{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T00:13:44Z","timestamp":1775434424251,"version":"3.50.1"},"reference-count":135,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T00:00:00Z","timestamp":1764374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The Internet of Things (IoT) has influenced the healthcare industry by enabling real-time monitoring, data-driven decision-making, and automation of medical activities. IoT in healthcare comprises a network of interconnected medical devices, sensors, and software systems that gather, analyse, and transmit patient data, enhancing the efficiency, accuracy, and accessibility of healthcare services. Despite its benefits, the deployment and impact of IoT in healthcare vary between countries due to differences in healthcare infrastructure, regulatory frameworks, and technical advancements. This review highlights how IoT technologies underpin the efficiency of EHR and HIE systems by enabling continuous data flow, interoperability, and real-time patient care. It also addresses the problems involved with IoT adoption, including data privacy concerns, interoperability issues, high implementation costs, and cybersecurity dangers. Additionally, the paper examines future trends in IoT healthcare, including 5G integration, AI-enhanced healthcare analytics, blockchain-based security solutions, and the creation of energy-efficient IoT medical equipment. Through an analysis of worldwide trends and obstacles, this research offers suggestions for policies, methods, and best practices to close the digital healthcare gap and make sure that healthcare solutions powered by the IoT are available, safe, and effective everywhere.<\/jats:p>","DOI":"10.3390\/fi17120549","type":"journal-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T15:11:24Z","timestamp":1764947484000},"page":"549","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["IoT Applications and Challenges in Global Healthcare Systems: A Comprehensive Review"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1125-0780","authenticated-orcid":false,"given":"Fadele Ayotunde","family":"Alaba","sequence":"first","affiliation":[{"name":"Department of Computer Science, Federal University of Education, Zaria 1041, Kaduna State, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0750-8187","authenticated-orcid":false,"given":"Alvaro","family":"Rocha","sequence":"additional","affiliation":[{"name":"Lisboa School of Economics and Management, University of Lisbon, Rua Miguel Lupi, 1249-078 Lisboa, Portugal"}]},{"given":"Hakeem Adewale","family":"Sulaimon","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Federal University of Education, Zaria 1041, Kaduna State, Nigeria"}]},{"given":"Owamoyo","family":"Najeem","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Federal University of Education, Zaria 1041, Kaduna State, Nigeria"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,29]]},"reference":[{"key":"ref_1","first-page":"303","article-title":"Cybersecurity Threats and Countermeasures of the Smart Home Ecosystem","volume":"22","author":"Darem","year":"2022","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_2","first-page":"3361","article-title":"A Survey on Security Threats in the Internet of Medical Things (IoMT)","volume":"100","author":"Toghuj","year":"2022","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_3","first-page":"140","article-title":"EdgeTrust: A Lightweight Data-Centric Trust Management","volume":"12","author":"Healthcare","year":"2023","journal-title":"Electronics"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","article-title":"Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review","volume":"9","author":"Mishra","year":"2021","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"169944","DOI":"10.1109\/ACCESS.2020.3023764","article-title":"Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks","volume":"8","author":"Chakkaravarthy","year":"2020","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2103694","DOI":"10.1002\/advs.202103694","article-title":"Wearable Triboelectric Sensors Enabled Gait Analysis and Waist Motion Capture for IoT-Based Smart Healthcare Applications","volume":"9","author":"Zhang","year":"2022","journal-title":"Adv. Sci."},{"key":"ref_7","first-page":"1040","article-title":"Real Time Emotion Recognition with AD8232 ECG Sensor for Classwise Performance Evaluation of Machine Learning Methods","volume":"36","author":"Patil","year":"2023","journal-title":"Int. J. Eng. Trans. C Asp."