0% found this document useful (0 votes)
57 views22 pages

Study On Healthcare Security System-Integrated Internet of Things (IoT)

Karthik, S.A., Hemalatha, R., Aruna, R., Deivakani, M., Reddy, R.V.K. and Boopathi, S., 2023. Study on Healthcare Security System-Integrated Internet of Things (IoT). In Perspectives and Considerations on the Evolution of Smart Systems (pp. 342-362). IGI Global.

Uploaded by

wessam.shoman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views22 pages

Study On Healthcare Security System-Integrated Internet of Things (IoT)

Karthik, S.A., Hemalatha, R., Aruna, R., Deivakani, M., Reddy, R.V.K. and Boopathi, S., 2023. Study on Healthcare Security System-Integrated Internet of Things (IoT). In Perspectives and Considerations on the Evolution of Smart Systems (pp. 342-362). IGI Global.

Uploaded by

wessam.shoman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/372807207

Study-on-Healthcare-Security-System-Integrated-Internet-of-Things-(IoT)

Chapter · August 2023


DOI: 10.4018/978-1-6684-7684-0.ch013

CITATIONS READS
47 313

1 author:

Samapth Boopathi
Muthayammal Engineering College
217 PUBLICATIONS 6,290 CITATIONS

SEE PROFILE

All content following this page was uploaded by Samapth Boopathi on 01 August 2023.

The user has requested enhancement of the downloaded file.


342

Chapter 13
Study on Healthcare
Security System-Integrated
Internet of Things (IoT)
S. A. Karthik M. Deivakani
BMS Institute of Technology and Management, PSNA College of Engineering and Technology,
India India

R. Hemalatha R. Vijaya Kumar Reddy


St. Joseph’s College of Engineering, India Koneru Lakshmaiah Education Foundation,
India
R. Aruna
AMC Engineering College, India Sampath Boopathi
Muthayammal Engineering College, India

ABSTRACT
The internet of things (IoT) has the potential to transform healthcare by fusing the most significant tech-
nological and scientific advances in the fields of automation, mobility, and data analytics to improve
patient care. IoT links sensors, actuators, and other devices to a network in order to collect and dissemi-
nate communication messages that an organization may then evaluate. To track health parameters, the
suggested paradigm focuses on sensors, communications protocols, and cloud technologies. The study
looks at the crucial elements of a healthcare IoT system. For the control, security, and protection of IoT
networks, data confidentiality and authentication are crucial. For the purpose of resolving security chal-
lenges, flexible infrastructure is necessary. The goal of the chapter is to discuss IoT security concerns
in healthcare devices and offer recommendations for future research to enhance the use of IoT devices.

INTRODUCTION

Thanks to the abundance of IoT devices that are available in various locations and the enormous amounts
of data and information they contain, Internet of Things (IoT) healthcare systems offer a solid foundation
for smart sensor technology. Huge volumes of data are released by IoT-based healthcare systems, yet

DOI: 10.4018/978-1-6684-7684-0.ch013

Copyright © 2023, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

Study on Healthcare Security System-Integrated Internet of Things (IoT)

security and privacy are crucial concerns. IoT sensors and their released data can be supported by object
and cloud network topologies. The Internet of Things (IoT) is a system of linked, intelligent sensors that
can perceive their surroundings and share data and processes from many areas. It is utilised in a variety
of industries, including smart transportation, finance, railroads, and healthcare. Different domains are
involved with smart IoT-based sensors, particularly in smart healthcare systems. The majority are offered
in stores. IoT infrastructure security design is crucial for a variety of technological, scientific, and com-
mercial reasons, including privacy and security. Security concerns are governed by IoT architectures,
technologies, and design approaches. The internet of things architecture is divided into layers, and each
layer makes use of a different topology and piece of hardware to maintain sensor data standardisation,
privacy protection, and parameter coordination(Polu, 2019).
To track and manage the healthcare system, IoT systems need a range of data and sensors. Wireless
sensors are crucial for distant security, whereas vision-based sensors improve monitoring capacity. These
sensors use the concept of physical position based and are vision-based. Home-based deployment of a
wireless sensor for patient eyesight that is linked to an LPWAN base station and a cloud with machine
learning capabilities (Toghuj & Turab, 2022).

• Smart gadgets are those that can communicate with one another and are connected to a network
or other devices. Since they only make up a minor portion of the notion, it is inaccurate to refer to
them as IoT. It is preferable to refer to intelligent objects or intelligent things rather than merely
devices. IoT may be used for basic calculations, communication, discovery, message reception
and response (Janardhana et al., 2023; Reddy et al., 2023; Selvakumar et al., 2023). The ability
to make anything intelligent is made possible by the fact that sensors are now more affordable,
simple to install, and affordable than ever. They are not required for intelligent things, though.
• Bluetooth, NFC, Wi-Fi, low-power wide-area networks, and LoRa are just a few examples of the
smart objects that require wireless networks to communicate with one another.
• RFID technology is a significant advancement over conventional barcodes because it makes it
possible to create microchips for wireless data exchange. It has writing capabilities, requires no
line-of-sight contact, and can read several tags simultaneously.
• Big data from intelligent objects, such as temperature, pressure, altitude, motion, proximity to oth-
er objects, biometrics, sound, etc., must be combined and analysed using cloud computing. One of
the main problems with IoT is the integration of all this data. A platform called cloud computing
enables on-demand network access to computational resources. It receives data from intelligent
devices, processes and interprets it, and then presents web-based visualisations. As a result, there
will be a large market with lots of potential to add value for IoT application users. These data are
analysed using machine learning techniques and big data analytics. Artificial intelligence known
as machine learning enables computers to become smarter by learning from the data they are fed.
The quantity of data produced by IoT applications necessitates a large increase in storage space,
despite the fact that big data has been a hot issue. Big businesses utilise edge computing to pre-
process data before sending it to the cloud.

