Security and Privacy in IoT Healthcare System: A systematic review
DOI:
https://doi.org/10.29304/jqcm.2022.14.1.882Keywords:
Internet of things, Security, Privacy, Smart Healthcare systemAbstract
As technology advances worldwide, several governments and health organizations develop or implement mobile health systems and applications to treat and monitor patients. Several health systems based on the Internet of Things (IoT) applications have been built to monitor patients remotely. Different mechanisms and techniques have been used in healthcare applications, such as centralized, decentralized, and hybrid. In addition, many communication technologies were used, such as Bluetooth, GPS, WiFi, and others. This systematic analysis discusses these aspects, focusing on user security, privacy, effective data extraction, and confidential handling. This review investigates all researches published between 2015 and 2021, where four databases (IEEE Xplore, ScienceDirect, Research Gate, and Springer) were considered. A detail of used exclusion criteria and selection procedure to assess the collected publications were presented. Only thirteen papers have matched the criteria thoroughly examined and included in this study. The findings are provided throughout the papers to highlight gaps and concerns in an IoT-based healthcare system that will be constructed to effectively decrease potential dangers during messaging while preserving total user privacy and security.
Downloads
References
[2] R. Somasundaram and M. Thirugnanam, "Review of security challenges in healthcare internet of things," Wireless Networks, pp. 1–7, 2020
[3] G. Hatzivasilis, O. Soultatos, S. Ioannidis, C. Verikoukis, G. Demetriou, and C. Tsatsoulis, "Review of security and privacy for the internet of medical things (iomt)," in 2019 15th international conference on distributed computing in sensor systems (DCOSS), pp. 457–464, IEEE, 2019.
[4] B. A. Alqaralleh, S. N. Mohanty, D. Gupta, A. Khanna, K. Shankar, and T. Vaiyapuri, "Reliable multi-object tracking model using deep learning and energy-efficient wireless multimedia sensor networks," IEEE Access, vol. 8, pp. 213426–213436, 2020.
[5] T. Vaiyapuri, V. S. Parvathy, V. Manikandan, N. Krishnaraj, D. Gupta, and K. Shankar, "A novel hybrid optimization for cluster-based routing protocol in information-centric wireless sensor networks for IoT based mobile edge computing," Wireless Personal Communications, pp. 1–24, 2021.
[6] Moher, D., Liberati, A., Tetzlaff, J. & Altman, D. G. Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. PLoS Med. 6, e1000097 (2009).
[7] Ahmadi, H., Arji, G., Shahmoradi, L., Safdari, R., Nilashi, M., Alizadeh, M., 2018. The application of Internet of things in healthcare: a systematic literature review and classification. Univers. Access Inf. Soc. 18 (4), 837–869.
[8] Dey, N., Hassanien, A.E., Bhatt, C., Ashour, A.S., Satapathy, S.C., 2018. Internet of Things and Big Data Analytics toward Next-Generation Intelligence. Springer.
[9] Wilson, D., 2017. An overview of the application of wearable technology to nursing practice. Nursing Forum, 52. Wiley Online Library, pp. 124–132, 2.
[10] Ahmed, A., Latif, R., Latif, S., Abbas, H., Khan, F.A., 2018. Malicious insiders attack in IoT based multi-cloud e-healthcare environment: a systematic literature review. Multimed. Tool. Appl. 77 (17), 21947–21965.
[11] He, D., Zeadally, S., 2015. An analysis of RFID authentication schemes for the Internet of things in a healthcare environment using elliptic curve cryptography. IEEE Internet of things journal 2 (1), 72–83.
[12] Yeh, K.-H., 2016. A secure IoT-based healthcare system with body sensor networks. IEEE Access 4, 10288–10299.
[13] Elhoseny, M., Ramírez-Gonz´alez, G., Abu-Elnasr, O.M., Shawkat, S.A., Arunkumar, N., Farouk, A., 2018. Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6, 20596–20608.
