<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>IEEE Internet of Things Journal</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1109/JIOT.2020</article-id>
      <title-group>
        <article-title>Towards the development of a secure IoT health system for Africa: A bibliometric review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ida S. TOGNISSE</string-name>
          <email>ida.tognisse@imsp-uac.org</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pélagie HOUNGUE</string-name>
          <email>pelagie.houngue@imsp-uac.org</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jules DEGILA</string-name>
          <email>jules.degila@imsp-uac.org</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hénoc SOUDE</string-name>
          <email>hsoude@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ife DANSOU</string-name>
          <email>ife.dansou@imsp-uac.org</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Isaac MBUMBA</string-name>
          <email>isaac.mbumba@imsp-uac.org</email>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>8</volume>
      <issue>2020</issue>
      <fpage>1</fpage>
      <lpage>19</lpage>
      <abstract>
        <p>The Internet of Things (IoT) is a technology that is gaining increasing ground around the world and is involved in most areas of activity. In the healthcare sector, IoT devices play an important role, providing relevant information that can be used to make decisions in real time. As a result, the reliability of the collected, analyzed, and processed data is a vital element to ensuring the reliability of this system used in a field such as healthcare, where the consequences of errors can be fatal. However, the data in this system are often exposed to attacks. Therefore, it is important to find appropriate technology and mechanisms to ensure data security. In this work, our objective is to conduct a study of the existing situation in order to understand how to efectively secure IoT data used in smart health. To achieve this, a bibliometric study is performed by examining 2584 documents. The data were visualized using VOSviewer and Bibliometrix and showed that countries such as India, China and United States remain the undisputed leaders in the field. Chinese institutions maintain the expertise followed by India, but collaborate little with foreign researchers, unlike the United States, which is cooperative. They have developed some very interesting solutions, and it is important to learn from the experience of these countries and contextualize them for efective development in Africa. Technically, blockchain remains the most widely used technology for data protection, but the issues of security and protection of patient data remain a major challenge that involves several other parameters.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Internet of Things</kwd>
        <kwd>Data security</kwd>
        <kwd>healthcare</kwd>
        <kwd>Health system</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>survey of what already exists in order to understand how to efectively secure IoT data used in health
intelligence. Specifically, it involves:
• A systematic bibliometric analysis of the scientific literature on the security of IoT systems
applied to healthcare;
• A critical qualitative analysis of the major contributions identified;
• A specific focus on African challenges and opportunities;
• Finally, the proposal of a model for adapting existing solutions to the technical, social and legal
realities of African countries.</p>
      <p>To meet these objectives, we address the understanding of trends and implications of research in terms
of IoT data security in healthcare, to provide a comprehensive overview of the development of the field
and future directions. In the remainder of this paper, in session 2 we present the work that has carried
out a review of the existing literature, in particular a bibliometric study, on data security in medical IoT
systems. In session 3, we present our methodological approach and in session 4 the results obtained in
this bibliometric study, followed by a discussion.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Review</title>
      <p>
        A bibliometric study is a study that provides a summary of research reported in scientific publications,
allowing researchers to generate quantitative information from existing data [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ][
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This study is of
vital importance for researchers to situate themselves in relation to their investigations, given the range
of research already covered in the field. Several bibliometric studies have been carried out on objects
connected to the internet and health. In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], Maysam et al. explore the transformative impact of the
Internet of Things (IoT) on healthcare care, highlighting its potential to improve patient monitoring,
optimize treatments, and reduce costs. The authors provide a systematic assessment of the scientific
output in this rapidly evolving field, making it a valuable resource for understanding current trends
and future directions in smart healthcare systems. The authors point out that research in this area is
expanding rapidly, with a notable increase in publications and international collaborations. They also
highlight the importance of continuing to explore IoT applications in healthcare to develop smart and
eficient healthcare systems in the future. This systematic evaluation of scientific publications provides
a solid basis for understanding current trends and future directions in IoT research in medicine. They
analyzed articles indexed in the Web of Science database covering the period from 2013 to August 2024,
while suggesting that future researchers explore other databases such as scopus to facilitate comparisons
with the results of this study. Using bibliometric analysis to shed light on trends and developments in
this rapidly evolving field over the period 2015 to 2022, Hoang et al argue that the fascinating integration
of the Internet of Things (IoT) into the healthcare sector highlights its importance and impact on modern
healthcare electronics [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], a bibliometric analysis highlighted a comprehensive description of
the Internet of Things (IoT) concept between 2009 and 2019. They reviewed the security aspect and
the importance of understanding research trends and emerging areas to better respond to current
technological challenges. The study focused on articles published in the Web of Science database, which
may not represent all research and publications in the field of IoT. The authors recommended exploring
the use of artificial intelligence (AI) and machine learning as promising technologies to improve the
security of IoT devices. These technologies can potentially help detect and prevent security threats
by analyzing data in real time and identifying patterns of anomalous behavior. Katarina et al in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]
worked on metavers security by conducting a bibliometric study. Thanks to this in-depth bibliometric
analysis, the authors map the significant themes and prominent sources in this evolving field. The
authors have taken a time frame of 2015-2024.