Confidentiality is at the nexus of privacy and security in healthcare, where both are mutually ad-
vantageous. The foundation of network security systems are security, privacy, and protection, and IOT
healthcare systems offer five levels: perception layers, edge layers, transport layers, processing layers,
application layers, and business layers. IoT focuses on the autonomous interaction of smart items with-

343

Study on Healthcare Security System-Integrated Internet of Things (IoT)

out requiring people as an intermediary station, in contrast to present technology, which focuses on
communication primarily from gadgets to the end-user. The background interactions, data collection,
and sharing of the connected smart items produce information that is helpful to the end user or have an
impact on their behaviour (Koutras et al., 2020).
The functions of the layers:

• Perception or edge technology layers are critical hardware components that are crucial to the
healthcare industry. Examples include EDI, Smart Camera, WSTN, GSM networks, GPS, PCS,
and RIFD systems. They also include smart remotes, embedded processors, intelligence termi-
nals, and smart processors for monitoring and controlling objects. RFID is a technology that is
utilised for data information and personal identification. It is a mobile, secure device that gathers
data and information for processing and to assist activities related to healthcare monitoring. The
wireless gadget and sensors gather sinks’ data while the chip reader gathers real-time data for
objects and tags for each individual (Boopathi, Siva Kumar, et al., 2023; Harikaran et al., 2023;
Jeevanantham et al., 2023).
• Middleware layer (Network Layer): The network layer or transport layer together with the middle-
ware layer is in charge of managing the hardware and software in healthcare systems. Data min-
ing, data aggregation, semantic and syntactic analysis, data fermentation, data filtering, data con-
trol, data framing, Electronic Product Code (EPC), and Object Naming Service are all involved
(ONS). Data gateway between the network layer and the transport layer is handled by the access
gateway layer. It uses Ethernet, wireless technology, or any other network technology to collect
data from the perception layer.
• Applications layer: Interfacing at the application layer that is answerable, machine-to-machine
communication, end-user services, controlling and interacting with cloud services, and LPWAN
applications.

The Internet of Things (IoT) is a system of linked smart items that may be utilised to change and
enhance our way of life. It may be used to smart and private spaces, healthcare, transportation, and
logistics (Babu et al., 2023; Kumara et al., 2023; Senthil et al., 2023; Vanitha et al., 2023). One signifi-
cant industry that stands to gain from IoT advancements is logistics. Businesses can swiftly respond to
changes in the supply chain thanks to real-time tracking using RFID (Radio Frequency Identification)
and NFC (near-field communication), which helps them plan more effectively and cut back on safety
supplies. This is crucial for transportation in particular (Kang et al., 2021).
Sensors may be installed in vehicles to guarantee safety, and the Internet of Things (IoT) can deliver
real-time data regarding traffic congestion and the healthcare industry. To stop left-in things during
surgery and tool and medicine theft, the IoT enables tracking of moving tags that may be affixed to any
person or object. Real-time, global patient condition monitoring is possible with the use of implanted
or outpatient sensors. The IoT can also help other sectors, such as intelligent environments. In addi-
tion to helping in the personal & social sector, the IoT may assist avoid accidents and conserve energy
in homes, workplaces, and industrial facilities (Chakravarthi et al., 2022; Jeevanantham et al., 2023;
Samikannu et al., 2023).
By reviewing the most recent location information and looking for keywords, RFID devices can
assist us in recovering lost things. Although the Internet of Things (IoT) includes numerous innovative
technologies that show promise, security issues still exist. One of the most valuable resources in any

344

Study on Healthcare Security System-Integrated Internet of Things (IoT)

stream is information, which should be properly preserved. To secure the integrity and confidentiality
of data and operational procedures, security combines technology, operations, and internal controls. By
reviewing the most recent location information and looking for keywords, RFID devices can assist us
in recovering lost things. Although they may be used to track theft, the Internet of Things has security
issues. Any stream’s most valuable asset is information, which should be safeguarded by integrating
internal controls, systems, and operations to guarantee integrity and confidentiality (Boopathi, Arigela,
et al., 2023; Domakonda et al., 2023; Palaniappan et al., 2023; Vennila et al., 2023). Confidentiality,
integrity, availability, authorisation, and non-repudiation are the five information security objectives.

• Confidentiality: Confidentiality means upholding confidentiality while information is being sent.


• Integrity: Information storage modifications must be made by authorised parties through allowed
procedures in order to maintain integrity.
• Availability: Data must be available in order for authorised drugs to use it.
• Authorization: Those with permission to use the information must have access to it.
• Non-repudiation: Who, when, and where must all be mentioned in change documents.

Although the Internet of Things offers numerous innovative technologies that show promise, security
issues still exist. The majority of IoT architectures that have been suggested use server-side design, in
which the server interacts with all of the linked parts, handles all of the administrations, and serves as a
single point of contact for customers. The fundamental layer is the bottom layer and comprises a database
that holds information about every device, including its characteristics, flaws, and connections. While
the Application layer offers services to clients, the Component layer includes programming related to
devices (Boopathi, Khare, et al., 2023; S. et al., 2022; Samikannu et al., 2023; Sampath, C., et al., 2022).
The object layer enables communication between devices and data sharing, while the social layer
controls user application execution, handles requests, and communicates with the application layer on
the server. Multi-sensor imaging is the process of combining relevant data from two or more sensors to
produce a single image that is more informative than each of the input images alone. Thanks to RFID and
sensor technologies, computers can now monitor and understand the environment without being restricted
by human-entered data. In order to collect data and change the types of things that may communicate
via an IP network, sensor-equipped devices connect to other items and/or systems. To wirelessly access
physical items, such as temperature, humidity, fire alarms, push buttons, buzzers, rotary encoders, etc.,
sensors must be given distinct identities. The most used Internet protocol is IPv4, whereas IPv6 offers
128 bits of capacity for object tracking (Garg et al., 2022).

HEALTHCARE SECURITY LAYERS

Data secrecy, information acuity, and information accessibility are the three most crucial requirements,
and each of the four tiers of the IoT network system must fulfil them. Data confidentiality refers to the
idea that the information gathered by sensors and nodes shouldn’t be shared with unauthorised parties.
This may be done by the use of data encryption, and two-step verification is another way to guarantee
data secrecy. Instances like server failure or power outages might potentially have an impact on the
integrity of the data. At the basic level, data integrity is ensured via cyclic redundancy check (CRC).

345

Study on Healthcare Security System-Integrated Internet of Things (IoT)

• Application layer: Healthcare system monitoring and management are the responsibility of the
application layer, which offers features like availability services, anti-virus services, and Spam
Filtering System.
• Processing layer: This layer is in charge of transporting data from the Transport Layer to lower
levels, storing it for analysis, and mining network data.
• Network layer: In order to receive and process information, the network layer links servers,
equipment, and smart devices.
• Perception layer: Physical parameters are used by the physical layer to get information from the
environment.

Benefits

• Enhanced treatment administration: Better administration power, system monitoring, medi-


cine and record tracking, and medical problem solving are all made possible by IoT devices.
• Remote Real-life monitoring: The ideal option for healthcare systems utilising Internet of
Things-based smart devices is remote monitoring.
• Investigation: IoT devices gather medical data for research.
• Preclusion: To maintain living quality, smart sensors collect and analyse everyday data.
• Decrease healthcare costs: IoT healthcare system can reduce medical costs.
• Ease of use: IoT devices collect data and send it to cloud for future use and investigation.
• Enhanced healthcare Supervision: Data and information are essential for IoT healthcare.

