Skip to main content
. 2021 Sep 23;21(19):6346. doi: 10.3390/s21196346

Table 2.

Security threats and its possible solutions.

Ref.No Healthcare Application Security Threats Requirements Possible Solutions
[7] Online health monitoring Denial-of-service Availability Redundancy Intrusion detection
[49] Tele-medicine System Unauthenticated and Unauthorized access Key establishment Public Key cryptography Random key distribution
[46] Remote Diagnosis Intrusion and high level attacks ID Secure group communication
[44] M-health Message manipulation Authenticity and Integrity Secure hash function and Digital signature
[51] Online Consultation Message disclosure Privacy and Confidentiality Access control Encryption
[39] Augmented Reality Compromised or attacked node Resilient Detection Tamper-proofing
[52] Virtual Reality Routing attacks Secure routing Secure protocols