      </p>
      <p>
        Despite the multitude of works that focus on a survey of IoT in healthcare, there is a gap in the literature
in terms of studies that address the security of the generated data. Very few studies focus on the case of
developing countries. In this sense, in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], Sylverster et al explored the security and privacy implications
of IoT devices in the healthcare system in a developing country like Zambia. The study identified that
vulnerabilities such as device authentication, data breaches, insuficient regulatory frameworks pose
risks to patient data and overall system integrity. In addition, the context of developing countries is
marked by a lack of communication and energy infrastructure, low technology adoption and healthcare
workers who do not have the minimum skills to deal with the risk of cyber attacks. In [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] through a
literature review, the authors demonstrated the advantages and disadvantages of IoT and connected
healthcare by highlighting the security and privacy issues encountered on a global scale and on an
African scale in particular by targeting a developing country such as South Africa. The study looked in
more detail at the advantages and disadvantages of the proposed attack detection frameworks. The
common disadvantages of the solutions are that the systems are unable to learn new patterns, new
behaviours and define security measures. A systematic review has also been developed in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and
provides a comprehensive framework that can be used to identify risks that afect authenticity, secure
access, network availability and security planning in IoT systems developed for healthcare. Despite this
work which focuses on developing countries, there is still a lack of information on how the experience of
developing countries and existing new technologies could help to ensure safe deployment in developing
countries.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Methodology</title>
      <p>The methodology adopted for this research is divided into several phases. Firstly, the data for this
research was collected from the Scopus database, which includes 2584 published between 2020 and 2025.
The data extraction date is 25 April 2025 and the research string is: (("Internet of Things" OR "Connected
object" OR IoT OR "smart health" ) AND ( "Data security" OR "Data Protection" OR "Information security"
OR "Data Integrity" OR "data confidentiality" OR "data privacy" ) AND ( health OR medical OR sick
OR patient )). The data visualization and analysis phase enabled us to explore our database, obtained
after standardizing the search terms on Scopus, and to extract the information needed to achieve our
objectives for this study. The VOSviewer and RStudio software with the Bibliometrix library were used
to view and analyses the data, producing the results presented in the next section.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Results and Discussions</title>
      <p>Bibliometric analysis is a powerful tool that uses statistical approaches to detect descriptive and
analytical variations in a research subject. It allows trends, productivity and future directions of
research to be assessed in order to draw meaningful conclusions. In this section, we present the results
of our bibliometric analysis in order to meet the research objectives presented in section 1.</p>
      <sec id="sec-4-1">
        <title>4.1. Annual distribution of publications</title>
        <p>Figure 1 illustrate annual distribution of scientific production on the data base collected.
From 2020 to 2025, we saw a steady increase in the number of articles published each year. The number
of publications increased from 216 in 2020 to 833 in 2024, a nearly 4-fold increase in 4 years. Already
236 articles have been published for the first quarter of 2025.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Countries of Scientific contribution</title>
        <p>In this figure, India, China, the United States and Saudi Arabia dominating in terms of total number of
publications. However, very little contribution comes from countries such as the African countries. Only
countries such as Nigeria, Ghana, Senegal, Algeria and Egypt are featured with a small contribution. We
can also see that there appears to be fairly dense international collaboration in the field, with several
groups of countries working more closely together. India, China and the United States are major centers,
indicating their strong involvement in international projects; Europe forms a dense group, showing
numerous regional collaborations; Africa tries to situate itself in relation to three countries, India, China
and Saudi Arabia, with which collaborations are carried out.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Distribution of publications by journals</title>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Keyword co-occurrence networks</title>
        <p>Figure 4 shows the co-occurrence of terms in the field. We can see that the data security aspect has
been taken seriously in this period, with an emphasis on blockchain technology, integrating artificial
intelligence, machine learning, and deep learning...</p>
        <p>clarifying that themes such as "Internet of Things", "network security", "data protection" and
"blockchain" appear as moderately central and developed topics. This suggests that they are at the
heart of the discussions in the corpus studied. These concepts form a structuring axis of the field but
still require eforts to reach full maturity.</p>
        <p>Several distinct color clusters can be identified in this figure:
• The red cluster centered on the theme "authentication", including terms such as "cryptography",
"privacy prevention", "IoT security", "digital signature", highlights the security aspects of the
systems. Authentication is a central term in the red security cluster, but it also has links with
other clusters, notably healthcare.
