A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare (original) (raw)
Abstract
Currently, healthcare is critical environment in our society, which attracts attention to malicious activities and has caused an important number of damaging attacks. In parallel, the recent advancements in technologies, computing systems, and wireless communications are changing healthcare environment by adding different improvements and complexity to it. This article reviews the current state of the literature and provides a holistic view of cybersecurity in healthcare. With this purpose in mind, the article enumerates the main stakeholders and architecture implemented in the healthcare environment, as well as the main security issues (threats, attacks, etc.) produced in healthcare. In this context, this work maps the threats collected with a widely used knowledge-based framework, MITRE ATT&CK, building a contribution not seen so far. This article also enumerates the security mechanisms created to protect healthcare, identifying the principal research lines addressed in the literature, and listing the available public security-focused datasets used in machinelearning to provide security in the medical domain. To conclude, the research challenges that need to be addressed for future research works in this area are presented. CCS Concepts: • General and reference → Surveys and overviews; • Applied computing → Health care information systems; • Social and professional topics → Patient privacy; • Security and privacy → Security requirements;
Figures (10)
Where MD = Medical Devices, Req. = Requirements, Arch. = Architecture, Att. = Attacks, Mech. = Mechanisms, Tax. = Taxonomy, and Align. = Alignment. Table 1. Features Compared with Different Reviews
Fig. 2, Number of publications focused on surveys, privacy, threat taxonomy, and security mechanisms by year.
A Comprehensive Review of the State-of-the-Art 12 categories mapped to the steps executed in an attack: Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collec- tion, Command and Control, Exfiltration, and Impact. MITRE ATT&CK also has three different matrices for modelling different scenarios: Enterprise, which contains threats associated with Win- dows, Linux, Cloud, and so on; Mobile, which covers both Android and iOS threats; and Industrial Control Systems (ICS), focusing on industry-specific devices and operations.
Table 2. Attacks on Healthcare with CVSS to Medical Devices (MITRE) Classification (1) Delving into metric vector, we highlight that the main difference between Rubric proposed by MITRE and CVSSv3 is the reformulation of questions and options to evaluate such metrics and incorporating the processes and data managed in healthcare. Although the available options to select in the metrics maintain the same values, the description of the value and the reason for selecting it is changed according to the environment, processes, information, and assets belonging to medical domain. For example, to evaluate the Confidentiality impact of an attack, the impact
Table 3. Attacks on Healthcare with CVSS to Medical Devices (MITRE) Classification (2)
A Comprehensive Review of the State-of-the-Art
Table 4. Research Lines for Security and Privacy Mechanisms in Healthcare
Table 5. Healthcare Security-focused Datasets (KEH) with great results. Finally, Patricia et al. proposed a novel authentication method through brainwaves, demonstrating the applicability of this biometric factor. In contrast to biometric ap- proach, mutual-authentication was described by Deebak and Al-Turjman [30], and Alladi et al. [6] as the need to authenticate both sides of the communication. They presented a smart mutual authentication framework constituted by three stages: initialization by service-authority center, registration by a medical sensor, and smart authentication. Alladi et al. explained a Healthcare Authentication Protocol using Resource-constrained IoT devices (HARCI) with key establishment features.
Table 6. loT Security-focused Datasets control units was deployed. Bluetack [149] gathers Bluetooth traffic belonging to IoMT device where different attacks are applied, such as DoS and DDoS. Meanwhile, EEG Brainwave Datase [4] was created for industrial insider threat detection. The dataset contains data from 17 volur teer subjects. Another interesting dataset that has not been collected from medical environment i SOREL-20M [51]. We list this dataset here because can be very useful to malware detection insid of healthcare since it contains twenty million of malware samples and can help to train a Machin« Learning solution. The Received Signal Strength Based Gait Authentication dataset [101] includes | different type of data. It collects the received signal strength indicator (RSSI) emitted by wireles devices in WBANs to authenticate the patient. The two last datasets contain patient informatio1 Cyber Incident Detection for EMR [92] and MIMIC Dataset for Anomaly Detection [66] are create for incident detection in Electronic Medical Records (EMR) systems. In the case of MIMIC Datase for Anomaly Detection, it extracts data from the MIMIC database [68] composed of public EMRs t create a database that serves for anomaly detection.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (160)
- Mohiuddin Ahmed, Surender Byreddy, Anush Nutakki, Leslie F. Sikos, and Paul Haskell-Dowland. 2021. ECU-IoHT: A dataset for analyzing cyberattacks in internet of health things. Ad Hoc Network 122, (2021), 9 pages.
