Secure and privacy preserving predictive framework for iot based health cloud system using cryptographic modfels DOI
С. С. Давлатов, Navruzbek Qurbonov,

Aziza Yunusova

et al.

Deleted Journal, Journal Year: 2024, Volume and Issue: 3

Published: Dec. 30, 2024

The Internet of Things (IoT) is one the most well-liked developing technologies in IT sector these days. defined as a network physical objects that are intelligent and connected. Through use wired or wireless networks, sensors integrated into physically connected communicate with another. interconnectedness, intelligence, dynamic nature, sensing, large scale, heterogeneity, security its salient characteristics. A consumer can access variety cloud services, including database, application, storage, through network. provides wide range field applications for ongoing monitoring many industries, healthcare. Numerous studies conducted to guarantee patient data privacy. Another challenging component health systems from IoT devices predict disease. Protecting confidential information unauthorised necessary increase security. To improve privacy, classical cryptographic algorithms have been applied. Nevertheless, some issues privacy persist due inadequate As result, this paper suggests an innovative method protect suggested EGEC encryption system be used by users who possess decrypt like addition multiplication carried out.

Language: Английский

CYBERSECURITY CHALLENGES IN THE AGE OF AI: THEORETICAL APPROACHES AND PRACTICAL SOLUTIONS DOI Creative Commons

Babajide Tolulope Familoni

Computer Science & IT Research Journal, Journal Year: 2024, Volume and Issue: 5(3), P. 703 - 724

Published: March 22, 2024

In the ever-evolving landscape of cybersecurity, proliferation artificial intelligence (AI) technologies introduces both promising advancements and daunting challenges. This paper explores theoretical underpinnings practical implications addressing cybersecurity challenges in age AI. With integration AI into various facets digital infrastructure, including threat detection, authentication, response mechanisms, cyber threats have become increasingly sophisticated difficult to mitigate. Theoretical approaches delve understanding intricate interplay between algorithms, human behavior, adversarial tactics, elucidating underlying mechanisms attacks defense strategies. However, this complexity also engenders novel vulnerabilities, as AI-driven leverage machine learning algorithms evade traditional security measures, posing formidable organizations across sectors. As such, solutions necessitate a multifaceted approach, encompassing robust intelligence, adaptive ethical considerations safeguard against effectively. Leveraging for holds promise enhancing detection capabilities, automating actions, augmenting analysts' capabilities. Yet, inherent limitations, such algorithmic biases, data privacy concerns, potential AI-enabled attacks, underscore need comprehensive risk management framework. Regulatory frameworks industry standards play crucial role shaping development deployment AI-powered solutions, ensuring accountability, transparency, compliance with principles. Moreover, fostering interdisciplinary collaboration investing education training are vital cultivating skilled workforce equipped navigate evolving landscape. By integrating insights strategies, elucidates key opportunities securing systems, offering policymakers, researchers, practitioners alike. Keywords: Cybersecurity; Artificial Intelligence; Threat Detection; Defense Strategies; Ethical Considerations; Frameworks.

Language: Английский

Citations

55

6G and intelligent healthcare: Taxonomy, technologies, open issues and future research directions DOI
Abdul Ahad,

Zheng Jiangbina,

Mohammad Tahir

et al.

Internet of Things, Journal Year: 2024, Volume and Issue: 25, P. 101068 - 101068

Published: Jan. 12, 2024

Language: Английский

Citations

33

Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles DOI Creative Commons
Guma Ali, Maad M. Mijwil

Deleted Journal, Journal Year: 2024, Volume and Issue: 4(2), P. 20 - 62

Published: May 23, 2024

Cutting-edge technologies have been widely employed in healthcare delivery, resulting transformative advances and promising enhanced patient care, operational efficiency, resource usage. However, the proliferation of networked devices data-driven systems has created new cybersecurity threats that jeopardize integrity, confidentiality, availability critical data. This review paper offers a comprehensive evaluation current state context smart healthcare, presenting structured taxonomy its existing cyber threats, mechanisms essential roles. study explored (SHSs). It identified discussed most pressing attacks SHSs face, including fake base stations, medjacking, Sybil attacks. examined security measures deployed to combat SHSs. These include cryptographic-based techniques, digital watermarking, steganography, many others. Patient data protection, prevention breaches, maintenance SHS integrity are some roles ensuring sustainable healthcare. The long-term viability depends on constant assessment risks harm providers, patients, professionals. aims inform policymakers, practitioners, technology stakeholders about imperatives best practices for fostering secure resilient ecosystem by synthesizing insights from multidisciplinary perspectives, such as cybersecurity, management, sustainability research. Understanding recent is controlling escalating networks encouraging intelligent delivery.

