisms and algorithms as listed in the Table 2.…”
Section: Encryption Decryption and Digital Signature Processes Levera...mentioning
confidence: 99%
“…Exchange Data over multiple entities has increased recently in different sectors, due to the high digitalization expansion over various industries including Education, Financial Services, Commerce, and Healthcare sector. Health services have increased recently due to the expansion of viral and chronic diseases which raise medical requirements [1]. However, the Traditional e-health smart systems are revolutionizing the healthcare industry by providing medical services closer to end users based on multiple typical layers such as edge computing, Internet of Medical Things "IoMT" and Cloud computing technologies [1], which aim to manage medical records that are commonly known as Electronic Health Records "EHR".…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation