TY - JOUR AU - et. al., Garima Saini, PY - 2021/03/28 Y2 - 2024/03/29 TI - SECURITY VULNERABILITIES AND MITIGATION CHALLENGES IN IOT BASED HEALTHCARE SYSTEMS JF - International Journal of Modern Agriculture JA - IJMA VL - 10 IS - 2 SE - DO - UR - http://modern-journals.com/index.php/ijma/article/view/770 SP - 495 - 508 AB - <p>Internet of Things (IoT) is the term for a technology that is connecting physical objects and devices over the Internet, making these ‘things’ capable of exchanging data without any human intervention. This data exchange takes place via communication channels like Bluetooth, Wi-Fi, GSM, ZigBee etc. Healthcare industry has been going under complete digital transformation with the help of this technology. Healthcare professionals are now better connected with their patients via smart devices over the Internet. There are numerous applications of this technology that are making the lives of patients better by helping the healthcare professionals to monitor and treat them more efficiently than ever before. However, with the technological advancements for the medical world, not enough commensurate information security defense mechanisms have paced up.&nbsp; This has given rise to the challenge of securing confidential data of patients from unauthorized disclosure. For cyber attackers this data is more valuable than someone’s credit card data. The reason being Electronic Health Record (EHR) contains not only the credit card number, but also address, employer and insurance information. Attackers can use this information to open a new credit card in the victim’s name, take bank loan or even get high priced narcotics from medical insurer of the victim. Attacks on healthcare applications have increased manifold in the last few years. The purpose of our research is to conduct an analysis of how IoT has been implemented in the healthcare infrastructure of India and what are the challenges related to information security. The focus area of this research are the vulnerabilities of IoT based healthcare systems and threat vectors that the attackers are exploiting.&nbsp; In this paper, we attempt to answer questions like what are the motivating factors for cyber-attackers behind attacking healthcare applications, how are the medical hardware and software vulnerable to IoT based risks, what are the major types of attacks on such systems and how can the medical fraternity manage and mitigate IoT risks in healthcare sector. This research is primarily based on Secondary data with the methodology being comprehensive Systematic Literature Review (SLR). Relevant research papers were reviewed thoroughly, research findings of other researchers, business reports, articles etc. have been referred. Based on our findings, we attempt to propose some strategical solutions that can be used by the management of healthcare organizations to minimize attacks and their impact on critical systems.</p> ER -