- Moshaddique Al Ameen, Jingwei Liu, and Kyungsup Kwak. 2012. Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems 36, 1 (2012), 93-101.
- Abdullah Algarni. 2019. A survey and classification of security and privacy research in smart healthcare systems. IEEE Access 7 (2019), 101879-101894.
- Ahmed Alhammadi et al. 2021. EEG Brainwave Dataset. (2021). DOI:https://doi.org/10.21227/553g-yn97
- Aitizaz Ali et al. 2021. Security, privacy, and reliability in digital healthcare systems using blockchain. Electronics 10, 16 (2021), 27 pages.
- Tejasvi Alladi, Vinay Chamola, and Naren. 2021. HARCI: A two-way authentication protocol for three entity health- care IoT networks. IEEE Journal on Selected Areas in Communications 39, 2 (2021), 361-369.
- Hussain Almohri, Long Cheng, Danfeng Yao, and Homa Alemzadeh. 2017. On threat modeling and mitigation of medical cyber-physical systems. In Proceedings of the 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems, and Engineering Technologies. IEEE, 114-119.
- Riham Altawy and Amr M. Youssef. 2016. Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices. IEEE Access 4 (2016), 959-979.
- Suvini P. Amaraweera and Malka N. Halgamuge. 2019. Internet of things in the healthcare sector: Overview of security and privacy issues. Security, Privacy, and Trust in the IoT Environment. 153-179.
- Ajit Appari and M. Eric Johnson. 2010. Information security and privacy in healthcare: Current state of research. International Journal of Internet and Enterprise Management 6, 4 (2010), 279-314.
- Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, and Thorsten Strufe. 2021. Inexpensive brain- wave authentication: New techniques and insights on user acceptance. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 55-72.
- Jeffrey K. Aronson, Carl Heneghan, and Robin E. Ferner. 2020. Medical devices: Definition, classification, and regu- latory implications. Drug Safety 43 (2020), 83-93.
- Rachad Atat et al. 2018. A physical layer security scheme for mobile health cyber-physical systems. IEEE Internet of Things Journal 5, 1 (2018), 295-309.
- Bachelor's in Healthcare Practice Management. 2022. Patient Confidentiality in Healthcare. (2022). Retrieved from https://online.maryville.edu/blog/patient-confidentiality.
- Jan H. Beinke, Christian Fitte, and Frank Teuteberg. 2019. Towards a stakeholder-oriented blockchain-based archi- tecture for electronic health records: Design science research study. Journal of Medical Internet Research 21, 10 (2019), 14 pages.
- Vitor H. Bezerra et al. 2018. Providing IoT host-based datasets for intrusion detection research. In Proceedings of the 18th Brazilian Symposium on Information and System Security. SBC, 15-28.
- Soumitra S. Bhuyan et al. 2020. Transforming healthcare cybersecurity from reactive to proactive: Current status and future recommendations. Journal of Medical Systems 44, (2020), 9 pages.
- Sergio Caltagirone, Andrew Pendergast, and Christopher Betz. 2013. The Diamond Model of Intrusion Analysis. (2013). Retrieved from https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf.
- Carmen Camara, Pedro Peris-Lopez, and Juan E. Tapiador. 2015. Security and privacy issues in implantable medical devices: A comprehensive survey. Journal of Biomedical Informatics 55 (2015), 272-289.
- Nadir A. Carreón, Christa Sonderer, Aakarsh Rao, and Roman Lysecky. 2021. A medical vulnerability scoring system incorporating health and data sensitivity metrics. International Journal of Computer and Information Technology 15, 8 (2021), 458-466.
- Luiz F. M. Carvalho et al. 2017. Provider-consumer anomaly detection for healthcare systems. In Proceedings of the 2017 IEEE International Conference on Healthcare Informatics. IEEE, 229-238.