Objectives

With an emphasis on device configuration, device administration, device security, and IEEE standards,
this thesis investigates IoT architecture and middleware layers with devices utilised on network security
in healthcare systems. The strength of IoT-based security solutions is increased by the cooperation of
middleware.

• Controlling and setting up the apparatus.


• Create secure infrastructure.
• Keeping an eye on the tools and equipment.
• Fix the security issues with IoT.
• Observing sensing equipment.
• Address the healthcare IoT challenges.
• Layers of network security should be created.
• Describe IoT topologies and layers.
• Fix the security issues with the 5G network.
• Make sure the gadgets are coordinated.

To maintain, configure, and distribute sensitive, crucial, and domain-specific issues, IoT devices
require personal attention. Artificial smart sensors are more adaptable, simple, controllable, trackable,
and available. The primary goal of this thesis is to develop an architecture for an Internet of Things
(IoT)-based security healthcare system that assesses the privacy and safety of linked networks, boosts

346

Study on Healthcare Security System-Integrated Internet of Things (IoT)

productivity, and addresses pressing challenges in remote locations. The traditional system uses cryp-
tography to encode data through encryption, whereas the more recent IOT-based healthcare system
makes use of a five-layer protection protocol, high level security, secure algorithm/protocol, secure
system architecture, short-range communication, and RFID chip to expand medical services at remote
hospitals, assign smart medical agents, and address sensitive and serious activity. This study looks at the
benefits and drawbacks of IoT-based hospital security solutions. It emphasises the potency, practicality,
and security of medical sensors (Boopathi et al., 2022; Chakravarthi et al., 2022; Sampath, Pandian, et
al., 2022; Sampath, Yuvaraj, et al., 2022). While the sensor containing all data and information reading
healthcare and leakage of such information impacts the sensitivity of the healthcare care system, the
IOT security architecture is meant to promote privacy and confidentiality.
The Internet of Things (IoT) technologies are cutting-edge trends in the rapidly expanding field of
technology used in healthcare to track patients, devices, and sensor-based monitoring systems. They
offer practical, on-the-spot answers to heath care issues and are crucial for COVID and other unobserv-
able disorders. Additionally, they support various healthcare applications, develop (personal informa-
tion healthcare systems), and offer the commercial link between hospitals and the Internet of Things.
Hospitals, the medical industry, and its applications are currently intimately linked to RFID. Many
industries, including data mining, cloud computing, fog computing, artificial intelligence, context-
based intelligence, etc., employ IoT-based devices. The foundation of many organisations, including
hospitals, synthetic pharmaceutical labs, remote healthcare facilities, controlling biosensor medications
and devices, offering intelligent therapy, and amplifying cumulative demise, is healthcare. Security and
service providers are looking for a strong security and protection framework for the healthcare industry,
particularly for the creation of RFID and smart medicines. Security for personal information, payment
applications, remote healthcare applications, SQL database administration, relationships between busi-
nesses and hospitals, and common control gateways are all required for IOT healthcare (Bin Zikria et
al., 2020; Hireche et al., 2022).

Disadvantages of Existing Healthcare Security System

• Lack of security is only one of the numerous drawbacks of IoT-based healthcare technologies.
• Protection and Retreat: Since the sensor that holds all of the data and information reading
healthcare is sensitive, healthcare security and protection are crucial for monitoring and control-
ling IOT-based healthcare systems.
• Hazard of failure: Standardization, protocol, and consistency amongst manufacturers are needed
for sensors and IoT devices.
• Integration: Standardization and protocol are needed for sensors and IoT devices, as well as con-
sistency between manufacturers.

Performance Metrics

Both IoT and traditional network devices have distinct security settings and functionalities. Frequency
hopping communication and public key encryption are challenging to use to safeguard IoT devices on
sensor nodes due to their low processing capacity and storage space. Lightweight encryption technology
is used to IoT computers. The purpose of this exercise is to offer a helpful handbook of readily available
security risks and vulnerabilities, particularly for various IoT contexts, and to make doable recommenda-

347

Study on Healthcare Security System-Integrated Internet of Things (IoT)

tions for enhancing the design of IoT security. Modern device implementation dangers and vulnerabilities
have been evaluated, and the IoT’s structural architecture has been researched.
Based on the flaws and restrictions of current approaches, a viable solution to the security issue is
put forth. The E2E stable key-managing protocol for e-health applications developed by Abdmeziem
and Tandjaoui is restricted to the release of heavy cryptographic primitives and does not specify the
necessary trade-off between communication overhead and the number of third parties. Flauzac proposed
a new SDN-based security architecture for the IoT, however it has drawbacks, including difficulties in
protecting both desirable and undesired traffic and issues with enterprise security. A method of light-
weight authentication and authorisation for limited smart objects was proposed by Hernández-Ramos,
however it has not yet been put into practise.

NEW IoT INTEGRATED HEALTHCARE SECURITY SYSTEM

A technique called picture mixing mixes data from many photos of an identical scene. The two kinds of
image fusion methods are spatial domain and frequency domain. The problems and vulnerabilities of
IoT architecture and applications are examined in this survey along with potential fixes. It assumes that
building a global IoT security architecture can secure IoT applications (Boopathi, 2019, 2022a, 2022b,
2022c; Sampath & Myilsamy, 2021). The effectiveness of any of the existing defence tactics has not been
established. A safe IoT architecture should be developed to handle translations, provide positional privacy,
and define mobility for dormant IoT nodes. symmetric cryptography as a third-party offloading option.
Convergence of the control and data planes, which enables the adoption of applications like encryption,
analysis, and traffic categorization, is the only method to increase SDN efficiency. In order to establish
shared keys with wireless objects with whom no prior common knowledge has been established, third
parties are committed to assisting limited nodes. E2E code makes sure that nobody can obtain the shared
secret. IoT integrated Health care -Architecture is illustrated in Figure 1.

Figure 1. IoT integrated healthcare: Architecture

348

Study on Healthcare Security System-Integrated Internet of Things (IoT)

Components

• Application layer is a term used to describe the smart grid, healthcare system, transportation, and
environment.
• The Perception layer includes sensor nodes, gateways, RFID, network protocols, and mobile
devices.