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"8337","DOI":"10.1109\/ACCESS.2024.3352568","article-title":"Enhancing Cybersecurity in the Internet of Things Environment Using Bald Eagle Search Optimization With Hybrid Deep Learning","volume":"12","author":"Maghrabi","year":"2024","journal-title":"IEEE Access"},{"key":"ref_9","first-page":"5465","article-title":"A new localization mechanism in IoT using grasshopper optimization algorithm and DVHOP algorithm","volume":"30","author":"Kurnaz","year":"2023","journal-title":"Wirel. Networks"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"100056","DOI":"10.1016\/j.fraope.2023.100056","article-title":"Optimized machine learning enabled intrusion detection 2 system for internet of medical things","volume":"6","author":"Sun","year":"2024","journal-title":"Franklin Open"},{"key":"ref_11","first-page":"711","article-title":"PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks","volume":"135","author":"Li","year":"2023","journal-title":"C.-Comput. Model. Eng. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"10744","DOI":"10.1109\/ACCESS.2017.2711484","article-title":"An Ant Colony Optimization Approach for the Deployment of Reliable Wireless Sensor Networks","volume":"5","author":"Deif","year":"2017","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s10586-021-03238-y","article-title":"A flow-based intrusion detection framework for Internet of Things networks","volume":"26","author":"Santos","year":"2023","journal-title":"Cluster Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s11277-013-1496-y","article-title":"A novel network coding and multi-path routing approach for wireless sensor networks","volume":"77","author":"Sun","year":"2014","journal-title":"Wirel. Pers. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1177\/0160323X221101559","article-title":"Gender Equity Commission Priorities: An Archival Study and Prospects for the Future","volume":"54","author":"Elias","year":"2022","journal-title":"State Local Gov. Rev."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/2063176.2063182","article-title":"Better medicine through machine learning","volume":"55","author":"Savage","year":"2012","journal-title":"Commun. ACM"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L.F., and Abdulkadir, S.J. (2022). Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics, 11.","DOI":"10.3390\/electronics11020198"},{"key":"ref_18","first-page":"100243","article-title":"Blockchain-empowered IoT for smart healthcare","volume":"21","author":"Sood","year":"2024","journal-title":"Inf. Process. Healthc."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zaman, U., Imran Mehmood, F., Iqbal, N., Kim, J., and Ibrahim, M. (2022). Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications. Electronics, 11.","DOI":"10.3390\/electronics11121893"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"72","DOI":"10.5539\/ibr.v15n1p72","article-title":"The Future Prospect of Digital Marketing in the Malaysian Context","volume":"15","author":"Man","year":"2021","journal-title":"Int. Bus. Res."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1007\/s11422-019-09949-4","article-title":"Rethinking approaches to research: The importance of considering contextually mitigating factors in promoting equitable practices in science education research","volume":"15","author":"Martin","year":"2020","journal-title":"Cult. Stud. Sci. Educ."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1177\/1755088220985882","article-title":"Asking the fox to guard the chicken coop: In defense of minimalism in the ethics of war and peace","volume":"18","author":"Forster","year":"2022","journal-title":"J. Int. Polit. Theory"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1108\/IJBM-05-2012-0054","article-title":"Corporate social responsibility in financial services","volume":"31","author":"Bouvain","year":"2022","journal-title":"Int. J. Bank Mark."},{"key":"ref_24","first-page":"18","article-title":"The impacts of social media influencer\u2019s credibility attributes on gen Z purchase intention with brand image as mediation","volume":"11","author":"Nugroho","year":"2022","journal-title":"Int. J. Res. Bus. Soc. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.aei.2018.04.015","article-title":"A BIM-based visualization and warning system for fire rescue","volume":"37","author":"Shan","year":"2018","journal-title":"Adv. Eng. Inform."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Cheng, J.C., Lee, N.Y., Chi, C., and Chen, Y.H. (2018, January 13\u201317). Blockchain and smart contract for digital certificate. Proceedings of the 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan.","DOI":"10.1109\/ICASI.2018.8394455"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"534","DOI":"10.3846\/jcem.2020.12639","article-title":"The willingness to adopt the internet of things (IoT) conception in Taiwan\u2019s construction industry","volume":"26","author":"Chen","year":"2020","journal-title":"J. Civ. Eng. Manag."},{"key":"ref_28","first-page":"1","article-title":"How does CSR of food company affect customer loyalty in the context of COVID-19: A moderated mediation model","volume":"7","author":"Zhang","year":"2022","journal-title":"Int. J. Corp. Soc. Responsib."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1080\/13675567.2021.1872512","article-title":"The role of blockchain technology in circular economy practices to improve organisational performance","volume":"25","author":"Khan","year":"2022","journal-title":"Int. J. Logist. Res. Appl."},{"key":"ref_30","first-page":"1091","article-title":"Internet of things in construction industry revolution 4.0: Recent trends and challenges in the Malaysian context","volume":"18","author":"Gamil","year":"2020","journal-title":"J. Eng. Des. Technol."},{"key":"ref_31","first-page":"127","article-title":"Maintenance Analytics for Building Decision-Making: A Literature Review","volume":"7","author":"Adeyemi","year":"2022","journal-title":"J. Inf. Syst. Technol. Manag."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Sidek, N., Ali, N., and Alkawsi, G. (2022). An Integrated Success Model of Internet of Things (IoT)-Based Services in Facilities Management for Public Sector. Sensors, 22.","DOI":"10.3390\/s22093207"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"537","DOI":"10.5267\/j.uscm.2021.11.009","article-title":"Investigating the impact of benefits and challenges of IOT adoption on supply chain performance and organizational performance: An empirical study in Malaysia","volume":"10","author":"Lee","year":"2022","journal-title":"Uncertain Supply Chain Manag."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Balgasem, S.S., and Zakaria, L.Q. (2017, January 25\u201327). A Hybrid Method Of Rule-Based Approach And Statistical Measures For Recognizing Narrators Name In Hadith. Proceedings of the 2017 6th International Conference on Electrical Engineering and Informatics (ICEEI), Langkawi, Malaysia.","DOI":"10.1109\/ICEEI.2017.8312417"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Aljobaly, O., and Banawi, A. (2020). Evaluation of the Saudi Construction Industry for Adoption of Building Information Modelling, Springer International Publishing.","DOI":"10.1007\/978-3-030-20454-9_49"},{"key":"ref_36","first-page":"179","article-title":"Benefits and Challenges of Heritage Building Information Modelling Application in Malaysia","volume":"6","author":"Ismail","year":"2021","journal-title":"Environ. Proc. J."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"101697","DOI":"10.1016\/j.scs.2019.101697","article-title":"Assessment of Social Sustainability Indicators in Mass Housing Construction: A Case Study of Mehr Housing Project","volume":"50","author":"Karji","year":"2019","journal-title":"Sustain. Cities Soc."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Dana, L.P., Salamzadeh, A., Mortazavi, S., and Hadizadeh, M. (2022). Investigating the Impact of International Markets and New Digital Technologies on Business Innovation in Emerging Markets. Sustainability, 14.","DOI":"10.3390\/su14020983"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2250028","DOI":"10.1142\/S1363919622500281","article-title":"Examining the Influence of Environmental Turbulence on Firm Innovation Performance in Emerging Markets: Using an Environment-Strategy-Performance Framework","volume":"26","author":"Mokhtarzadeh","year":"2022","journal-title":"Int. J. Innov. Manag."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"2100228","DOI":"10.1002\/aisy.202100228","article-title":"Artificial Intelligence-Enabled Sensing Technologies in the 5G\/Internet of Things Era: From Virtual Reality\/Augmented Reality to the Digital Twin","volume":"4","author":"Zhang","year":"2022","journal-title":"Adv. Intell. Syst."},{"key":"ref_41","first-page":"279","article-title":"Cyber Security Frameworks through the Lens of Foreign Direct Investment (FDI): A Systematic Literature Review","volume":"12","author":"Iyer","year":"2024","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.tele.2018.12.001","article-title":"Modelling the utilization of cloud health information systems in the Iraqi public healthcare sector","volume":"36","author":"Meri","year":"2019","journal-title":"Telemat. Inform."},{"key":"ref_43","first-page":"25","article-title":"Erratum: Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions","volume":"2020","author":"Shah","year":"2020","journal-title":"Sci. Program."