- Anil Chacko and Thaier Hayajneh. 2018. Security and privacy issues with IoT in healthcare. EAI Endorsed Transac- tions on Pervasive Health and Technology 4, 14 (2018), 7 pages.
- Melissa Chase and Steven C. Coley. 2020. Rubric for Applying CVSS to Medical Devices. (2020). Retrieved from https://www.mitre.org/publications/technical-papers/rubric-for-applying-cvss-to-medical-devices.
- Yiqiang Chen, Xin Qin, Jindong Wang, Chaohui Yu, and Wen Gao. 2020. FedHealth: A federated transfer learning framework for wearable healthcare. IEEE Intelligent Systems 35, 4 (2020), 83-93.
- Emeka Chukwu and Lalit Garg. 2020. A systematic review of blockchain in healthcare: Frameworks, prototypes, and implementations. IEEE Access 8 (2020), 21196-21214.
- Lisa Croke. 2020. Cyberattacks in health care can threaten patient safety. AORN Journal 112, 4 (2020), P5-P5.
- L. Minh Dang, Md. Jalil Piran, Dongil Han, Kyungbok Min, and Hyeonjoon Moon. 2019. A survey on internet of things and cloud computing for healthcare. Electron 8, 7 (2019), 49 pages.
- Salaheddin Darwish, Ilia Nouretdinov, and Stephen D. Wolthusen. 2017. Towards composable threat assessment for medical IoT (MIoT). InProcedia Computer Science, Vol. 113. Elsevier B.V., 627-632.
- D. Stalin David and A. Jeyachandran. 2016. A comprehensive survey of security mechanisms in healthcare applica- tions. In Proceedings of the 2016 International Conference on Communication and Electronics Systems (ICCES). IEEE, 1-6.
- B. D. Deebak and Fadi Al-Turjman. 2021. Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things. IEEE Journal on Selected Areas in Communications 39, 2 (2021), 346-360.
- Steven A. Demurjian, Eugene Sanzi, Thomas P. Agresta, and William A. Yasnoff. 2018. Multi-level security in health- care using a lattice-based access control model. International Journal of Privacy and Health Information Management 7, 1 (2018), 80-102.
- Pradeep Deshmukh. 2017. Design of cloud security in the EHR for Indian healthcare services. Journal of King Saud University -Computer and Information Sciences 29, 3 (2017), 281-287.
- S. Dharshini and M. Monica Subashini. 2020. DMASK-BAN: Improving the security of body area networks. Computer Fraud & Security 2020, 5 (2020), 13-19.
- Amir Djenna and Diamel E. Saïdouni. 2018. Cyber attacks classification in IoT-based-healthcare infrastructure. In Proceedings of the 2ndCyber Security in Networking Conference (CSNet). IEEE, 1-4.
- Nourhene Ellouze, Mohamed Allouche, Habib B. Ahmed, Slim Rekhis, and Noureddine Boudriga. 2014. Security of implantable medical devices: Limits, requirements, and proposals. Security and Communication Networks 7, 12 (2014), 2475-2491.
- Christian Esposito, Alfredo De Santis, Genny Tortora, Henry Chang, and Kim-Kwang Raymond Choo. 2018. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Computing 5, 1 (2018), 31-37.
- EU GDPR. 2016. Regulation (EU) 2016/679 (General Data Protection Regulation). (2016). Retrieved from http://data. europa.eu/eli/reg/2016/679/2016-05-04.
- European Medicines Agency. 2022. Science Medicines Health. (2022). Retrieved from https://www.ema.europa.eu.
- European Parliament. 2017. Regulation (EU) 2017/745 on Medical Devices. (2017). Retrieved from https://ec.europa. eu/growth/single-market/european-standards/harmonised-standards/medical-devices_en.
- Aqsa Fatima and Ricardo Colomo-Palacios. 2018. Security aspects in healthcare information systems: A systematic mapping. Procedia Computer Science. 138, 12-19.
- Lorenzo Fernández Maimó et al. 2019. Intelligent and dynamic ransomware spread detection and mitigation in inte- grated clinical environments. Sensors 19, 5 (2019), 1114.
- Stephen Flowerday and Christos Xenakis. 2022. Security and privacy in distributed healthcare environments. Methods of Information in Medicine. (2022).