Smart metres, smart appliances, renewable energy sources, and energy efficiency are just a few of
the operational and energy efforts that make up a smart grid, which is an electrical system. With the
help of a trustworthy and dispersed approach, intelligent backdrops combine the functions of many
stockholders and grow in the direction of consumers. By offering an IoT device a security risk and a
communication route, RFID technology is redefining the embedded common. Various functions of com-
plex messaging of IoT devices are provided by Wi-Fi, Ultra-wideband, ZigBee, Bluetooth, LTE, LTE-A
structure, citizens verification, Privacy, Eavesdropping, permission, Smart grid, Smart metres, Smart
readers, Health care’s system, Bluetooth and ZigBee Sensors, Smart wearable devices, authentication
authorization, DoS, Intelligent transportation DSRC 5.8 GHz EFC, RSU, OBUs Jamming, Congestion,
security and spectrum sharing model. There are two different kinds of RFID tags: active and passive.
Although active RFID tags have limited processing power and storage, they can send signals to read-
ers and communicate instantly. However, their lifespans are also confined. Sensor gateways use a 2.4
GHz IEEE 802.15.4 radio for communication and manage wireless networks and aggregate data from
dispersed WSN nodes. Sensor nodes link to other network nodes and collect and interpret sensory input
(Garg et al., 2022; Gupta et al., 2021).

• Controller manages output and data processing.


• A transceiver sends and receives radio waves.
• A memory used for computer programming is called programming memory.
• Data about the environment is collected via hardware.
• Nodes get electricity from a power source.

Smart Healthcare

Our framework’s design depends on three primary entities to carry out analysis activities while protect-
ing user privacy.

• Community Members (CM): Bio signal data from CMs is collected via wired and wireless sen-
sors, and after encryption, is sent to cloud-enabled storage.
• IoT gateway: This intelligent IoT device gathers data from CMs and transmits it securely to the
cloud for additional analysis.
• Cloud-enabled Database (CD): Encrypted cloud storage for CM’s medical information.
• Abnormality Detection Model (ADM): This allows for the examination of encrypted data from
several smart communities.

Cloud Architecture for Health: Security, collaboration, and collaboration are the three main features
that cloud technology provide healthcare applications.

349

Study on Healthcare Security System-Integrated Internet of Things (IoT)

• Healthcare practitioners can use apps using Software as a Service (SaaS) to complete tasks and
retrieve patient data.
• Tools for virtualization, networking, database administration, and other tasks are available through
platform as a service.
• Storage, servers, and other physical infrastructure are provided through infrastructure as a service.

Big Data Management: The five Vs—volume, velocity, variety, veracity, and value—define big
data. The terms “volume,” “velocity,” “variety,” “truthfulness,” and “value” all refer to different aspects
of the generation of data: its quantity, speed, diversity, veracity, and uncertainty over potential future
contributions.
Security and Privacy: A patient’s health information must be easily available to authorised parties
on the cloud. Additionally, it is crucial to maintain patient confidentiality since sharing private infor-
mation can have a detrimental impact on the patient, such as making it more difficult for them to get
insurance or becoming a victim of identity theft. The patient’s health might suffer if an unintentional
attacker makes changes to the health record.
Data Processing and Analytics: Machine learning and computational offloading are two examples of
data processing that may be carried out utilising cloud technology. Machine learning uses the computing
power of multiple computers to analyse disconnected mobile tools and offer incentives, whereas compu-
tational offloading uses the cloud to carry out complicated data processing that is beyond the capacity
of low-resource wearable devices. In cloud-based systems, security and privacy are crucial concerns.
In a healthcare setting, it is crucial that a patient’s health information is easily available to authorised
individuals because it is sensitive and need to be kept private. The patient may have negative effects, such
as identity theft or difficulty obtaining insurance, if hostile assaults disclosed their health information.
The patient’s health may suffer if the attacker changed their record, if they did so.

IoT ATTACKS

There are different type occur in current healthcare system (Garg et al., 2022; Mohd Aman et al., 2021).

• Physical attacks: Due to the small size and wireless connectivity of IoT devices, it is crucial to
preserve the gathered perception data and provide secure storage. 23 mechanisms, including those
related to people, technological ecology, development, and intelligent objectives, round up the
overall structural arrangement. Recognition, faith, isolation, security, auto-immunity, consistency,
and liability are all protective elements. A perimeter expertise layer can also be divided into sub-
layers with distinct security requirements.
• Incorporating RFID into IoT: RFID technology has been employed in IoT applications for item
recognition, tracking, and recovery, however it is attackable owing to resource constraints. The
three mechanisms that make up IoT-supported RFID are the RFID system, the middleware sys-
tem, and the Internet system. These components are protected by a number of security, including
risks associated with wireless communication, eavesdropping, man-in-the-middle attacks, denial
of service, spoofing, cloning, tracking, and tag misuse. To protect and regulate access to data via
RFID labels, certain security measures are necessary.

350

Study on Healthcare Security System-Integrated Internet of Things (IoT)

• In order to prevent unauthorised RFID readers from obtaining statistics, RFID protection tech-
niques and tactics including symmetric and asymmetric cyphers are utilised. Elliptic Curve
Cryptography and the MD5 method work together to improve user verification, dependability,
protection, and isolation of information conveyed from mark to reader.
• Incorporating WSNs into IoT: Individuals are vulnerable to assault by hostile nodes because they
have insufficient computing and power resources. Critical data, including security standards,
source code, and other data, can be accessed physically. WSNs must be safeguarded using en-
cryption, MACs, and laws and regulations for protected location and accessibility since they are
utilised in numerous IoT requests for healthcare. At a lower cost, signcryption can shield a channel
from the CIA.
• Denial of Service (DoS) attacks: DDoS assaults prevent disabled users from accessing server re-
sources or data. The majority of generic DoS attacks are explained using knowledge of RFID and
WSNs, such as how crowding and machine-transmitted radio signals interfere with neighbouring
RFID readers. Attackers can deactivate RFID tags, launch kill commands against WSNs, wipe off
knobs, jam networks, flood them with SYN traffic, leave servers with no resources, and use fake
source addresses in desynchronizing assaults.
• Denial of sleep attack: Access control is crucial to preventing admittance terrorization, which
may result in life-threatening threats in the IoT, and unauthorised organisations from accessing
system resources. To check for forbidden user interaction, efficient verification knowledge should
be acquired.

Following are the security qualities of access control

• Identification: Various identification methods, like RFID, IPv4, IPv6, EPCglobal, Near Field
Communications Forum (NFC), etc., should be used to uniquely identify IoT items. PONS is a
scalable physical-object naming system that issues URL-based semantic identities and reuses ex-
isting ontologies. The main division of PONS is made up of IoT substance recording and posses-
sions, S-URL storage partitions, individuality regulators, and programmes that describe S-URLs.
IdP and SP are two sorts of entities that make up the IdM structure, which offers access and indi-
viduality management services.
• Authentication: To establish a communication channel and mutual confidence between objects
or users, authentication entails confirming an entity’s identity and data source. It is an IoT access
control and authentication technique.

