Table 2.
Security threats and its possible solutions.
Ref.No | Healthcare Application | Security Threats | Requirements | Possible Solutions |
---|---|---|---|---|
[7] | Online health monitoring | Denial-of-service | Availability | Redundancy Intrusion detection |
[49] | Tele-medicine System | Unauthenticated and Unauthorized access | Key establishment | Public Key cryptography Random key distribution |
[46] | Remote Diagnosis | Intrusion and high level attacks | ID | Secure group communication |
[44] | M-health | Message manipulation | Authenticity and Integrity | Secure hash function and Digital signature |
[51] | Online Consultation | Message disclosure | Privacy and Confidentiality | Access control Encryption |
[39] | Augmented Reality | Compromised or attacked node | Resilient | Detection Tamper-proofing |
[52] | Virtual Reality | Routing attacks | Secure routing | Secure protocols |