- France 24. 2021. Cyber Attacks Hit Two French Hospitals in One Week. (2021). Retrieved from https://www.france24\. com/en/europe/20210216-cyber-attacks-hit-two-french-hospitals-in-one-week.
- Raghu K. Ganti, Praveen Jayachandran, Tarek F. Abdelzaher, and John A. Stankovic. 2006. SATIRE: A software ar- chitecture for Smart AtTIRE. In Proceedings of the 4th International Conference on Mobile Systems, Applications and Services. ACM, 110-123.
- Sebastian Garcia, Agustin Parmisano, Maria J. Erquiaga, Veronica Valeros, and Maria Rigaki. 2020. IoT-23: A Labeled Dataset with Malicious and Benign IoT Network Traffic. (2020). https://doi.org/10.5281/zenodo.4743746
- Google. 2022. Dataset Search. (2022). Retrieved from https://datasetsearch.research.google.com.
- Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, and Neeraj Kumar. 2019. Tactile-internet-based telesurgery system for Healthcare 4.0: An architecture, research challenges, and future directions. IEEE Network 33, 6 (2019), 22-29.
- Hadi Habibzadeh and Tolga Soyata. 2019. Connected Health in Smart Cities. Springer, Cham, Chapter Toward uniform smart healthcare ecosystems: A survey on prospects, security, and privacy considerations, 75-112.
- Anar A. Hady, Ali Ghubaish, Tara Salman, Devrim Unal, and Raj Jain. 2020. Intrusion detection system for healthcare systems using medical and network data: A comparison study. IEEE Access 8 (2020), 106576-106584.
- Bo Han, Zhao Yin-Liang, and Zhu Chang-Peng. 2019. An object proxy-based dynamic layer replacement to protect IoMT applications. Security and Communication Networks 2019, Article 2798571 (2019), 9 pages.
- Richard Harang and Ethan M. Rudd. 2020. SOREL-20M: A large scale benchmark dataset for malicious PE detection. arXiv:2012.07634. Retrieved from https://arxiv.org/abs/2012.07634.
- Jigna J. Hathaliya and Sudeep Tanwar. 2020. An exhaustive survey on security and privacy issues in Healthcare 4.0. Computer Communications 153 (2020), 311-335.
- Jigna J. Hathaliya, Sudeep Tanwar, Sudhanshu Tyagi, and Neeraj Kumar. 2019. Securing electronics healthcare records in Healthcare 4.0: A biometric-based approach. Computers & Electrical Engineering 76 (2019), 398-410.
- Hanan Hindy, Christos Tachtatzis, Robert Atkinson, Ethan Bayne, and Xavier Bellekens. 2020. MQTT-IoT-IDS2020: MQTT Internet of Things Intrusion Detection Dataset. (2020). https://doi.org/10.21227/bhxy-ep04
- HIPAA Journal. 2022. HIPAA Compliance Checklist 2022. (2022). https://www.hipaajournal.com/hipaa-compliance- checklist.
- Suyoun Hong, Kwangsoo Kim, and Taekyu Kim. 2019. The design and implementation of simulated threat generator based on MITRE ATT&CK for cyber warfare training. Journal of the Korea Institute of Military Science and Technology 22, 6 (2019), 797-805.
- Faisal Hussain et al. 2021. IoT DoS and DDoS Attack Dataset. https://doi.org/10.21227/0s0p-s959
- Faisal Hussain et al. 2021. IoT Healthcare Security Dataset. https://doi.org/10.21227/9w13-2t13
- Hassan M. Hussien, Sharifah Md Yasin, Nur I. Udzir, Mohd I. H. Ninggal, and Sadeq Salman. 2021. Blockchain tech- nology in the healthcare industry: Trends and opportunities. Journal of Industrial Information Integration 22, (2021), 100217.
- Information Technology Laboratory. 2019. Common Vulnerability Scoring System (CVSS) v3. https://nvd.nist.gov/ vuln-metrics/cvss.
- Information Technology Laboratory. 2022. National Vulnerability Database. Retrieved from https://nvd.nist.gov.