IoT HEALTHCARE PROTOCOL

By utilising efficient communication protocols like CoAP, effective filtering and sampling methods,
combined computation and network resource optimization, and efficient filtering and sampling ap-
proaches, HTTP/2 can lower energy usage in fog situations.
Constraints: The Internet Engineering Task Force (IETF) created the limited application protocol,
which is an HTTP-compatible synchronous request/response protocol. It utilises UDP and supports
both multicast and unicast, lowering bandwidth needs. The CoAP is intended for devices with limited
resources, like mobile phones, tablets, laptops, and low-power consumption gadgets.

351

Study on Healthcare Security System-Integrated Internet of Things (IoT)

Transport Protocol: The IBM-powered MQTT application layer protocol was created to adhere to
the demands of low-bandwidth and battery utilisation. MQTT, which has less delays, is the protocol
used by Facebook Messenger, although CoAP offers smaller package losses and more dependability.
BLE Communication Layer Protocol: Bluetooth is a constrained connectivity technology that
works well for many different purposes. Bluetooth Low Energy (BLE), often known as Bluetooth 4.0,
is the most recent version of the wireless technology. It boosts power use and energy level for ultra-low
energy operation during low-power inactive times. However, the maximum information speed for BLE
is just 100 kbps, which is slower than Bluetooth’s EDR mode.
BLE protocol stack: The host and controller components of the Bluetooth protocol stack are separated.
The middleware protocols RFCOMM and L2CAP make up the host stack. Data from the higher layer is
converted by the controller stack into a format that the controller stack can understand. Bluetooth services
in the area may be found and advertised using SDP (Service Discovery Protocol). For the purpose of
running services, the intermediate HCI transport layer directly accesses Bluetooth hardware. The HTTP
transaction over the Internet is the same as Transport Layer Security (TLS)/SSL.
Queuing Protocol: QP is an asynchronous 68 publish/subscribe messaging system that is utilised in
the financial sector. It transmits 1 billion messages every day and has inherent dependability when running
over the TCP protocol. With message delivery assurances and TLS/SSL security, it assures dependability.
Extensible Messaging and Presence Protocol: The Extensible Messaging and Presence Protocol
(XMPP), which the IETF has standardised, is not suitable for M2M communications since it supports
TLS/SSL and includes QoS settings. It recently regained importance as a suitable protocol for the In-
ternet of Things.
Data Flow: CoAP is a condensed form of HTTP. It is generally made for inter-device communication
between devices with limited resources. Proxy devices act as a bridge between the constrained environ-
ment and the internet environment. Data collection, data transmission, data storage, and data analysis
are the four phases that make up the IoT’s data flow. Token, option, or multi-options come after the final
two bytes in big-endian order, with no payload coming after the options.
DQAL Protocol: The distributed collision resolution queue proposed by the DQAL protocol has two
counters for each MD: RQ and pRQ. At the start of each CRI, each MD performs initialization based
on broadcast information. The Allow Transmission Interval (ETI), which measures the amount of time
the MD spends waiting for the start of the next CRI, represents the disciplinary law of queuing, which
states that any clashing preamble must rejoin the queue. Each virtual community in the DQAL may be
modelled as a queueing architecture, with a single server. The distributed crash declaration line, which
consists of two offsets, is the most crucial step in the proposed DQAL operation (RQ and pRQ). Every
MD establishes a number of initializations that are supported by the transmission information at the
beginning of every CRI. Queuing regulation rule is the name of this kind of initialization, and demand
broadcast regulation is utilised to identify the crash. The DQAL may be used to provide accurate unique
access time allocation in a queuing mechanism. As the MD waits for the start of the next CRI to begin
broadcasting its preamble, it uses an instance known as the Enable Transmission Interval (ETI).
LTE RACH Protocol: LTE RACH is made up by PRBs, which provide the bandwidth for six physical
resource blocks, and RA slots, which are provided for access needs. In LTE, the RA process consists of
four grip communications between the UE device and the eNodeB and is both reliant on and free from
congestion. Random-Access Preamble broadcasting is the first kind of communication, in which worksta-
tions broadcast the preamble in the RA window whenever they have information to send. Preambles are
sent via RBs on subframes and are specifically created for erratic access. In order for the UE mechanism

352

Study on Healthcare Security System-Integrated Internet of Things (IoT)

to disseminate communication, the eNodeB broadcasts an uplink supply distribution. Access Classes are
used to categorise the EAB techniques (ACs). If the system is overloaded, this method is used to prevent
short priory ACs. A paging message is sent to inform the MDs when a bitmap message is modified.
The UE system can wait until the changed bitmap is received by the paging cycle after taking into
account how many sub frames there are between two successive paging cycles. There are several studies
outlining the period at which the EAB will be permitted and the conventional LTE access methods will
be deactivated. MDs access the device through the standard LTE technique when there is little to no
traffic. The overcrowding coefficient, which can be calculated from the difference between the number
of crashing UE procedures and the number of booming UE operations in a fixed period, was used by
Intel to create an algorithm for formative altering slot.

PROPOSED SECURITY WORKING METHODOLOGY

Use of READ and WRITE security approaches as well as the application of get/set techniques are part
of the suggested methodology to enhance IoT healthcare security. Figure 2 depicts the block diagram
for the IoT -integrated Security working model.

Figure 2. IoT-integrated healthcare security block diagram

353

Study on Healthcare Security System-Integrated Internet of Things (IoT)

Global Security READ/WRITE Method

IoT services have distinct communication requirements than human-based communications do. Two
key differences are:
IoT devices report events using small message sizes. To give a comprehensive understanding of the
IoT, we concentrate on standardised cellular networks that offer large area coverage, security, permit
roaming and mobility, and operate in permitted bands. Disciplines collaborate through problem-oriented
cooperation or by borrowing ideas and techniques from one another to research a phenomenon. A grow-
ing number of people are using cloud storage to store their data, which is why it is growing in popularity.
Users may upload, download, and share files thanks to user-centric encryption and decryption, which
also makes them shareable. Data security in a cloud environment is split into two categories. The first
end deals with data that is sent into the network after being collected from the user site, and the second
end is concerned with data that is kept on a cloud disc. Researchers have proposed a hybrid ciphering
technique to protect data files stored in cloud storage. It is hybrid in nature and offers preliminary level
security and more accurate key. The second stage of projected effort is to create a new encryption algo-
rithm based on a cryptographic encryption technique. To ensure the security of the data, it is important
to verify authentication privileges of the different users accessing the cloud-disk stored data. This will
increase the utilization factor of healthcare systems(Garg et al., 2022; Polu, 2019).

SECURITY HEALTHCARE APPROACH

This method creates a feature linked to cypher text and manages user authentication, allowing creative
appearances to choose when to introduce groups above GRQ in order to prevent requests from conflicting
with one another. This security algorithm focusses on encryption process for cloud (Figures 3 and 4).

