{"id":2020,"date":"2025-06-03T12:28:27","date_gmt":"2025-06-03T16:28:27","guid":{"rendered":"https:\/\/carleton.ca\/internetofthings\/?p=2020"},"modified":"2025-06-03T12:28:27","modified_gmt":"2025-06-03T16:28:27","slug":"iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations","status":"publish","type":"post","link":"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/","title":{"rendered":"IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations"},"content":{"rendered":"<h2>Ali Farhat, Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy<\/h2>\n<p><\/p>\n<div style=\"text-align: justify;\">The Internet of Things (IoT) facilitates the integration of diverse devices for data collection and exchange, significantly impacting various domains, including e-health. E-health systems leverage IoT to monitor patients&#8217; health through smart medical devices, enabling local and remote data access. Despite the benefits, the increased connectivity introduces new cybersecurity risks, as malicious actors can exploit vulnerabilities to access sensitive patient information. Traditional security measures have mostly focused on securing individual devices through authentication and encryption. However, many medical devices lack built-in security features or the ability to be updated. To this end, this paper proposes a shift towards system-level security for e-health IoT systems, emphasizing the protection of the entire system rather than just the devices. The paper outlines best practices and recommendations to enhance security, improve interoperability, and address current gaps. These recommendations and guidelines are introduced to support medical institutions, device manufacturers, policymakers, and governments in developing robust security frameworks and policies. The recommendations are designed to be actionable across various levels of the e-health system, fostering secure and interoperable e-health solutions.<\/div>\n<p><\/p>\n<p style=\"text-align: justify;\">A. Farhat, M. A. Issa, A. Eldosouky, M. Ibnkahla, J. Jaskolka and A. Matrawy, &#8220;IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations,&#8221; <em>2025 IEEE 22nd International Multi-Conference on Systems, Signals &amp; Devices (SSD)<\/em>, Monastir, Tunisia, 2025, pp. 1-6, doi: 10.1109\/SSD64182.2025.10990002.<\/p>\n<p><\/p>\n<p style=\"text-align: justify;\">For more details:\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10990002\/\">IEEE Explorer<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ali Farhat, Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy The Internet of Things (IoT) facilitates the integration of diverse devices for data collection and exchange, significantly impacting various domains, including e-health. E-health systems leverage IoT to monitor patients&#8217; health through smart medical devices, enabling local and remote data access. Despite [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[69,37,1,38],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations - Sensor Systems and The Internet of Things<\/title>\n<meta name=\"description\" content=\"Ali Farhat, Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy &nbsp; The Internet of Things (IoT) facilitates\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"mohannadabuissa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/\",\"url\":\"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/\",\"name\":\"IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations - Sensor Systems and The Internet of Things\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/internetofthings\/#website\"},\"datePublished\":\"2025-06-03T16:28:27+00:00\",\"dateModified\":\"2025-06-03T16:28:27+00:00\",\"author\":{\"@id\":\"https:\/\/carleton.ca\/internetofthings\/#\/schema\/person\/34d81e303dbb8eda8ecb9a90d4420ed9\"},\"description\":\"Ali Farhat, Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy &nbsp; The Internet of Things (IoT) facilitates\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/internetofthings\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/carleton.ca\/internetofthings\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/internetofthings\/#website\",\"url\":\"https:\/\/carleton.ca\/internetofthings\/\",\"name\":\"Sensor Systems and The Internet of Things\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/internetofthings\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/carleton.ca\/internetofthings\/#\/schema\/person\/34d81e303dbb8eda8ecb9a90d4420ed9\",\"name\":\"mohannadabuissa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/carleton.ca\/internetofthings\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/00991004a831c38dde16210a3a0234bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/00991004a831c38dde16210a3a0234bb?s=96&d=mm&r=g\",\"caption\":\"mohannadabuissa\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations - Sensor Systems and The Internet of Things","description":"Ali Farhat, Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy &nbsp; The Internet of Things (IoT) facilitates","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/","twitter_misc":{"Written by":"mohannadabuissa","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/","url":"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/","name":"IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations - Sensor Systems and The Internet of Things","isPartOf":{"@id":"https:\/\/carleton.ca\/internetofthings\/#website"},"datePublished":"2025-06-03T16:28:27+00:00","dateModified":"2025-06-03T16:28:27+00:00","author":{"@id":"https:\/\/carleton.ca\/internetofthings\/#\/schema\/person\/34d81e303dbb8eda8ecb9a90d4420ed9"},"description":"Ali Farhat, Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy &nbsp; The Internet of Things (IoT) facilitates","breadcrumb":{"@id":"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/internetofthings\/2025\/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/internetofthings\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/carleton.ca\/internetofthings\/category\/news\/"},{"@type":"ListItem","position":3,"name":"IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/internetofthings\/#website","url":"https:\/\/carleton.ca\/internetofthings\/","name":"Sensor Systems and The Internet of Things","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/internetofthings\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/carleton.ca\/internetofthings\/#\/schema\/person\/34d81e303dbb8eda8ecb9a90d4420ed9","name":"mohannadabuissa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carleton.ca\/internetofthings\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/00991004a831c38dde16210a3a0234bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/00991004a831c38dde16210a3a0234bb?s=96&d=mm&r=g","caption":"mohannadabuissa"}}]}},"acf":{"Post Thumbnail":{"ID":1584,"id":1584,"title":"ieee","filename":"index-1.png","filesize":80053,"url":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1.png","link":"https:\/\/carleton.ca\/internetofthings\/2021\/virtual-sensing-networks-and-dynamic-rpl-based-routing-for-iot-sensing-services\/index-2\/","alt":"","author":"14","description":"","caption":"","name":"index-2","status":"inherit","uploaded_to":1428,"date":"2022-01-26 05:10:41","modified":"2025-03-20 18:38:58","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/carleton.ca\/internetofthings\/wp\/wp-includes\/images\/media\/default.png","width":651,"height":466,"sizes":{"thumbnail":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1-160x115.png","thumbnail-width":160,"thumbnail-height":115,"medium":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1-240x172.png","medium-width":240,"medium-height":172,"medium_large":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1.png","medium_large-width":651,"medium_large-height":466,"large":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1-400x286.png","large-width":400,"large-height":286,"gallery-thumb":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1-300x230.png","gallery-thumb-width":300,"gallery-thumb-height":230,"1536x1536":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1.png","1536x1536-width":651,"1536x1536-height":466,"2048x2048":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1.png","2048x2048-width":651,"2048x2048-height":466,"banner":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1.png","banner-width":651,"banner-height":466,"people":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1-200x200.png","people-width":200,"people-height":200,"post-thumb":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1-300x230.png","post-thumb-width":300,"post-thumb-height":230,"rotator-image":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1.png","rotator-image-width":651,"rotator-image-height":466,"video-thumb":"https:\/\/carleton.ca\/internetofthings\/wp-content\/uploads\/index-1-360x258.png","video-thumb-width":360,"video-thumb-height":258}},"Post Thumbnail Icon":"announcement-alert"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/internetofthings\/wp-json\/wp\/v2\/posts\/2020"}],"collection":[{"href":"https:\/\/carleton.ca\/internetofthings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/internetofthings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/internetofthings\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/internetofthings\/wp-json\/wp\/v2\/comments?post=2020"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/internetofthings\/wp-json\/wp\/v2\/posts\/2020\/revisions"}],"predecessor-version":[{"id":2021,"href":"https:\/\/carleton.ca\/internetofthings\/wp-json\/wp\/v2\/posts\/2020\/revisions\/2021"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/internetofthings\/wp-json\/wp\/v2\/media?parent=2020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/internetofthings\/wp-json\/wp\/v2\/categories?post=2020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/internetofthings\/wp-json\/wp\/v2\/tags?post=2020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}