- S. M. Riazul Islam, Daehan Kwak, MD. Humaun Kabir, Mahmud Hossain, and Kyung-Sup Kwak. 2015. The internet of things for health care: A comprehensive survey. IEEE Access 3 (2015), 678-708.
- Farhana Jabeen, Zara Hamid, Adnan Akhunzada, Wadood Abdul, and Sanaa Ghouzali. 2018. Trust and reputation management in healthcare systems: Taxonomy, requirements and open issues. IEEE Access 6 (2018), 17246-17263.
- Tallat Jabeen, Humaira Ashraf, and Ata Ullah. 2021. A survey on healthcare data security in wireless body area networks. Journal of Ambient Intelligence and Humanized Computing 12 (2021), 9841-9854.
- Seemandhar Jain. 2021. MIMIC Dataset for Anomaly Detection. https://doi.org/10.21227/q0mg-6961
- Khlood Jastaniah, Ning Zhang, and Mustafa A. Mustafa. 2022. Efficient privacy-friendly and flexible IoT data aggre- gation with user-centric access control. arXiv:2203.00465. Retrieved from https://arxiv.org/abs/2203.00465.
- Alistair E. W. Johnson et al. 2016. MIMIC-III, a freely accessible critical care database. Scientific Data 3, Article 160035 (2016), 9 pages.
- Gulraiz J. Joyia, Rao M. Liaqat, Aftab Farooq, and Saad Rehman. 2017. Internet of medical things (IoMT): Applications, benefits and future challenges in healthcare domain. Journal of Communications 12, 4 (2017), 240-247.
- Mohan K. Kagita, Navod Thilakarathne, Thippa R. Gadekallu, and Praveen K. R. Maddikunta. 2022. Intelligent Internet of Things for Healthcare and Industry. Springer, Cham, Chapter A review on security and privacy of internet of medical things, 171-187.
- Hyunjae Kang et al. 2019. IoT Network Intrusion Dataset. https://doi.org/10.21227/q70p-q449
- Younghyun Kim et al. 2015. Implantable Biomedical Microsystems: Design Principles and Applications. William Andrew Publishing, Oxford, Chapter Reliability and security of implantable and wearable medical devices, 167-199.
- Jeonggil Ko et al. 2010. MEDiSN: Medical emergency detection in sensor networks. ACM Transactions on Embedded Computing Systems 10, 1, Article 11 (2010), 29 pages.
- S. Kulaç. 2019. A new externally worn proxy-based protector for non-secure wireless implantable medical devices: Security jacket. IEEE Access 7 (2019), 55358-55366.
- Caleb Kumar. 2017. New dangers in the new world: Cyber attacks in the healthcare industry. Int. J. Sci. Technol. Soc 10, 3 (2017), 1-15.
- Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, and Neeraj Kumar. 2018. Fog computing for Healthcare 4.0 envi- ronment: Opportunities and challenges. Computers & Electrical Engineering 72 (2018), 1-13.
- Roger Kwon, Travis Ashley, Jerry Castleberry, Penny Mckenzie, and Sri Nikhil G. Gourisetti. 2020. Cyber threat dictionary using MITRE ATT&CK matrix and NIST cybersecurity framework mapping. In Proceedings of the 2020 Resilience Week (RWS). IEEE, 106-112.
- Young S. Lee, Esko Alasaarela, and HoonJae Lee. 2014. Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system. In Proceedings of the International Conference on Information Networking. IEEE, 453-457.
- Xuran Li et al. 2020. Securing internet of medical things with friendly-jamming schemes. Computer Communications 160 (2020), 431-442.
- Xueping Liang et al. 2017. Towards decentralized accountability and self-sovereignty in healthcare systems. In Pro- ceedings of the 19th International Conference on Information and Communications Security. Springer, Cham, 387-398.
- Haibing Liu, Rubén González Crespo, and Oscar Sanjuán Martínez. 2020. Enhancing privacy and data security across healthcare applications using blockchain and distributed ledger concepts. Healthcare 8, 3, Article 243 (2020), 17 pages.
- Tatjana Loncar-Turukalo et al. 2019. Literature on wearable technology for connected health: Scoping review of research trends, advances, and barriers. Journal of Medical Internet Research 21, 9, Article e14017 (2019), 23 pages.