Figure 3. Security algorithm with cloud

354

Study on Healthcare Security System-Integrated Internet of Things (IoT)

Figure 4. Cloud encryption algorithm (128-bits)

SECURITY ALGORITHM

In order to combine information from two input pictures, image fusion involves inversely twisting a
wavelet transform array. User authentication and confidentiality are included together with the three
level security concepts of robustness, low execution time, encrypted keys, and ease of understanding.

Nordic nRF52832 Chip

The Cortex-M4F processor of the nRF52832 provides DSP instructions, FPU, single cycle multiplies
and accumulates, and hardware divisions for computationally intensive processes that use little power.
The nRF52832 SoC is a potent device that can operate between 1.7V and 3.6V and has a full set of
automated and adaptive authority administration functions. The IC functions cover a wide spectrum,
including power supply switching, peripheral bus/Easy DMA memory management, and automatic
shutdown of crucial peripherals.

Security Protocol

The distributed collision resolution queue, which consists of the two counters RQ and PRQ, is the most
crucial operation for the proposed DQAL protocol. MDs demand the use of broadcast rules to identify
collision and produce initialization that is supported by RQ value and foreword recognition category.
Algorithm is used to show DQAL protocol(Figure 5).

355

Study on Healthcare Security System-Integrated Internet of Things (IoT)

Figure 5. Algorithm for security protocol

The main goal is to be successful and let the cluster decide how the new appearance will proceed,
avoiding conflicts with already-existing demands. The approach helps MDs select an efficient cluster
and lessens the chance of collision, hence reducing access time and increasing access rate. AES- A
symmetric-key encryption standard with a 128-bit block size and 128-bit key size is called the Advanced
Encryption Standard (AES). It ensures that the hash code being used for encryption is encrypted using
a very secure method.
Its algorithm is as follows:

• Key Expansion
• Initial Round
• Add Round Key
• Rounds
• Sub Bytes—Bytes are restored using a non-linear replacement technique in accordance with a
lookup table.
• Shift Rows—Transposition involves moving lines to suit the circumstance.
• Mix Columns—Four bytes in each line are used for integration.
• Add Round Key—Using a key programme, round keys are created from the cypher key.
• Final Round (no Mix Columns)
• Sub Bytes
• Shift Rows

356

Study on Healthcare Security System-Integrated Internet of Things (IoT)

• Add Round Key


• Encryption: Statistics are transformed into plain text using cypher text, and the opposite is true
when it is decrypted.
• Protection Assaults: Thanks to cloud computing frameworks, sellers may generate predictable
income by renting out spaces on their physical equipment on an hourly basis.
• Threats: DDoS assaults are used by extortionists to disrupt services and flood nodes with
messages.
• The DDos Attack Tools Complex: Agobot, Mstream, Trinoo
• Straightforward: The Denial of Service functionalities are present in XML and HTTP (H-DoS).
• X-DoS: Attacks using coercive parsing may result in an increase in CPU utilisation.
• H-DoS: The HTTP Flooder drains a victim’s communications channel by using random HTTP
needs.

XDoS attacks are defended against in cloud computing using Cloud Traceback. To defend Iran
against H-DoS assaults, Cloud Protector is employed to train a reverse broadcast neural network. Back
propagation neural network for Cloud Protector.

QUALITY EVALUATION MEASURES

Risks of Patients’ Privacy Exposure

PHR is an electronic media-based confirmation tool that promotes and offers interoperability principles
throughout the nation. It is subject to human supervision, mutual prohibition, and prohibition. To safeguard
patient PHRs, one-to-many encryption methods like ABE and AES are utilised, along with encryption
algorithms like AES and MD5. Two security areas that are based on the classification of users’ data
supply needs are PUDs and PSDs. PSDs are sovereign financial divisions, whereas PUDs are made up
of clients who need access to support their specialised activities. Customers can obtain PHRs supported
by the access credentials granted by the proprietor when connecting through a statistics proprietor. It is
possible to gauge how much isolation is around and decide about whether to provide sensitive material
or not.

Threats of Cyber-Attacks on Privacy

IoT operations can suffer substantial harm from cyberattacks, thus it’s critical to have strong protec-
tions in place to prevent them. It’s challenging to install typical security solutions on IoT devices due to
their resource limitations, thus it’s crucial to develop a system to detect and respond to cyberattacks. A
brand-new distributed method for detecting cyberattacks was put out and is based on simulations, sys-
tem characteristics, experiment variables, and simulation limits. Iterative local processing and message
transmission are necessary for organisational progress.

• To guarantee uniformity and significance, experiments are carried out utilising an Intel Core i5,
240 GHz, 4GB RAM system.

357

Study on Healthcare Security System-Integrated Internet of Things (IoT)

• To guarantee uniformity and significance, experiments are carried out utilising an Intel Core i5,
240 GHz, 4GB RAM system.
• The suggested algorithms are compared based on how quickly they can save or retrieve data
blocks from cloud storage.

The essential parameters include key analysis, Avalanche effect, execution time, encryption time, and
decryption time. The identity authentication paradigm for the IoT capabilities based on access control
was proposed by simulation software. All electronic devices, distributed devices, and mobile/portable
devices that meet certain requirements can use the suggested working model for a public key approach.
To prevent a Mit M attack, it concerns the substantiation message as well as communication equipment
and boosts usage factor over time. Three steps of authentication are completed one after the other.

• An procedure called Key Generation Phase (KGP) is used to create secret keys.
• Phase of concern: The authentication mechanism used to verify identity might be either one-way
or mutual.
• Phase of implementation: Reliable device communication requires access control and permission
management.

Future Extension of Work

The various parameters of the system have been optimized by traditional and non-traditional multi-
criteria optimization techniques (Boopathi et al., 2022; Boopathi & Sivakumar, 2013, 2016; Haribalaji
et al., 2021; Sampath, C., et al., 2022; Saravanan et al., 2022; Vanitha et al., 2023; Vennila et al., 2023;
Yupapin et al., 2023). The real time experiments are conducted to continue the future work.

SUMMARY

This chapter covers a variety of IoT healthcare strategies, performance indicators, and security solu-
tions for the IoT architecture and applications’ dangers and weaknesses. Additionally, it discusses wire-
less assaults on various pieces of equipment connected to IoT healthcare systems as well as protocols
for security mechanisms for IoT healthcare. Algorithms for encryption and decryption are used in the
READ and WRITE security method. User-centric encryption and decryption of data files enable for
upload, download, and sharing mode. The chapter’s objective is to develop a new appearance to select
the foreword from the group.

