IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Quantum Security for IoT to Secure Healthcare Applications and Their Data

Quantum Security for IoT to Secure Healthcare Applications and Their Data
View Sample PDF
Author(s): Binod Kumar (JSPM's Rajarshi Shahu College of Engineering, India), Sheetal B. Prasad (SRM Institute of Science and Technology, India), Parashu Ram Pal (ABES Engineering College, India)and Pankaj Pathak (Symbiosis Institute of Digital and Telecom Management, Symbiosis International University, India)
Copyright: 2021
Pages: 21
Source title: Limitations and Future Applications of Quantum Cryptography
Source Author(s)/Editor(s): Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India)and Raees Ahmad Khan (Indian Institute of Information Technology, India)
DOI: 10.4018/978-1-7998-6677-0.ch008

Purchase

View Quantum Security for IoT to Secure Healthcare Applications and Their Data on the publisher's website for pricing and purchasing information.

Abstract

Quantum computation has the ability to revolutionize the treatment of patients. Quantum computing can help to detect diseases by identifying and forecasting malfunctions. But there's a threat associated here (i.e., healthcare data among the most popular cybercriminal targets, IoT devices notoriously lacking in effective safeguards, and quantum computers on the brink of an encryption/decryption breakthrough). Health agencies need a security prognosis and treatment plan as soon as possible. Healthcare companies recently worry more about the quantum security threats. The biggest threat of healthcare data breaches has come in the form of identity theft. There should be a strong mechanism to combat the security gaps in existing healthcare industry. If the healthcare data are available on the network, an attacker may try to modify, intercept, or even view this data stream. With the use of quantum security, the quantum state of these photons changes alert the security pros that someone is trying to breach the link.

Related Content

Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda. © 2024. 26 pages.
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha. © 2024. 20 pages.
K. Sriprasadh. © 2024. 24 pages.
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh. © 2024. 20 pages.
R. Jayashree, J. Venkata Subramanian. © 2024. 14 pages.
M. Indira, K. S. Mohanasundaram, M. Saranya. © 2024. 14 pages.
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith. © 2024. 26 pages.
Body Bottom