- Sabina Magalini et al. 2021. Cyberthreats to hospitals: Panacea, a toolkit for people-centric cybersecurity. Journal of Strategic Innovation and Sustainability. 16, 3 (2021), 185-191.
- Mukhtar M. E. Mahmoud et al. 2018. Enabling technologies on cloud of things for smart healthcare. IEEE Access 6 (2018), 31950-31967.
- S. Manimurugan et al. 2020. Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 8 (2020), 77396-77404.
- Gunasekaran Manogaran, Chandu Thota, Daphne Lopez, and Revathi Sundarasekar. 2017. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Springer, Cham, Chapter Big data security intelligence for healthcare Industry 4.0, 103-126.
- Gastón Márquez, Hernán Astudillo, and Carla Taramasco. 2019. Exploring security issues in telehealth systems. In Proceedings of the IEEE/ACM 1st International Workshop on Software Engineering for Healthcare (SEH). IEEE, 65-72.
- Lockheed Martin. 2011. The Cyber Kill Chain. (2011). Retrieved from https://www.lockheedmartin.com/en-us/ capabilities/cyber/cyber-kill-chain.html.
- Mbarek Marwan, Ali Karti, and Hassan Ouahmane. 2021. Proposal for a secure data sharing and processing in cloud applications for healthcare domain. International Journal of Information Technology and Applied Sciences 3, 1 (2021), 10-17.
- Thomas McGhin, Kim-Kwang R. Choo, Charles Z. Liu, and Debiao He. 2019. Blockchain in healthcare applications: Research challenges and opportunities. Journal of Network and Computer Applications 135 (2019), 62-75.
- David McGlade and Sandra Scott-Hayward. 2019. ML-based cyber incident detection for electronic medical record (EMR) systems. Smart Health 12 (2019), 3-23.
- Aleise Mcgowan, Scott Sittig, and Todd Andel. 2021. Medical internet of things: A survey of the current threat and vulnerability landscape. In Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS). ScholarSpace, 3850-3858.
- Pallavi Meharia and Dharma P. Agrawal. 2016. A hybrid key management scheme for healthcare sensor networks. In Proceedings of the 2016 IEEE International Conference on Communications (ICC). IEEE, 1-6.
- Ruchi Mehta and M. M. Parmar. 2018. Trust based mechanism for securing IoT routing protocol RPL against worm- hole&grayhole attacks. In Proceedings of the 3rd International Conference for Convergence of Technology (I2CT). IEEE, 1-6.
- Yair Meidan et al. 2018. N-BaIoT-Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Computing 17, 3 (2018), 12-22.
- Weizhi Meng, Kim-Kwang R. Choo, Steven Furnell, Athanasios V. Vasilakos, and Christian W. Probst. 2018. Towards bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Transactions on Network and Service Management 15, 2 (2018), 761-773.
- Microsoft Corporation. 2009. The STRIDE Threat Model. (2009). Retrieved from https://msdn.microsoft.com/library/ ee823878.
- Markus Miettinen et al. 2017. IoT SENTINEL: Automated device-type identification for security enforcement in IoT. In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems. IEEE, 2177-2184.
- Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: An ensemble of autoencoders for online network intrusion detection. arXiv:1802.09089. Retrieved from https://arxiv.org/abs/1802.09089.
- Marshed Mohamed and Michael Cheffena. 2018. Received signal strength based gait authentication. IIEEE Sensors Journal 18, 16 (2018), 6727-6734.
- Nour Moustafa. 2019. The Bot-IoT Dataset. https://doi.org/10.21227/r7v2-x988
- Lorenzo Mucchi, Sara Jayousi, Alessio Martinelli, Stefano Caputo, and Patrizio Marcocci. 2019. An overview of secu- rity threats, solutions and challenges in WBANs for healthcare. In Proceedings of the 13th International Symposium on Medical Information and Communication Technology (ISMICT). IEEE, 1-6.
- Uzma Mustafa, Eckhard Pflugel, and Nada Philip. 2019. A novel privacy framework for secure m-health applica- tions: The case of the GDPR. In Proceedings of the IEEE 12th IInternational Conference on Global Security, Safety and Sustainability (ICGS3). IEEE, 1-9.