ABBREVIATIONS

• ADM - Abnormality Detection Model


• AES - Advanced Encryption Standard
• CM - Community Members
• COVID - Corona Virus Disease 2019 caused by SARS
• CPU - Central Processing Unit

358

Study on Healthcare Security System-Integrated Internet of Things (IoT)

• DoS - Denial of Service


• DQAL - Date Structured Query Language
• HTTP - Hypertext Transfer Protocol
• IETF - Internet Engineering Task Force
• IoT - Internet-of-Things
• KGP - Key Generation Phase
• NFC - Near Field Communications Forum
• ONS - Object Naming Service
• RFID – Radio Frequency Identification
• TLS -Transport Layer Security
• XML - Extensible Mark-up Language

REFERENCES

Babu, B. S., Kamalakannan, J., Meenatchi, N., M, S. K. S., S, K., & Boopathi, S. (2023). Economic im-
pacts and reliability evaluation of battery by adopting Electric Vehicle. IEEE Explore, 1–6. doi:10.1109/
ICPECTS56089.2022.10046786
Bin Zikria, Y., Khalil Afzal, M., & Won Kim, S. (2020). Internet of multimedia things (Iomt): Oppor-
tunities, challenges and solutions. Sensors (Basel), 20(8), 2334. doi:10.339020082334 PMID:32325944
Boopathi, S. (2019). Experimental investigation and parameter analysis of LPG refrigeration system
using Taguchi method. In SN Applied Sciences (Vol. 1, Issue 8). doi:10.100742452-019-0925-2
Boopathi, S. (2022a). Experimental investigation and multi-objective optimization of cryogenic Friction-
stir-welding of AA2014 and AZ31B alloys using MOORA technique. Materials Today. Communications,
33, 104937. doi:10.1016/j.mtcomm.2022.104937
Boopathi, S. (2022b). Performance Improvement of Eco-Friendly Near-Dry Wire-Cut Electrical Dis-
charge Machining Process Using Coconut Oil-Mist Dielectric Fluid. Journal of Advanced Manufacturing
Systems. Advance online publication. doi:10.1142/S0219686723500178
Boopathi, S. (2022c). An Extensive Review on Sustainable Developments of Dry and Near-Dry Electri-
cal Discharge Machining Processes. Journal of Manufacturing Science and Engineering, 144(5), 1–37.
doi:10.1115/1.4052527
Boopathi, S., Arigela, S. H., Raman, R., Indhumathi, C., Kavitha, V., & Bhatt, B. C. (2023). Promi-
nent Rule Control-based Internet of Things: Poultry Farm Management System. IEEE Explore, 1–6.
doi:10.1109/ICPECTS56089.2022.10047039
Boopathi, S., Haribalaji, V., Mageswari, M., & Asif, M. M. (2022). Influences of Boron Carbide Par-
ticles on the Wear Rate and Tensile Strength of Aa2014 Surface Composite Fabricated By Friction-Stir
Processing. Materiali in Tehnologije, 56(3), 263–270. doi:10.17222/mit.2022.409

359

Study on Healthcare Security System-Integrated Internet of Things (IoT)

Boopathi, S., Khare, R., Jaya Christiyan, K. G., Muni, T. V., & Khare, S. (2023). Additive manufacturing
developments in the medical engineering field. In Development, Properties, and Industrial Applications
of 3D Printed Polymer Composites (pp. 86–106). IGI Global. doi:10.4018/978-1-6684-6009-2.ch006
Boopathi, S., Siva Kumar, P. K., & Meena, R. S. J., S. I., P., S. K., & Sudhakar, M. (2023). Sustainable
Developments of Modern Soil-Less Agro-Cultivation Systems. In Human Agro-Energy Optimization
for Business and Industry (pp. 69–87). IGI Global. doi:10.4018/978-1-6684-4118-3.ch004
Boopathi, S., & Sivakumar, K. (2013). Experimental investigation and parameter optimization of near-
dry wire-cut electrical discharge machining using multi-objective evolutionary algorithm. International
Journal of Advanced Manufacturing Technology, 67(9–12), 2639–2655. doi:10.100700170-012-4680-4
Boopathi, S., & Sivakumar, K. (2016). Optimal parameter prediction of oxygen-mist near-dry Wire-
cut EDM. International Journal of Manufacturing Technology and Management, 30(3–4), 164–178.
doi:10.1504/IJMTM.2016.077812
Chakravarthi, P. K., Yuvaraj, D., & Venkataramanan, V. (2022). IoT-based smart energy meter for smart
grids. ICDCS 2022 - 2022 6th International Conference on Devices, Circuits and Systems, 360–363.
10.1109/ICDCS54290.2022.9780714
Domakonda, V. K., Farooq, S., Chinthamreddy, S., Puviarasi, R., Sudhakar, M., & Boopathi, S. (2023).
Sustainable Developments of Hybrid Floating Solar Power Plants. In Human Agro-Energy Optimization
for Business and Industry (pp. 148–167). IGI Global. doi:10.4018/978-1-6684-4118-3.ch008
Garg, N., Wazid, M., Singh, J., Singh, D. P., & Das, A. K. (2022). Security in IoMT ‐driven smart health-
care: A comprehensive review and open challenges. Security and Privacy, 5(5), e235. doi:10.1002py2.235
Gupta, D., Gupta, M., Bhatt, S., & Tosun, A. S. (2021). Detecting Anomalous User Behavior in Remote
Patient Monitoring. Proceedings - 2021 IEEE 22nd International Conference on Information Reuse and
Integration for Data Science, IRI 2021, 33–40. 10.1109/IRI51335.2021.00011
Haribalaji, V., Boopathi, S., & Asif, M. M. (2021). Optimization of friction stir welding process to
join dissimilar AA2014 and AA7075 aluminum alloys. Materials Today: Proceedings, 50, 2227–2234.
doi:10.1016/j.matpr.2021.09.499
Harikaran, M., Boopathi, S., Gokulakannan, S., & Poonguzhali, M. (2023). Study on the Source of
E-Waste Management and Disposal Methods. In Sustainable Approaches and Strategies for E-Waste
Management and Utilization (pp. 39–60). IGI Global. doi:10.4018/978-1-6684-7573-7.ch003
Hireche, R., Mansouri, H., & Pathan, A.-S. K. (2022). Security and Privacy Management in Internet of
Medical Things (IoMT): A Synthesis. Journal of Cybersecurity and Privacy, 2(3), 640–661. doi:10.3390/
jcp2030033
Janardhana, K., Singh, V., Singh, S. N., Babu, T. S. R., Bano, S., & Boopathi, S. (2023). Utilization
Process for Electronic Waste in Eco-Friendly Concrete: Experimental Study. In Sustainable Approaches
and Strategies for E-Waste Management and Utilization (pp. 204–223). IGI Global.
Jeevanantham, Y. A., A, S., V, V., J, S. I., Boopathi, S., & Kumar, D. P. (2023). Implementation of Internet-of
Things (IoT) in Soil Irrigation System. IEEE Explore, 1–5. doi:10.1109/ICPECTS56089.2022.10047185