Language: Английский

Citations

8

A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities DOI Creative Commons
Arezou Naghib,

Farhad Soleimanian Gharehchopogh,

Azadeh Zamanifar

et al.

Artificial Intelligence Review, Journal Year: 2025, Volume and Issue: 58(4)

Published: Jan. 30, 2025

Language: Английский

Citations

1

FSRW: fuzzy logic-based whale optimization algorithm for trust-aware routing in IoT-based healthcare DOI Creative Commons

Hui Xu,

Weidong Liu, Lu Li

et al.

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: July 18, 2024

Abstract The Internet of Things (IoT) is an extensive system interrelated devices equipped with sensors to monitor and track real world objects, spanning several verticals, covering many different industries. IoT's promise capturing interest as its value in healthcare continues grow, it can overlay on top challenges dealing the rising burden chronic disease management aging population. To address difficulties associated IoT-enabled healthcare, we propose a secure routing protocol that combines fuzzy logic Whale Optimization Algorithm (WOA) hierarchically. suggested method consists two primary approaches: trust strategy WOA-inspired clustering methodology. first methodology plays critical role determining trustworthiness connected IoT equipment. Furthermore, WOA-based framework implemented. A fitness function assesses likelihood acting cluster heads. This formula considers factors such centrality, range communication, hop count, remaining energy, trustworthiness. Compared other algorithms, proposed outperformed them terms network lifespan, energy usage, packet delivery ratio by 47%, 58%, 17.7%, respectively.

Language: Английский

Citations

4

CVLSTMLW-CNN: A IoT-Enabled Hybrid CNN Model for Heart Disease Prediction DOI
Shikha Singh, Archana Singh,

Sanjay Singh

et al.

Published: Jan. 1, 2025

Language: Английский

Citations

0

AI for Cyber-Security in E-Health Ensuring Security and Privacy of Patient Data and Information DOI
Bhupinder Singh, Christian Kaunert, Anjali Raghav

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 293 - 314

Published: Feb. 28, 2025

This digital transformation brings forth significant challenges related to cyber-security, particularly in safeguarding the security and privacy of patient data information. Artificial intelligence has great promise healthcare industry because its capacity mimic human cognitive processes carry out activities that traditionally needed intellect. There are various artificial (AI) techniques, such as computer vision, natural language processing machine learning algorithms which enable systems immediately produce actionable insights, analyze large datasets reveal complex patterns. With employing these capabilities, practitioners may improve clinical judgment, optimize treatment strategies effectively manage resources, all lead better outcomes a more efficient system. chapter focuses on intersection AI, E-Health, examining current legal landscape proposing futuristic approach for securing smart systems.

Language: Английский

Citations

0

Overcoming barriers and seizing opportunities in the innovative adoption of next-generation digital technologies DOI Creative Commons
Jinglin Xiao, Zeshui Xu, Anran Xiao

et al.

Journal of Innovation & Knowledge, Journal Year: 2024, Volume and Issue: 9(4), P. 100622 - 100622

Published: Oct. 1, 2024

Language: Английский

Citations

2

Securing industry 5.0 using 6σ CYBERNETIC framework DOI Creative Commons

Lubna Luxmi Dhirani,

Thomas Newe

Mehran University Research Journal of Engineering and Technology, Journal Year: 2024, Volume and Issue: 43(2), P. 220 - 220

Published: April 7, 2024

The data-driven digital economy highly relies on immersive and emerging technologies, mass customisation, autonomous systems, seamless connectivity. Enabling such an Industrial IoT/Industry 5.0 environment requires streamlined end-to-end transparent methods for insights, visibility, control. However, it is important to note that its success depends data security metrics. recent cyber-attacks in healthcare industrial infrastructures have led service providers high-risk scenarios. From supply chain delivery, remote functionality variables, enabling a fully connected factory major cybersecurity concern as technologies employ different requirements. To mitigate these risks, strategic, operational, technical, alignment must, where the gaps between production process environments must be bridged achieve prime goal of sustainable, secure, technologically innovative factory. This research provides systematic approach bridging Industry 5.0’s QoS metrics by implementing Six Sigma (6σ) manufacturing environment. further maps IT/OT, cloud, standards, thereby A use-case demonstrated show how 6σ implementation can improve metrics, unifying standards resilient, high-performance

Language: Английский

Citations

1

Time Series Anomaly Detection with CNN for Environmental Sensors in Healthcare-IoT DOI
Mirza Akhi Khatun,

Mangolika Bhattacharya,

Ciarán Eising

et al.

2022 IEEE 10th International Conference on Healthcare Informatics (ICHI), Journal Year: 2024, Volume and Issue: unknown, P. 522 - 524

Published: June 3, 2024

Language: Английский

Citations

1