- Ammar A. Mutlag, Mohd K. A. Ghani, N. Arunkumar, Mazin A. Mohammed, and Othman Mohd. 2019. Enabling technologies for fog computing in healthcare IoT systems. Future Generation Computer Systems 90 (2019), 62-78.
- Nipuni Nanayakkara, Malka Halgamuge, and Ali Syed. 2019. Security and privacy of internet of medical things (IoMT) based healthcare applications: A review. In Proc. 262nd IIER Int. Conf. Institute for Technology and Research, 1-18.
- Somayeh Nasiri, Farahnaz Sadoughi, Mohammad H. Tadayon, and Afsaneh Dehnad. 2019. Security requirements of internet of things-based healthcare system: A survey study. Acta Informatica Medica 27, 4 (2019), 253-258.
- Akm I. Newaz, Amit K. Sikder, Mohammad A. Rahman, and A. Selcuk Uluagac. 2021. A survey on security and privacy issues in modern healthcare systems: Attacks and defenses. ACM Transactions on Computing for Healthcare 2, 3, Article 27 (2021), 44 pages.
- R. Nidhya, S. Karthik, and G. Smilarubavathy. 2018. An end-to-end secure and energy-aware routing mechanism for IoT-based modern health care system. In Proceedings of the 2018 International Conference on Soft Computing and Signal Processing. Springer, Singapore, 379-388.
- Harun Oz, Ahmet Aris, Albert Levi, and A. Selcuk Uluagac. 2022. A survey on ransomware: Evolution, taxonomy, and defense solutions. ACM Computing Surveys (2022), 36. Just Accepted.
- Alexandros Pantelopoulos and Nikolaos G. Bourbakis. 2010. A survey on wearable sensor-based systems for health monitoring and prognosis. IIEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, 1 (2010), 1-12.
- Maria Papaioannou et al. 2022. A survey on security threats and countermeasures in internet of medical things (IoMT). Transactions on Emerging Telecommunications Technologies 33, 6, Article e4049 (2022), 15 pages.
- Juha Partala et al. 2013. Security threats against the transmission chain of a medical health monitoring system. In Pro- ceedings of the 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013). IEEE, 243-248.
- Laurie Pycroft and Tipu Z. Aziz. 2018. Security of implantable medical devices with wireless connections: The dan- gers of cyber-attacks. Expert. Rev. Med. Devices 15, 6 (2018), 403-406.
- Yazdan A. Qadri, Ali Nauman, Yousaf B. Zikria, Athanasios V. Vasilakos, and Sung W. Kim. 2020. The future of healthcare internet of things: A survey of emerging technologies. IEEE Communications Surveys & Tutorials 22, 2 (2020), 1121-1167.
- QED Secure Solutions. 2018. Risk Scoring System for Medical Devices. (2018). Retrieved from https://www. riskscoringsystem.com/medical.
- Sree Ranjani NY, A. G. Ananth, and L. Sudershan Reddy. 2021. Optimal cluster-based data aggregation in WSN for healthcare application. Advances in Dynamical Systems and Applications (ADSA) 16, 2 (2021), 683-701.
- Heena Rathore, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, and Mohsen Guizani. 2017. A review of security challenges, attacks and resolutions for wireless medical devices. In 13th International Wireless Communications and Mobile Computing Conference. IEEE, 1495-1501.
- Abdul Razaque et al. 2019. Survey: Cybersecurity vulnerabilities, attacks and solutions in the medical domain. IEEE Access 7 (2019), 168774-168797.
- Zia ur Rehman, Saud Altaf, and Saleem Iqbal. 2019. Survey of authentication schemes for health monitoring: A subset of cyber physical system. In Proceedings of the International Bhurban Conference on Applied Sciences and Technology. IEEE, 653-660.
- Junyu Ren, Jinze Li, Huaxing Liu, and Tuanfa Qin. 2022. Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT. Tsinghua Sci. Technol 27, 4 (2022), 760-776.
- Meghan Roos. 2021. Cyberattack Throws Southern California Hospital System Offline for Days. (2021). Retrieved from https://www.newsweek.com/cyberattack-throws-southern-california-hospital-system-offline-days-1588355.
- Sandip Roy et al. 2019. Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. EEE Transactions on Industrial Informatics 15, 1 (2019), 457-468.
