• Login
    View Item 
    •   KABU Repository Home
    • Conference, Seminars, Workshop and trainings.
    • Conference Papers
    • 9th Annual Conference Kabarak University 2019
    • View Item
    •   KABU Repository Home
    • Conference, Seminars, Workshop and trainings.
    • Conference Papers
    • 9th Annual Conference Kabarak University 2019
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Weaknesses and Security Obstacles in The Application of MANETs for Provision of Smart Health Care

    Thumbnail
    View/Open
    Conf_Proc_Computing_2019v1_pp._18-27.pdf (231.1Kb)
    Date
    2019-10
    Author
    Mindo, Kirori
    Thiga, Moses M.
    Karume, Simon M.
    Metadata
    Show full item record
    Abstract
    The use of smart devices in provision of healthcare provides numerous benefits. Use of technology in the healthcare profession has generally led to faster diagnosis, lower costs, health workers and research collaboration, reliable services, efficient and effective healthcare systems as well. The provision of smart healthcare services is dependent on MANETs. While technology is particularly indispensable, security of the systems and data remains a critical challenge that hinders the accelerated adoption of smart health care. It is reported that smart healthcare devices experience twice the number of cyber security attacks as opposed to other industries. These attacks and are made possible due to the weaknesses and nature of smart devices in MANETS. These weaknesses give rise to security obstacles that inhibit the adoption of smart health care. There is need to investigate these weaknesses and obstacles in the application of MANETs for provision of smart health care. This study will describe and enlighten the various obstacles so as to aid guide on the best practices for provision of secure Smart Healthcare. This research used a desk research of general literature review methodology. The results identify the various weakness and outline commensurate vulnerabilities as well as attacks that take advantage of these vulnerabilities. Ultimately this research gives design recommendations that can be incorporated in providing ways to seal these gaps.
    URI
    http://10.1.130.140:8080/xmlui/handle/123456789/382
    Collections
    • 9th Annual Conference Kabarak University 2019 [66]

    Copyright © 2025 
    Kabarak University Libraries
    | Repository Policy | Send Feedback
     

    Browse

    All of KABU RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Copyright © 2025 
    Kabarak University Libraries
    | Repository Policy | Send Feedback