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"4059","DOI":"10.1109\/TII.2021.3088938","article-title":"FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT","volume":"18","author":"Li","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_45","first-page":"5533843","article-title":"Internet of Things Security: Challenges and Key Issues","volume":"2021","author":"Azrour","year":"2021","journal-title":"Secur. Commun. Networks"},{"key":"ref_46","first-page":"1","article-title":"Intelligent Transport System using IoT-V2X: Communication Technologies, Security Issues, Challenges and Countermeasures","volume":"4","author":"Saraswathi","year":"2022","journal-title":"IoT"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","article-title":"Internet of Things Security: A Survey","volume":"88","author":"Fadele","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_48","first-page":"40","article-title":"Exploring the Role of the Internet of Things (IoT) on Economic Growth in Nigeria: Challenges and Opportunities","volume":"2","author":"Alaba","year":"2024","journal-title":"Eng. Technol. Trends"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"15","DOI":"10.37256\/ccds.5120233271","article-title":"Smart Contracts Security Application and Challenges: A Review","volume":"5","author":"Alaba","year":"2023","journal-title":"Cloud Comput. Data Sci."},{"key":"ref_50","first-page":"23","article-title":"A novel countermeasure technique for reactive jamming attack in Internet of Things","volume":"23","author":"Fadele","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Assimakopoulos, F., Vassilakis, C., Margaris, D., Kotis, K., and Spiliotopoulos, D. (2024). The Implementation of \u201cSmart\u201d Technologies in the Agricultural Sector: A Review. Information, 15.","DOI":"10.3390\/info15080466"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"(2015). Developing a Common Health Information Exchange Platform to Implement a Nationwide Health Information Network in South Korea. Healthc. Inform. Res., 21, 21\u201329.","DOI":"10.4258\/hir.2015.21.1.21"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"7","DOI":"10.51584\/IJRIAS.2022.7402","article-title":"Testing Challenges for Mobile Applications: An evaluation and comparative analysis of different testing approaches","volume":"7","author":"Azgar","year":"2022","journal-title":"Int. J. Res. Innov. Appl. Sci."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Sharmin, F., Sultan, M.T., Badulescu, D., Badulescu, A., Borma, A., and Li, B. (2021). Sustainable destination marketing ecosystem through smartphone-based social media: The consumers\u2019 acceptance perspective. Sustainability, 13.","DOI":"10.3390\/su13042308"},{"key":"ref_55","first-page":"1217","article-title":"A Multi-Perspective Framework Established on Diffusion of Innovation (DOI) Theory and Technology, Organization and Environment (TOE) Framework Toward Supply Chain Management System Based on Cloud Computing Technology for Small and Medium Enterprises","volume":"11","author":"Amini","year":"2023","journal-title":"Int. J. Inf. Technol. Innov. Adopt."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/978-3-030-75100-5_46","article-title":"A Novel Dynamic Authentication Method for Sybil Attack Detection and Prevention in Wireless Sensor Networks","volume":"225","author":"Jlassi","year":"2021","journal-title":"Lect. Notes Netw. Syst."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Saini, S., Panjwani, D., and Saxena, N. (2022, January 22\u201324). Mobile Mental Health Apps: Alternative Intervention or Intrusion?. Proceedings of the 2022 19th Annual International Conference on Privacy, Security & Trust (PST), Fredericton, NB, Canada.","DOI":"10.1109\/PST55820.2022.9851975"},{"key":"ref_58","unstructured":"K\u00fcrt\u00fcnl\u00fco\u011flu, P., Akdik, B., and Karaarslan, E. (2022). Security of Virtual Reality Authentication Methods in Metaverse: An Overview. arXiv."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Steffen, S., Bichsel, B., and Vechev, M. (2022, January 7\u201311). Zapper: Smart Contracts with Data and Identity Privacy. Proceedings of the CCS\u201922: 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA.","DOI":"10.1145\/3548606.3560622"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Levacher, J., Spinath, F.M., Becker, N., and Hahn, E. (2023). How did the beginnings of the global COVID-19 pandemic affect mental well-being?. PLoS ONE, 18.","DOI":"10.1371\/journal.pone.0279753"},{"key":"ref_61","first-page":"1075","article-title":"A Systematic Literature Review Approach on the Role of Digitalization in Construction Infrastructure and Sustainable City Development in Developing Countries","volume":"2","author":"Yusuf","year":"2021","journal-title":"ZEMCH Int. Conf."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1016\/j.ijpe.2019.07.001","article-title":"Supply chain finance, financial constraints and corporate performance: An explorative network analysis and future research agenda","volume":"216","author":"Wetzel","year":"2019","journal-title":"Int. J. Prod. Econ."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"14771","DOI":"10.1007\/s00500-020-04831-w","article-title":"Barriers to implementation of blockchain into supply chain management using an integrated multi-criteria decision-making method: A numerical example","volume":"24","year":"2020","journal-title":"Soft Comput."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Ji, Y., Wang, W., Zheng, M., and Chen, S. (2022). Real Time Building Evacuation Modeling with an Improved Cellular Automata Method and Corresponding IoT System Implementation. Buildings, 12.","DOI":"10.3390\/buildings12060718"},{"key":"ref_65","first-page":"19556","article-title":"Influential Factors for Hospital Management Maturity Models in a post-COVID-19 scenario\u2014Systematic Literature Review","volume":"8","author":"Vargas","year":"2023","journal-title":"J. Inf. Syst. Eng. Manag."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1093\/shm\/hkab116","article-title":"Chiefs and Rural Health Services in South-Western Nigeria, c. 1920\u2013c. 1950s","volume":"35","author":"Adetiba","year":"2022","journal-title":"Soc. Hist. Med."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"5152","DOI":"10.1109\/TNSM.2022.3157344","article-title":"The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems","volume":"19","author":"Apruzzese","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Younas, M.I., Iqbal, M.J., Aziz, A., and Sodhro, A.H. (2023). Toward QoS Monitoring in IoT Edge Devices Driven Healthcare\u2014A Systematic Literature Review. Sensors, 23.","DOI":"10.3390\/s23218885"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Georgescu, T.M., Iancu, B., and Zurini, M. (2019). Named-entity-recognition-based automated system for diagnosing cybersecurity situations in IoT networks. Sensors, 19.","DOI":"10.3390\/s19153380"},{"key":"ref_70","first-page":"49","article-title":"Predicting protein secondary structure based on ensemble Neural Network","volume":"7","author":"Dada","year":"2021","journal-title":"ITEGAM-J. Eng. Technol. Ind. Appl."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Stute, M., Sardesai, S., Parlings, M., Senna, P.P., Fornasiero, R., and Balech, S. (2021). Technology Scouting to Accelerate Innovation in Supply Chain. Next Generation Supply Chains: A Roadmap for Research and Innovation, Springer.","DOI":"10.1007\/978-3-030-63505-3_6"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Arora, N., Mishra, M.R., Goswami, V., Chakraborty, J., Barik, L., and Patra, S.S. (2022, January 17\u201319). Blockchain-based Qinsurancechain: Role of Smart Contracts in Fast and Secure Healthcare Insurance Claim. Proceedings of the 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India.","DOI":"10.1109\/ICESC54411.2022.9885531"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/j.ipm.2020.102462","article-title":"Transaction-based classification and detection approach for Ethereum smart contract","volume":"58","author":"Hu","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/TCNS.2016.2532804","article-title":"Botnet Detection Based on Anomaly and Community Detection","volume":"4","author":"Wang","year":"2017","journal-title":"IEEE Trans. Control. Netw. Syst."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1186\/s13326-021-00236-2","article-title":"De-identifying Spanish medical texts\u2014Named entity recognition applied to radiology reports","volume":"12","year":"2021","journal-title":"J. Biomed. Semantics"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.procs.2021.05.078","article-title":"Med-Flair: Medical named entity recognition for diseases and medications based on Flair embedding","volume":"189","author":"Eldin","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_77","first-page":"219","article-title":"Design of a Dynamic and Self-Adapting System, Supported with Artificial Intelligence, Machine Learning and Real-Time Intelligence for Predictive Cyber Risk Analytics in Extreme Environments\u2014Cyber Risk in the Colonisation of Mars","volume":"2","author":"Radanliev","year":"2021","journal-title":"SSRN Electron. J."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"30839","DOI":"10.1109\/ACCESS.2024.3369237","article-title":"Automated Network Intrusion Detection for Internet of Things: Security Enhancements","volume":"12","author":"Maghrabi","year":"2024","journal-title":"IEEE Access"},{"key":"ref_79","first-page":"1","article-title":"Detection of DDoS attacks in SDN with Siberian Tiger Optimization algorithm and deep learning","volume":"4","year":"2024","journal-title":"Res. Sq."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"103404","DOI":"10.1016\/j.adhoc.2024.103404","article-title":"Ad Hoc Networks SecureFlow: Knowledge and data-driven ensemble for intrusion detection and dynamic rule configuration in software-defined IoT environment","volume":"156","author":"Singh","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"78887","DOI":"10.1109\/ACCESS.2022.3194195","article-title":"BIoMT: A State-of-the-Art Consortium Serverless Network Architecture for Healthcare System Using Blockchain Smart Contracts","volume":"10","author":"Khan","year":"2022","journal-title":"IEEE Access"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10796-011-9309-x","article-title":"Autonomous mapping of HL7 RIM and relational database schema","volume":"14","author":"Umer","year":"2012","journal-title":"Inf. Syst. Front."