A Review on Identification & Analysis of Security Issues and Challenges of IoT based Healthcare
Vani G1, Bharathi Malakreddy A2

1Vani G, Senior System Analyst, Sonata Software Ltd, Bangalore (Karnataka), India.
2Bharathi Malakreddy A, Department of CSE, BMSIT&M, Bangalore (Karnataka), India.
Manuscript received on 05 February 2019 | Revised Manuscript received on 13 February 2019 | Manuscript published on 28 February 2019 | PP: 546-549 | Volume-8 Issue-4, February 2019 | Retrieval Number: D2882028419/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Healthcare applications are one of the major fields from the business user’s perspective and an important domain. Healthcare applications require a degree of authentication & authorization. An Authentication is a mechanism of authorizing a particular integrity in a communication system which assures the authenticity of the element in intercommunication. It is one of the fundamental objectives of the security. In this paper, we are focusing on a multi-factor authentication method for the IoT based healthcare systems. The survey will find the multi-factor authentication related work, different types of security attacks, risk, security gaps in healthcare systems. As a result, there will be a gap that could be further investigated so that more types of authentications are feasible. The conclusion of this paper is that by using a multi-factor authentication method, there are possibilities for proposing a secured authentication and authorized algorithm for IoT based healthcare system and overviewing of sensor destruction and different types of potential attacks on IoT devices based on IoT healthcare system.
Keyword: Authentication, Authorization, Multi-Factor, Role-Based Access Control, Data Confidentiality, Confidentiality, Sensitivity, Security Attack.
Scope of the Article: IoT