- Michael Rushanan, Aviel D. Rubin, Denis F. Kune, and Colleen M. Swanson. 2014. SoK: Security and privacy in implantable medical devices and body area networks. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 524-539.
- Tanzila Saba, Khalid Haseeb, Imran Ahmed, and Amjad Rehman. 2020. Secure and energy-efficient framework using internet of medical things for e-healthcare. Journal of Infection and Public Health 13, 10 (2020), 1567-1575.
- Muneeb A. Sahi et al. 2018. Privacy preservation in e-healthcare environments: State of the art and future directions. IEEE Access 6 (2018), 464-478.
- Mohammad A. Salahuddin, Ala Al-Fuqaha, Mohsen Guizani, Khaled Shuaib, and Farag Sallabi. 2017. Softwarization of internet of things infrastructure for secure and smart healthcare. IEEE Computer 50, 7 (2017), 74-79.
- Yasmine N. M. Saleh, Claude C. Chibelushi, Ayman A. Abdel-Hamid, and Abdel-Hamid Soliman. 2020. Privacy preser- vation for wireless sensor networks in healthcare: State of the art, and open research challenges. arXiv:2012.12958. Retrieved from https://arxiv.org/abs/2012.12958.
- Johannes Sametinger, Jerzy Rozenblit, Roman Lysecky, and Peter Ott. 2015. Security challenges for medical devices. Communications of the ACM 58, 4 (2015), 74-82.
- Amal Sammoud, Mohamed Chalouf, Omessaad Hamdi, Nicolas Montavont, and Ammar Bouallegue. 2020. A new biometrics-based key establishment protocol in WBAN: Energy efficiency & security robustness analysis. Computers & Security 96, Article 101838 (2020), 15 pages.
- Pedro M. Sánchez Sánchez et al. 2021. A survey on device behavior fingerprinting: Data sources, techniques, appli- cation scenarios, and datasets. IEEE Communications Surveys & Tutorials 23, 2 (2021), 1048-1077.
- Borade S. Sarierao and Amara Prakasarao. 2018. Smart healthcare monitoring system using MQTT protocol. In Proceedings of the 2018 3rd International Conference for Convergence in Technology. IEEE, 1-5.
- Nader Sehatbakhsh, Monjur Alam, Alireza Nazari, Alenka Zajic, and Milos Prvulovic. 2018. Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust. IEEE, 1-8.
- Farida H. Semantha, Sami Azam, Kheng C. Yeo, and Bharanidharan Shanmugam. 2020. A systematic literature review on privacy by design in the healthcare sector. Electron 9, 3, Article 452 (2020), 29 pages.
- S. A. Senthilkumar, Bharatendara K. Rai, Amruta A. Meshram, Angappa Gunasekaran, and S. Chandrakumarman- galam. 2018. Big data in healthcare management: A review of literature. American Journal of Theoretical and Applied Business 4, 2 (2018), 57-69.
- Kashish A. Shakil, Farhana J. Zareen, Mansaf Alam, and Suraiya Jabin. 2020. BAMHealthCloud: A biometric authen- tication and data management system for healthcare data in cloud. Journal of King Saud University-Computer and Information Sciences 32, 1 (2020), 57-64.
- Salman Shamshad et al. 2022. An enhanced scheme for mutual authentication for healthcare services. Digital Com- munications and Networks 8, 2 (2022), 150-161.
- Iman Sharafaldin, Arash H. Lashkari, and Ali A. Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of the International Conference on Information Systems Security and Privacy. Springer Cham, 108-116.
- A. K. Singh, A. Anand, Z. Lv, H. Ko, and A. Mohan. 2021. A survey on healthcare data: A security perspective. ACM Transactions on Multimidia Computing Communications and Applications 17, 2s, Article 59 (2021), 26 pages.
- Harman Singh. 2021. The GDPR: Sensitive Personal Data, Differences, Examples and Data Protection. (2021). Retrieved from https://thecyphere.com/blog/sensitive-data.
- Haowen Tan and Ilyong Chung. 2018. A secure and efficient group key management protocol with cooperative sensor association in WBANs. Sens 18, 11, Article 3930 (2018), 25 pages.
- