Enabling Artificial Intelligence of Things (AIoT) Healthcare Architectures and Listing Security Issues.
Autor: | Pise AA; FinalMile Consultants Private Limited, Johannesburg, South Africa.; School of Computer Science and Applied Mathematics, University of the Witwatersrand, Johannesburg, South Africa.; Department of Sustainable Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Saveetha Nagar, Chennai 602105, Thandalam, Tamil Nadu, India., Almuzaini KK; National Center for Cybersecurity Technologies, Riyadh, Saudi Arabia., Ahanger TA; College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia., Farouk A; Department of Computer Science, Faculty of Computers and Artificial Intelligence, South Valley University, Hurghada, Egypt., Pant K; Department of Biotechnology, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India., Pareek PK; Department of Computer Science & Engineering & Head of IPR Cell, Nitte Meenakshi Institute of Technology, Bengaluru, India., Nuagah SJ; Department of Electrical Engineering, Tamale Technical University, Tamale, Ghana. |
---|---|
Jazyk: | angličtina |
Zdroj: | Computational intelligence and neuroscience [Comput Intell Neurosci] 2022 Aug 03; Vol. 2022, pp. 8421434. Date of Electronic Publication: 2022 Aug 03 (Print Publication: 2022). |
DOI: | 10.1155/2022/8421434 |
Abstrakt: | A significant study has been undertaken in the areas of health care and administration of cutting-edge artificial intelligence (AI) technologies throughout the previous decade. Healthcare professionals studied smart gadgets and other medical technologies, along with the AI-based Internet of Things (IoT) (AIoT). Connecting the two regions makes sense in terms of improving care for rural and isolated resident individuals. The healthcare industry has made tremendous strides in efficiency, affordability, and usefulness as a result of new research options and major cost reductions. This includes instructions (AIoT-based) medical advancements can be both beneficial and detrimental. While the IoT concept undoubtedly offers a number of benefits, it also poses fundamental security and privacy concerns regarding medical data. However, resource-constrained AIoT devices are vulnerable to a number of assaults, which can significantly impair their performance. Cryptographic algorithms used in the past are inadequate for safeguarding IoT-enabled networks, presenting substantial security risks. The AIoT is made up of three layers: perception, network, and application, all of which are vulnerable to security threats. These threats can be aggressive or passive in nature, and they can originate both within and outside the network. Numerous IoT security issues, including replay, sniffing, and eavesdropping, have the ability to obstruct network communication. The AIoT-H application is likely to be explored in this research article due to its potential to aid with existing and different technologies, as well as bring useful solutions to healthcare security challenges. Additionally, every day, several potential problems and inconsistencies with the AIoT-H technique have been discovered. Competing Interests: The authors declare that they have no conflicts of interest. (Copyright © 2022 Anil Audumbar Pise et al.) |
Databáze: | MEDLINE |
Externí odkaz: | |
Nepřihlášeným uživatelům se plný text nezobrazuje | K zobrazení výsledku je třeba se přihlásit. |