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Juyal, S., Sharma, S., Harbola, A., and Shukla, A.S. (2020, January 2\u20134). Privacy and Security of IoT-based Skin Monitoring System using Blockchain Approach. Proceedings of the CONECCT 2020\u20146th IEEE International Conference on Electronics, Computing and Communication Technologies, Bangalore, India.","DOI":"10.1109\/CONECCT50063.2020.9198409"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"185","DOI":"10.5195\/jmla.2020.739","article-title":"A comparison of patient, intervention, comparison, outcome (PICO) to a new, alternative clinical question framework for search skills, search results, and self-efficacy: A randomized controlled trial","volume":"108","author":"Kloda","year":"2020","journal-title":"J. Med. Libr. Assoc."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT","volume":"149","author":"Sengupta","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_86","first-page":"8750","article-title":"Comprehensive Analysis On Effectiveness Of Inventory Management Practices On The Performance Of Wholesale Drug Dealers","volume":"6","author":"Kalita","year":"2022","journal-title":"J. Posit. Sch. Psychol."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.5267\/j.ijdns.2023.5.001","article-title":"A new model for security analysis of network anomalies for IoT devices","volume":"7","author":"Alzyadat","year":"2023","journal-title":"Int. J. Data Netw. Sci."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Alimova, I., and Tutubalina, E. (2020). Multiple features for clinical relation extraction: A machine learning approach. J. Biomed. Inform., 103.","DOI":"10.1016\/j.jbi.2020.103382"},{"key":"ref_89","first-page":"e0451","article-title":"Rule-Based Cohort Definitions for Acute Respiratory Distress Syndrome: A Computable Phenotyping Strategy Based on the Berlin Definition","volume":"3","author":"Li","year":"2021","journal-title":"Crit. Care Explor."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"19973","DOI":"10.1038\/s41598-021-99554-9","article-title":"The OpenDeID corpus for patient de-identification","volume":"11","author":"Jonnagaddala","year":"2021","journal-title":"Sci. Rep."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.procs.2021.12.206","article-title":"Emerging Concepts Using Blockchain and Big Data","volume":"198","author":"Muheidat","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_92","first-page":"1304","article-title":"Digital News Business Models in the Age of Industry 4.0 Digital Brazilian News Players Find in Technology New Ways to Bring Revenue and Competitive Advantage","volume":"12","author":"Mesquita","year":"2022","journal-title":"Digit. Journal."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1108\/SASBE-08-2021-0148","article-title":"An investigation for integration of deep learning and digital twins towards Construction 4.0","volume":"12","author":"Kor","year":"2022","journal-title":"Smart Sustain. Built Environ."},{"key":"ref_94","first-page":"1","article-title":"Enabling Artificial Intelligence of Things (AIoT) Healthcare Architectures and Listing Security Issues","volume":"2022","author":"Pise","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_95","first-page":"123","article-title":"Performance of the innovation-passion model for post COVID-19 entrepreneurs","volume":"26","author":"Ritwatthanavanich","year":"2021","journal-title":"Utop\u00eda Prax. Latinoam."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1016\/j.ijpe.2016.02.004","article-title":"Closed loop supply chain networks: Designs for energy and time value efficiency","volume":"183","author":"Kadambala","year":"2017","journal-title":"Int. J. Prod. Econ."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Madanian, S., Chinbat, T., Subasinghage, M., Airehrour, D., Hassandoust, F., and Yongchareon, S. (2024). Health IoT Threats: Survey of Risks and Vulnerabilities. Future Internet, 16.","DOI":"10.3390\/fi16110389"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Gong, S., and Lee, C. (2020). BLOCIS: Blockchain-based cyber threat intelligence sharing framework for sybil-resistance. Electronics, 9.","DOI":"10.3390\/electronics9030521"},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/6637568","article-title":"Architecture for Resource Allocation in the Internet of Vehicles for Cooperating Driving System","volume":"2021","author":"Kalsoom","year":"2021","journal-title":"J. Adv. Transp."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.comnet.2021.108693","article-title":"Federated learning for malware detection in IoT devices","volume":"204","author":"Rey","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_101","unstructured":"Bilal, M. (2017). A Review of Internet of Things Architecture, Technologies and Analysis Smartphone-based Attacks Against 3D printers. arXiv."