Enabling Artificial Intelligence of Things (AIoT) Healthcare Architectures and Listing Security Issues.

Journal: Computational intelligence and neuroscience
Published Date:

Abstract

A significant study has been undertaken in the areas of health care and administration of cutting-edge artificial intelligence (AI) technologies throughout the previous decade. Healthcare professionals studied smart gadgets and other medical technologies, along with the AI-based Internet of Things (IoT) (AIoT). Connecting the two regions makes sense in terms of improving care for rural and isolated resident individuals. The healthcare industry has made tremendous strides in efficiency, affordability, and usefulness as a result of new research options and major cost reductions. This includes instructions (AIoT-based) medical advancements can be both beneficial and detrimental. While the IoT concept undoubtedly offers a number of benefits, it also poses fundamental security and privacy concerns regarding medical data. However, resource-constrained AIoT devices are vulnerable to a number of assaults, which can significantly impair their performance. Cryptographic algorithms used in the past are inadequate for safeguarding IoT-enabled networks, presenting substantial security risks. The AIoT is made up of three layers: perception, network, and application, all of which are vulnerable to security threats. These threats can be aggressive or passive in nature, and they can originate both within and outside the network. Numerous IoT security issues, including replay, sniffing, and eavesdropping, have the ability to obstruct network communication. The AIoT-H application is likely to be explored in this research article due to its potential to aid with existing and different technologies, as well as bring useful solutions to healthcare security challenges. Additionally, every day, several potential problems and inconsistencies with the AIoT-H technique have been discovered.

Authors

  • Anil Audumbar Pise
    FinalMile Consultants Private Limited, Johannesburg, South Africa.
  • Khalid K Almuzaini
    National Center for Cybersecurity Technologies, Riyadh, Saudi Arabia.
  • Tariq Ahamed Ahanger
    College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia.
  • Ahmed Farouk
    Department of Computer Science, Faculty of Computers and Artificial Intelligence, South Valley University, Hurghada, Egypt.
  • Kumud Pant
    Department of Biotechnology, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India.
  • Piyush Kumar Pareek
    Department of Computer Science & Engineering & Head of IPR Cell, Nitte Meenakshi Institute of Technology, Bengaluru, India.
  • Stephen Jeswinde Nuagah
    Department of Electrical Engineering, Tamale Technical University, Tamale, Ghana.