Open Access iconOpen Access

REVIEW

Security Challenges and Analysis Tools in Internet of Health Things: A Comprehensive Review

Enas W. Abood1, Ali A. Yassin2,*, Zaid Ameen Abduljabbar2,3,4,*, Vincent Omollo Nyangaresi5,6, Iman Qays Abduljaleel2, Abdulla J. Y. Aldarwish2, Husam A. Neamah7,8

1 Department of Mathematics, College of Science, University of Basrah, Basrah, 61004, Iraq
2 Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, 61004, Iraq
3 Department of Business Management, Al-Imam University College, Balad, 34011, Iraq
4 Shenzhen Institute, Huazhong University of Science and Technology, Shenzhen, 518000, China
5 Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science and Technology, Bondo, 40601, Kenya
6 Department of Applied Electronics, Saveetha School of Engineering, SIMATS, Chennai, 602105, Tamil Nadu, India
7 Department of Electrical Engineering and Mechatronics, Faculty of Engineering, University of Debrecen, Otemeto u.4-5, Debrecen, 4028, Hungary
8 College of Engineering, National University of Science and Technology, Dhi Qar, 64001, Iraq

* Corresponding Authors: Ali A. Yassin. Email: email; Zaid Ameen Abduljabbar. Email: email

Computers, Materials & Continua 2025, 85(2), 2305-2345. https://doi.org/10.32604/cmc.2025.066579

Abstract

The digital revolution era has impacted various domains, including healthcare, where digital technology enables access to and control of medical information, remote patient monitoring, and enhanced clinical support based on the Internet of Health Things (IoHTs). However, data privacy and security, data management, and scalability present challenges to widespread adoption. This paper presents a comprehensive literature review that examines the authentication mechanisms utilized within IoHT, highlighting their critical roles in ensuring secure data exchange and patient privacy. This includes various authentication technologies and strategies, such as biometric and multi-factor authentication, as well as the influence of emerging technologies like blockchain, fog computing, and Artificial Intelligence (AI). The findings indicate that emerging technologies offer hope for the future of IoHT security, promising to address key challenges such as scalability, integrity, privacy and other security requirements. With this systematic review, healthcare providers, decision makers, scientists and researchers are empowered to confidently evaluate the applicability of IoT in healthcare, shaping the future of this field.

Keywords

Internet of health things; authentication; privacy; fog-computing; blockchain; AI

Cite This Article

APA Style
Abood, E.W., Yassin, A.A., Abduljabbar, Z.A., Nyangaresi, V.O., Abduljaleel, I.Q. et al. (2025). Security Challenges and Analysis Tools in Internet of Health Things: A Comprehensive Review. Computers, Materials & Continua, 85(2), 2305–2345. https://doi.org/10.32604/cmc.2025.066579
Vancouver Style
Abood EW, Yassin AA, Abduljabbar ZA, Nyangaresi VO, Abduljaleel IQ, Aldarwish AJY, et al. Security Challenges and Analysis Tools in Internet of Health Things: A Comprehensive Review. Comput Mater Contin. 2025;85(2):2305–2345. https://doi.org/10.32604/cmc.2025.066579
IEEE Style
E. W. Abood et al., “Security Challenges and Analysis Tools in Internet of Health Things: A Comprehensive Review,” Comput. Mater. Contin., vol. 85, no. 2, pp. 2305–2345, 2025. https://doi.org/10.32604/cmc.2025.066579



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1488

    View

  • 626

    Download

  • 0

    Like

Share Link