Quantum Computing and the Future of Healthcare Internet of Things Security: Challenges and Opportunities
Files
Links to Files
Author/Creator ORCID
Date
Type of Work
Department
Program
Citation of Original Publication
Adil, Muhammad, Aitizaz Ali, Ting Tin Tin, et al. “Quantum Computing and the Future of Healthcare Internet of Things Security: Challenges and Opportunities.” IEEE Internet of Things Journal, September 1, 2025, 1–1. https://doi.org/10.1109/JIOT.2025.3605040.
Rights
© 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Abstract
In recent years, quantum computing has made significant contributions to many emerging technologies. However, it also poses serious security challenges to these technologies, and one of them is Healthcare Internet of Things (HC-IoT) applications. The devices used in HC-IoT often have limited power, memory, and computational resources, making them especially vulnerable to various cyberattacks. Even a small security breach could cause serious problems, from general system failures to risks that directly affect patients’ diagnoses and treatment. To address this important issue, we review research from 2017 to 2025, examining both the strengths and weaknesses of the technology across various subdomains of the healthcare system. We begin by presenting a taxonomy of healthcare, along with a breakdown of different domains where this technology has been applied or holds potential for future use. This foundation helps establish the motivation and context for the study. Next, we discuss various security threats, considering both the pre-quantum and post-quantum computing eras. Then, we explore existing studies to see what progress has been made and what is still needed. Finally, we point out key security challenges that need more attention from the research community. Lastly, we provide a comparative analysis with existing review articles to address the question of why this article is needed in the presence of published reviews.