360

Study on Healthcare Security System-Integrated Internet of Things (IoT)

Kang, J., Fan, K., Zhang, K., Cheng, X., Li, H., & Yang, Y. (2021). An ultra light weight and secure
RFID batch authentication scheme for IoMT. Computer Communications, 167, 48–54. doi:10.1016/j.
comcom.2020.12.004
Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., & Douligeris, C. (2020).
Security in iomt communications: A survey. Sensors (Basel), 20(17), 1–49. doi:10.339020174828
PMID:32859036
Kumara, V., Mohanaprakash, T. A., Fairooz, S., Jamal, K., Babu, T., & B., S. (2023). Experimental
Study on a Reliable Smart Hydroponics System. In Human Agro-Energy Optimization for Business and
Industry (pp. 27–45). IGI Global. doi:10.4018/978-1-6684-4118-3.ch002
Mohd Aman, A. H., Hassan, W. H., Sameen, S., Attarbashi, Z. S., Alizadeh, M., & Latiff, L. A. (2021).
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security. Journal of Network
and Computer Applications, 174, 102886. doi:10.1016/j.jnca.2020.102886 PMID:34173428
Palaniappan, M., Tirlangi, S., Mohamed, M. J. S., Moorthy, R. M. S., Valeti, S. V., & Boopathi, S.
(2023). Fused deposition modelling of polylactic acid (PLA)-based polymer composites: A case study.
In Development, Properties, and Industrial Applications of 3D Printed Polymer Composites (pp. 66–85).
IGI Global. doi:10.4018/978-1-6684-6009-2.ch005
Polu, S. K. (2019). IoMT Based Smart Health Care Monitoring System. CEUR Workshop Proceedings,
2544(11), 58–64.
Reddy, M. A., Reddy, B. M., Mukund, C. S., Venneti, K., Preethi, D. M. D., & Boopathi, S. (2023).
Social Health Protection During the COVID-Pandemic Using IoT. In The COVID-19 Pandemic and the
Digitalization of Diplomacy (pp. 204–235). IGI Global. doi:10.4018/978-1-7998-8394-4.ch009
S., P. K., Sampath, B., R., S. K., Babu, B. H., & N., A. (2022). Hydroponics, Aeroponics, and Aqua-
ponics Technologies in Modern Agricultural Cultivation. In IGI:Trends, Paradigms, and Advances in
Mechatronics Engineering (pp. 223–241). IGI Global. doi:10.4018/978-1-6684-5887-7.ch012
Samikannu, R., Koshariya, A. K., Poornima, E., Ramesh, S., Kumar, A., & Boopathi, S. (2023). Sus-
tainable Development in Modern Aquaponics Cultivation Systems Using IoT Technologies. In Human
Agro-Energy Optimization for Business and Industry (pp. 105–127). IGI Global. doi:10.4018/978-1-
6684-4118-3.ch006
Sampath, B., & Myilsamy, S. (2021). Experimental investigation of a cryogenically cooled oxygen-mist
near-dry wire-cut electrical discharge machining process. Strojniski Vestnik. Jixie Gongcheng Xuebao,
67(6), 322–330. doi:10.5545v-jme.2021.7161
Sampath, B., Pandian, M., Deepa, D., & Subbiah, R. (2022). Operating parameters prediction of liquefied
petroleum gas refrigerator using simulated annealing algorithm. AIP Conference Proceedings, 2460(1),
070003. doi:10.1063/5.0095601
Sampath, B., Yuvaraj, D., & Velmurugan, D. (2022). Parametric analysis of mould sand properties for
flange coupling casting. AIP Conference Proceedings, 2460(1), 070002. doi:10.1063/5.0095599

361

Study on Healthcare Security System-Integrated Internet of Things (IoT)

Sampath, B. C. S., & Myilsamy, S. (2022). Application of TOPSIS Optimization Technique in the
Micro-Machining Process. In IGI:Trends, Paradigms, and Advances in Mechatronics Engineering (pp.
162–187). IGI Global. doi:10.4018/978-1-6684-5887-7.ch009
Saravanan, M., Vasanth, M., Boopathi, S., Sureshkumar, M., & Haribalaji, V. (2022). Optimization of
Quench Polish Quench (QPQ) Coating Process Using Taguchi Method. Key Engineering Materials,
935, 83–91. doi:10.4028/p-z569vy
Selvakumar, S., Adithe, S., Isaac, J. S., Pradhan, R., Venkatesh, V., & Sampath, B. (2023). A Study of
the Printed Circuit Board (PCB) E-Waste Recycling Process. In Sustainable Approaches and Strategies
for E-Waste Management and Utilization (pp. 159–184). IGI Global.
Senthil, T. S. R., Ohmsakthi vel, Puviyarasan, M., Babu, S. R., Surakasi, R., & Sampath, B. (2023).
Industrial Robot-Integrated Fused Deposition Modelling for the 3D Printing Process. In Development,
Properties, and Industrial Applications of 3D Printed Polymer Composites (pp. 188–210). IGI Global.
doi:10.4018/978-1-6684-6009-2.ch011
Toghuj, W., & Turab, N. (2022). A survey on security threats in the internet of medical things (IoMT).
Journal of Theoretical and Applied Information Technology, 100(10), 3361–3371.
Vanitha, S. K. R., & Boopathi, S. (2023). Artificial Intelligence Techniques in Water Purification and
Utilization. In Human Agro-Energy Optimization for Business and Industry (pp. 202–218). IGI Global.,
doi:10.4018/978-1-6684-4118-3.ch010
Vennila, T., Karuna, M. S., Srivastava, B. K., Venugopal, J., Surakasi, R., & B., S. (2023). New Strategies
in Treatment and Enzymatic Processes. In Human Agro-Energy Optimization for Business and Industry
(pp. 219–240). IGI Global. doi:10.4018/978-1-6684-4118-3.ch011
Yupapin, P., Trabelsi, Y., Nattappan, A., & Boopathi, S. (2023). Performance Improvement of Wire-Cut
Electrical Discharge Machining Process Using Cryogenically Treated Super-Conductive State of Monel-
K500 Alloy. Iranian Journal of Science and Technology. Transaction of Mechanical Engineering, 47(1),
267–283. doi:10.100740997-022-00513-0

362

View publication stats

You might also like