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"1061","DOI":"10.1109\/JIOT.2016.2550561","article-title":"An Adaptive Edge Router Enabling Internet of Things","volume":"3","author":"Jutila","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"172","DOI":"10.30574\/wjarr.2024.21.1.2721","article-title":"The impact of AI on accounting practices: A review: Exploring how artificial intelligence is transforming traditional accounting methods and financial reporting","volume":"21","author":"Odonkor","year":"2024","journal-title":"World J. Adv. Res. Rev."},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/s13272-023-00696-5","article-title":"Utilisation of semantic technologies for the realisation of data-driven process improvements in the maintenance, repair and overhaul of aircraft components","volume":"15","author":"Gill","year":"2024","journal-title":"CEAS Aeronaut. J."},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Dave, T., Athaluri, S.A., and Singh, S. (2023). ChatGPT in medicine: An overview of its applications, advantages, limitations, future prospects, and ethical considerations. Front. Artif. Intell., 6.","DOI":"10.3389\/frai.2023.1169595"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"6801530","DOI":"10.1155\/int\/6801530","article-title":"Intelligent Internet of Medical Things for Depression: Current Advancements, Challenges, and Trends","volume":"2025","author":"Akhtar","year":"2025","journal-title":"Int. J. Intell. Syst."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"e48009","DOI":"10.2196\/48009","article-title":"Ethical Considerations of Using ChatGPT in Health Care","volume":"25","author":"Wang","year":"2023","journal-title":"J. Med. Internet Res."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"1689","DOI":"10.11591\/ijece.v11i2.pp1689-1696","article-title":"Machine learning model for clinical named entity recognition","volume":"11","author":"Ravikumar","year":"2021","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_109","first-page":"e01638","article-title":"Remote patient monitoring systems: Applications, architecture, and challenges","volume":"20","author":"Boikanyo","year":"2023","journal-title":"Sci. Afr."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Mrabet, H., Belguith, S., Alhomoud, A., and Jemai, A. (2020). A Survey of IoT Security Based on a Layered. Sensors, 20.","DOI":"10.3390\/s20133625"},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"23","DOI":"10.37868\/sei.v3i1.124","article-title":"Survey of DoS\/DDoS attacks in IoT","volume":"3","author":"Khader","year":"2021","journal-title":"Sustain. Eng. Innov."},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Dai, D., Li, R., Tang, J., Davanian, A., and Yin, H. (2020, January 10\u201312). Parallel space traveling: A security analysis of app-level virtualization in android. Proceedings of the SACMAT\u201920: The 25th ACM Symposium on Access Control Models and Technologies, Barcelona, Spain.","DOI":"10.1145\/3381991.3395608"},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Chatziamanetoglou, D., and Rantos, K. (2024). Cyber Threat Intelligence on Blockchain: A Systematic Literature Review. Computers, 13.","DOI":"10.3390\/computers13030060"},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"101941","DOI":"10.1016\/j.jairtraman.2020.101941","article-title":"Opportunities in airport pavement management: Integration of BIM, the IoT and DLT","volume":"90","author":"Loreiro","year":"2021","journal-title":"J. Air Transp. Manag."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s12652-021-03302-w","article-title":"Role of emerging technologies in future IoT-driven Healthcare 4.0 technologies: A survey, current challenges and future directions","volume":"14","author":"Krishnamoorthy","year":"2023","journal-title":"J. Ambient. Intell. Human Comput."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Adibi, S., Rajabifard, A., Shojaei, D., and Wickramasinghe, N. (2024). Enhancing Healthcare through Sensor-Enabled Digital Twins in Smart Environments: A Comprehensive Analysis. Sensors, 24.","DOI":"10.3390\/s24092793"},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Hmidah, N.A., Haron, N.A., Alias, A.H., Law, T.H., Altohami, A.B.A., and Effendi, R.A.A.R.A. (2022). The Role of the Interface and Interface Management in the Optimization of BIM Multi-Model Applications: A Review. Sustainability, 14.","DOI":"10.3390\/su14031869"},{"key":"ref_118","first-page":"225","article-title":"Evaluation of Machine Learning Methods to Detect DoS\/DDoS Attacks on IoT","volume":"3241","author":"Galchynsky","year":"2021","journal-title":"CEUR Workshop Proc."},{"key":"ref_119","first-page":"25","article-title":"Plugin-Based Tool for Teaching Secure Mobile Application Development","volume":"19","author":"Riad","year":"2021","journal-title":"Inf. Syst. Educ. J."