• A blue cluster associated with "data privacy" and including terms such as "data protection",
"privacy preservation", "diferential privacy", "trust", etc., highlighting the challenges of data
protection.
• A yellow cluster around "blockchain", with terms such as "smart contracts", "distributed ledger",
"ethereum" etc, indicating the application of blockchain. Blockchain appears to be a bridge
between security and specific applications such as smart contracts and potentially healthcare.
• A green cluster linked to "artificial intelligence" and "machine learning", with terms such as "big
data" and "predictive analytics", presenting technologies commonly found in the system.
• A cluster associated with "data management", "data acquisition", "classification", "clustering", etc.,
representing aspects of data management and analysis.</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Top ten authors</title>
        <p>list of the 10 best authors.</p>
      </sec>
      <sec id="sec-4-6">
        <title>4.6. Ten best papers</title>
        <p>Most of the most cited works in our database are systematic literature reviews. This shows how
important it is for the research community to have an in-depth view of the subject of IoT data security
and protection in healthcare. In the healthcare system, medical information is sensitive by nature, and
its security is a challenge. Whatever the use of IoT in the healthcare sector, the attack surface and
vulnerabilities of the IoT infrastructure the security risks are inherent in any connected device. From
these various studies, it is clear that for reliable and sustainable deployment in Africa, certain factors
need to be taken into account.</p>
      </sec>
      <sec id="sec-4-7">
        <title>4.7. Recommended model for adapting existing solutions to the realities of African countries</title>
        <p>We propose a structured adaptation model based on certain criteria, including:
• Appropriate technological choices: low-cost devices, low energy consumption.
• Legal aspects: proposal for a minimum medical data protection framework adapted to the African
context.
• Training and awareness: define training programmes for local users (healthcare professionals,
technicians).
• Deployment strategy: giving priority to distributed architectures to reduce dependence on
unstable networks.</p>
        <p>Firstly, the IoT system must be based on reliable infrastructure and quality Internet connectivity (see
wireless networks and move towards 5G). Secondly, to ensure data security, algorithms combining
machine learning and blockchain must be implemented. In this system, each device must be identiefid
by a unique address, using Web transfer protocols such as the Constrained Application Protocol (CoAP).
REST APIs must also be used, enabling clients to interact with the blockchain network, which benefits
from double security. For implementation in these systems, these complementary technologies need to
be considered to accelerate adoption and profitability. Energy optimization must also be a priority.
Finally, a blockchain framework for IoT in healthcare needs to be considered. There is a need for
explicit IoT security regulations and standards generally. The framework must take into account not
only the techno-economic but also the legal realities of African countries.</p>
        <p>Therefore, several aspects need to be taken into account to ensure the secure deployment of this
technology. For each aspect, we need to:</p>
        <p>Equipments :
• Biometric sensors adapted to users’ needs.
• Wearable devices for remote monitoring of the patient’s condition.
• Connected medical devices with simple, ergonomic interfaces.
• Secure transmission to the local IoT gateway via (LoRaWAN, NB-IoT, mobile phone networks).
• Edge processing: Maximise local data processing (IoT gateway) to reduce dependency on a stable
internet connection and limit latency in the event of critical alerts.
• Local security: Manage device authentication and data encryption. o Redundancy: Provide
mechanisms to keep devices and applications running in the event of temporary loss of connection
to the central network.</p>
        <p>Data analysis and security
• Tools for analyzing the data collected (big data, artificial intelligence), to identify trends, improve
clinical decision-making, and support public health policies.</p>
        <p>• Develop a blockchain to strengthen system security.</p>
        <p>Legal and policy aspects
• Draw up clear principles relating to the quality of consent, purpose, minimisation of collection,
limitation of storage periods, security and confidentiality.
