Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Securing Things in the Healthcare Internet of Things

Mac Dermott, AM, Kendrick, P, Idowu, IO, Ashall, M and Shi, Q Securing Things in the Healthcare Internet of Things. In: Global IoT Summit, 17 June 2019 - 19 June 2019, Aarhus, Denmark. (Accepted)

[img] Text
PID5916925.pdf - Accepted Version
Restricted to Repository staff only

Download (350kB)


The Internet of Things (IoT) has had a positive impact on e-health, assisted living, human-centric sensing and wellness. Recently this interconnection has been referred to as Healthcare IoT (H-IoT). Real-time monitoring based on the information gathered from the connected things provides large scale connectivity and a greater insight into patient care, individual habits and routines. While the benefits of introducing this paradigm into healthcare are conspicuous, the underlying security vulnerabilities and threats of the infrastructure and devices cannot go unaddressed. H-IoT is set to impact society significantly, and with attackers already exploiting the IoT in a myriad of ways, it is inevitable that the IoT will become the most vulnerable area of cyber security. Securing these 'things' in H-IoT requires a multi-faceted approach. A multi-agent approach to advanced persistent threat detection in networked systems is conveyed with the use of machine learning for predictive analytics: identifying security vulnerabilities, identifying patterns in order to make predictions and identify outliers.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: Healthcare; Cyber security; Internet of Things; Cloud computing; Fog computing
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
Publisher: IEEE
Date Deposited: 03 Jun 2019 09:18
Last Modified: 13 Apr 2022 15:17
URI: https://researchonline.ljmu.ac.uk/id/eprint/10770
View Item View Item