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1108\/K-02-2017-0045","article-title":"Examining intention to adopt to internet of things in healthcare technology products","volume":"47","author":"Karahoca","year":"2018","journal-title":"Kybernetes"},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Gonzalez-Amarillo, C., Cardenas-Garcia, C., Mendoza-Moreno, M., Ramirez-Gonzalez, G., and Corrales, J.C. (2021). Blockchain-iot sensor (Biots): A solution to iot-ecosystems security issues. Sensors, 21.","DOI":"10.3390\/s21134388"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"e118","DOI":"10.1002\/itl2.118","article-title":"Reducing the network bandwidth requirements for 360 \u2218 immersive video streaming","volume":"2","author":"Mascolo","year":"2019","journal-title":"Internet Technol. Lett."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1007\/s12553-019-00402-8","article-title":"Digital transformation in the area of health: Systematic review of 45 years of evolution","volume":"10","author":"Marques","year":"2020","journal-title":"Health Technol."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"e7334","DOI":"10.1002\/cpe.7334","article-title":"An intelligent intrusion detection system for distributed denial of service attacks: A support vector machine with hybrid optimization algorithm based approach","volume":"34","author":"Sokkalingam","year":"2022","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"74641","DOI":"10.1109\/ACCESS.2023.3290910","article-title":"Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications","volume":"11","author":"Islam","year":"2023","journal-title":"IEEE Access"},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Sharma, A., Goyal, T., Pilli, E.S., Mazumdar, A.P., Govil, M.C., and Joshi, R.C. (2015, January 14\u201316). A Secure Hybrid Cloud Enabled architecture for Internet of Things. Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy.","DOI":"10.1109\/WF-IoT.2015.7389065"},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Safarov, F., Basak, M., Nasimov, R., Abdusalomov, A., and Cho, Y.I. (2023). Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection. Future Internet, 15.","DOI":"10.3390\/fi15090297"},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Khan, F., Rehman, A.U., Yahya, A., Jan, M.A., Chuma, J., Tan, Z., and Hussain, K. (2019). A quality of service-aware secured communication scheme for internet of things-based networks. Sensors, 19.","DOI":"10.20944\/preprints201908.0243.v1"},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Obaidat, M.A., Rawashdeh, M., Alja\u2019afreh, M., Abouali, M., Thakur, K., and Karime, A. (2024). Exploring IoT and Blockchain: A Comprehensive Survey on Security, Integration Strategies, Applications and Future Research Directions. Big Data Cogn. Comput., 8.","DOI":"10.20944\/preprints202409.1193.v1"},{"key":"ref_130","first-page":"25","article-title":"A Bayesian Attack-Network Modeling Approach to Mitigating Malware-Based Banking Cyberattacks","volume":"14","author":"Zimba","year":"2022","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Bukhowah, R., Aljughaiman, A., and Rahman, M.M.H. (2024). Detection of DoS Attacks for IoT in Information-Centric Networks Using Machine Learning: Opportunities, Challenges, and Future Research Directions. Electronics, 13.","DOI":"10.3390\/electronics13061031"},{"key":"ref_132","first-page":"2","article-title":"Factors Impacting Resilience of Internet of Things Systems in Critical Infrastructure","volume":"21","author":"Bures","year":"2022","journal-title":"IEEE Access"},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"9977","DOI":"10.1007\/s11042-019-07742-7","article-title":"A novel group decision making model based on neutrosophic sets for heart disease diagnosis","volume":"79","author":"Gamal","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1109\/TII.2019.2940742","article-title":"ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet through Fast Detection of Anomalous Domain Queries","volume":"16","author":"Yin","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"4969","DOI":"10.1109\/ACCESS.2022.3140409","article-title":"The Internet of Things and Architectures of Big Data Analytics: Challenges of Intersection at Different Domains","volume":"10","author":"Fawzy","year":"2022","journal-title":"IEEE Access"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/12\/549\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T15:31:18Z","timestamp":1764948678000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/12\/549"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,29]]},"references-count":135,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["fi17120549"],"URL":"https:\/\/doi.org\/10.3390\/fi17120549","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,29]]}}}