• Establishment of a national authority to monitor compliance with the legal framework for the
processing of personal data and penalise breaches.</p>
        <p>• Inclusion of data protection modules in the training of health professionals and technicians.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>In this article, we conduct a bibliometric study on the secure development of IoT in healthcare. The
Internet of connected objects requires particular attention in terms of protecting user data, which is why
researchers in recent years have focused on emerging technologies such as Bitcoin, artificial intelligence,
machine learning and deep learning to guarantee the integrity of user data, It would be desirable for
the major leaders (China, India, USA, Germany), who are at the heart of the collaborative networks, to
strengthen their scientific cooperation in order to find solutions to the problems that remain unresolved
in this field, and for these nations to try to encourage scientists from other countries who want to tackle
this issue. The study revealed that the Internet of Things (IoT), data privacy, and blockchain occupy a
central place, indicating that they constitute the pillars of the efild. The study, based on Scopus data,
suggests that similar studies in combination with several databases would provide additional in-depth
information to understand the subject and compare it to produce more relevant analyzes. Analysis of
the most cited articles has enabled us to understand that for secure deployment in Africa, it is necessary
to opt for a combination of technologies such as machine learning and blockchain and well-determined
protocols. There is an urgent need for explicit IoT security regulations and standards, as well as a
comprehensive framework that takes into account all the challenges of IoT deployment in the specific
context of Africa. Being a simple review of existing literature, the main limitation of this work is that it
does not focus on the application of the proposed technologies, on testing and deployment. But it does
provide a starting point for design, implementation and deployment work to establish an appropriate
framework for the deployment of IoT systems in the specific case of Africa. Another limitation is that
the data used for this study comes solely from Scopus. The inclusion of Web of Science and IEEE Xplore
would increase coverage.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) used X-GPT-4 and Gramby in order to: Grammar and
spelling check. Further, the author(s) used X-AI-IMG for figures 3 and 4 in order to: Generate images.
After using these tool(s)/service(s), the author(s) reviewed and edited the content as needed and take(s)
full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>I. Saleh</surname>
          </string-name>
          ,
          <article-title>Issues and challenges of the internet of things (iot</article-title>
          ),
          <source>Internet des objets 17</source>
          (
          <year>2017</year>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          . doi:
          <volume>10</volume>
          .21494/iste.op.
          <year>2017</year>
          .
          <volume>0133</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S. M. R.</given-names>
            <surname>Islam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kwak</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. H. K. UWB</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. Hossain</surname>
          </string-name>
          , K.-S. Kwak,
          <article-title>The internet of things for health care: A comprehensive survey</article-title>
          ,
          <source>Electronic</source>
          <volume>3</volume>
          (
          <year>2015</year>
          )
          <fpage>678</fpage>
          -
          <lpage>708</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2015</year>
          .
          <volume>2437951</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Dimitrov</surname>
          </string-name>
          ,
          <article-title>Medical internet of things and big data in healthcare</article-title>
          ,
          <source>Healthc Inform Res</source>
          <volume>22</volume>
          (
          <year>2016</year>
          +)
          <fpage>156</fpage>
          -
          <lpage>163</lpage>
          . doi:
          <volume>10</volume>
          .4258/hir.
          <year>2016</year>
          .
          <volume>22</volume>
          .3.156.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K.</given-names>
            <surname>Rose</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Eldridge</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. Chapin,</surname>
          </string-name>
          <article-title>The internet of things (iot): An overview - understanding the issues and challenges of a more connected world</article-title>
          ,
          <source>Internet Society</source>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Konstantinidis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Billis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wharrad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. D.</given-names>
            <surname>Bamidis</surname>
          </string-name>
          ,
          <article-title>Internet of things in health trends through bibliometrics and text mining</article-title>
          ,
          <source>Stud Health Technol Inform</source>
          <volume>235</volume>
          (
          <year>2024</year>
          )
          <fpage>73</fpage>
          -
          <lpage>77</lpage>
          . doi:
          <volume>10</volume>
          . 3233/978-1-
          <fpage>61499</fpage>
          -753-5-73.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K. H.</given-names>
            <surname>Abdullah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Gazali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Muzawi</surname>
          </string-name>
          , E. Syam,
          <string-name>
            <given-names>M. F.</given-names>
            <surname>Roslan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sofyan</surname>
          </string-name>
          ,
          <article-title>Internet of things (iot) in education: A bibliometric review</article-title>
          ,
          <source>International Journal of Information Science and Management</source>
          <volume>22</volume>
          (
          <year>2024</year>
          )
          <fpage>183</fpage>
          -
          <lpage>202</lpage>
          . doi:
          <volume>10</volume>
          .22034/ijism.
          <year>2023</year>
          .
          <volume>1977600</volume>
          .0.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alavi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dehghan</surname>
          </string-name>
          ,
          <article-title>Internet of things in medicine: a bibliometric review</article-title>
          ,
          <source>International Journal of Web Research</source>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .22133/ijwr.
          <year>2024</year>
          .