[14] Sharma, N., Bhatt, R., 2018. Privacy Preservation in WSN for Healthcare Application. International Conference on Computational Intelligence and Data Science. Procedia Computer Science 132 (2018) 1243–1252.
[15] S. Kavitha & P. J. A. Alphonse & Y. Venkataramana Reddy, An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System. Journal of Medical Systems (2019) 43:260.
[16] Rani, S.S., Alzubi, J.A., Lakshmanaprabu, S., Gupta, D., Manikandan, R., 2019. Optimal users based secure data transmission on the Internet of healthcare things (IoHT) with lightweight block ciphers. Multimed. Tool. Appl. 78 (9), 35405–35424.
[17] Karthigaiveni, M., Indrani, B., 2019. An efficient two-factor authentication scheme with the key agreement for IoT-based E-health care application using a smart card. Journal of Ambient Intelligence and Humanized Computing 10 (10), 1–12.
[18] Rathee, G., Sharma, A., Saini, H., Kumar, R., Iqbal, R., 2019. A hybrid framework for multimedia data processing in IoT healthcare using blockchain technology. Multimed. Tool. Appl. 79 (11), 9711–9733.
[19] Abou-Nassar, E.M., Iliyasu, A.M., El-Kafrawy, P.M., Song, O., Bashir, A.K., El-Latif, A.A. A., 2020. DITrust chain: towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE Access 8, 111223–111238.
[20] Sahoo, S.S., Mohanty, S., Majhi, B., 2020. A secure three-factor-based authentication scheme for health care systems using IoT-enabled devices. Journal of Ambient Intelligence and Humanized Computing 12 (1), 1419–1434.
[21] Fotouhi, M., Bayat, M., Das, A.K., Far, H.A.N., Pournaghi, S.M., Doostari, M.A., 2020., healthcare applications and issues. Int. J. Inf. Manag. 33 (5), 875–891., A lightweight and secure two-factor authentication scheme for wireless body area networks in healthcare IoT. Comput. Network. 177, 107333–107350.
[22] Islam, A., Young Shin, S., 2020. A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicles in the Internet of Things. Comput. Electr. Eng. 84, 106627–106642.
[23] Ming, Y., Yu, X., Shen, X., 2020. Efficient anonymous certificate-based multi-message and multi-receiver signcryption scheme for healthcare internet of things. IEEE Access 8, 153561–153576.
[24] S. Han, S. Zhao, Q. Li, C.-H. Ju, and W. Zhou, "PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance," IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 1940–1955, 2016.
[25] H. Zhang, Z. Cai, Q. Liu, et al., "A survey on security-aware measurement in SDN," Security and Communication Network, vol. 2018, Article ID 2459154, 2018.
[26] BK. Rai, A. Srivastava, Security and privacy issues in healthcare information system, Int. J. Emerg. Trends Technol. Comput. Sci. 3 (6) (2014).
[27] Mahawash Al-Jubouri, A. and Surayh Al-Janabi, D.R. 2021. SECURE RSA CRYPTOSYSTEM BASED ON MULTIPLE KEYS. Journal of Al-Qadisiyah for computer science and mathematics. 13, 3 (Aug. 2021), Comp Page 25 -33, . DOI:https://doi.org/10.29304/jqcm.2021.13.3.824.
[28] Jarah, N. (2021). Deep Learning In Wireless Sensor Network. Journal of Al-Qadisiyah for Computer Science and Mathematics, 13(1), Comp Page 11 -17. https://doi.org/10.29304/jqcm.2021.13.1.755.
[29] Sabeeh Mahmood, G., Mohammed Hasan, T., & Mudheher Badr, A. (2017). Multi-Authority System based Personal Health Record in Cloud Computing. Journal of Al-Qadisiyah for Computer Science and Mathematics, 9(1), 108-116. Retrieved from https://qu.edu.iq/journalcm/index.php/journalcm/article/view/20.