Abstract
The Internet of Things (IoT) is an imagines unavoidable, associated, and hubs connecting independently while offering a wide range of administrations. Wide conveyance, receptiveness and moderately high handling intensity of IoT objects made them a perfect focus for digital assaults. Additionally, the same number of IoT center points is assembling and taking care of private data, they are changing into a goldmine of information for malignant on-screen characters. Subsequently, security and particularly the capacity to recognize traded off hubs, together with gathering and safeguarding confirmations of an assault or malignant exercises develop as a need in effective arrangement of IoT systems. This paper is deal with some major security problems and challenging factors of IoT. This IoT security issues on really challenging factor in current world.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Domdouzis, K., Kumar, B., Anumba, C.: Radio-frequency identification (RFID) applications: a brief introduction. Adv. Eng. Inform. 21, 350–355 (2007)
Jayapandian, N., Rahman, A.M.Z., Poornima, U., Padmavathy, P.: Efficient online solar energy monitoring and electricity sharing in home using cloud system. In: International Conference on Green Engineering and Technologies, Coimbatore, pp. 1–5. IEEE (2015)
Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: International Conference on the Internet of Things, pp. 389–395 (2010)
Jayapandian, N., Md Zubair Rahman, A.M.J.: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Clust. Comput. 20, 1561–1573 (2017)
Stergiou, C., Psannis, K.E., Kim, B.G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964–975 (2018)
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29, 1645–1660 (2013)
Jayapandian, N., Md Zubair Rahman, A.M.J.: Secure deduplication for cloud storage using interactive message-locked encryption with convergent encryption, to reduce storage space. Braz. Arch. Biol. Technol. 61, 1–13 (2018)
Weber, R.H.: Internet of Things-new security and privacy challenges. Comput. Law Secur. Rev. 26, 23–30 (2010)
Acquisti, A.: Privacy and security of personal information. In: International Conference on Economics of Information Security, pp. 179–186. Springer, Boston (2004)
Zgheib, R., Conchon, E., Bastide, R.: Engineering IoT healthcare applications: towards a semantic data driven sustainable architecture. In: International Conference in eHealth, vol. 360, pp. 409–418. Springer, Berlin (2017)
Bhatt, C., Dey, N., Ashour, A.S. (eds.): Internet of Things and Big Data Technologies for Next Generation Healthcare. Springer, Berlin (2017)
Kang, K., Pang, Z.B., Wang, C.: Security and privacy mechanism for health internet of things. J. China Univ. Posts Telecommun. 20, 64–68 (2013)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Bitra, V.S., Jayapandian, N., Balachandran, K. (2019). Internet of Things Security and Privacy Issues in Healthcare Industry. In: Hemanth, J., Fernando, X., Lafata, P., Baig, Z. (eds) International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. ICICI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-030-03146-6_111
Download citation
DOI: https://doi.org/10.1007/978-3-030-03146-6_111
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03145-9
Online ISBN: 978-3-030-03146-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)