          <volume>476672</volume>
          .1237.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>N. H-S</surname>
            , D. H.-C. M. Q-P,
            <given-names>M. J</given-names>
          </string-name>
          , H. J,
          <string-name>
            <surname>P. M</surname>
            ,
            <given-names>P. J. A</given-names>
          </string-name>
          ,
          <article-title>A bibliometrics analysis of medical internet of things for modern healthcare</article-title>
          ,
          <source>Electronics</source>
          <volume>12</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/electronics12224586.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Jaya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. F. A.</given-names>
            <surname>Razak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. N. E.</given-names>
            <surname>Phon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. I.</given-names>
            <surname>Hisham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Firdaus</surname>
          </string-name>
          ,
          <article-title>Systematic description of the internet of things: a bibliometric analysis</article-title>
          ,
          <source>J Theor Appl Inf Technol</source>
          <volume>100</volume>
          (
          <year>2022</year>
          )
          <fpage>2835</fpage>
          -
          <lpage>2853</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kostelić</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Etinger</surname>
          </string-name>
          ,
          <article-title>Securing the metaverse: A bibliometric analysis of cybersecurity challenges and research trajectories</article-title>
          , IEEE Engineering Management Review (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          . doi:
          <volume>10</volume>
          .1109/emr.
          <year>2024</year>
          .
          <volume>3453974</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mugala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. A. L.</given-names>
            <surname>Sibanda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Mulenga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hachamba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Mwiinga</surname>
          </string-name>
          ,
          <article-title>Exploring security and privacy implications of iot devices in zambia's healthcare system</article-title>
          ,
          <source>East African Journal of Information Technology</source>
          (
          <year>2025</year>
          ).
          <source>doi:10.37284/eajit.8.1</source>
          .2896.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>K. H. Naqvi</surname>
            ,
            <given-names>E. D.</given-names>
          </string-name>
          <string-name>
            <surname>Markus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Muthoni</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Abu-Mahfouz", A critical review of iot-connected healthcare and information security in south africa</article-title>
          ,
          <source>Lecture Notes in Networks and Systems</source>
          <volume>286</volume>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-16-4016-2_
          <fpage>70</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K. N</given-names>
            ,
            <surname>R. R</surname>
          </string-name>
          <article-title>", Iot medical device risks: Data security, privacy, confidentiality and compliance with hipaa</article-title>
          and
          <source>cobit</source>
          <year>2019</year>
          ,
          <source>South African Journal of Business Management</source>
          <volume>56</volume>
          (
          <year>2025</year>
          ). doi:
          <volume>10</volume>
          .4102/ sajbm.v56i1.
          <fpage>4796</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Stoyanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Nikoloudakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Panagiotakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Pallis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. K.</given-names>
            <surname>Markakis</surname>
          </string-name>
          ,
          <article-title>A survey on the internet of things (iot) forensics: Challenges, approaches, and open issues</article-title>
          ,
          <source>IEEE Communications Surveys and Tutorials</source>
          <volume>22</volume>
          (
          <year>2020</year>
          )
          <fpage>1191</fpage>
          -
          <lpage>1221</lpage>
          . doi:
          <volume>10</volume>
          .1109/COMST.
          <year>2019</year>
          .
          <volume>2962586</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>H.</given-names>
            <surname>Muneeb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Rehmani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Diferential privacy techniques for cyber physical systems: A survey, Commun</article-title>
          .
          <source>Surveys Tuts</source>
          .
          <volume>22</volume>
          (
          <year>2020</year>
          )
          <fpage>746</fpage>
          -
          <lpage>789</lpage>
          . doi:
          <volume>10</volume>
          .1109/COMST.
          <year>2019</year>
          .
          <volume>2944748</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J. J.</given-names>
            ,
            <surname>Hathaliya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tanwar</surname>
          </string-name>
          ,
          <article-title>An exhaustive survey on security and privacy issues in healthcare 4.0</article-title>
          ,
          <string-name>
            <surname>Computer</surname>
            <given-names>Communications</given-names>
          </string-name>
          153 (
          <year>2020</year>
          )
          <fpage>311</fpage>
          -
          <lpage>335</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.comcom.
          <year>2020</year>
          .
          <volume>02</volume>
          .018.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>M. N.</surname>
          </string-name>
          <article-title>Bhuiyan1, Internet of things (iot): A review of its enabling technologies in healthcare applications, standards protocols, security and market opportunities</article-title>
          ,
          <source>IEEE INTERNET OF THINGS JOURNAL</source>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1109/JIOT.
          <year>2021</year>
          .
          <volume>3062630</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>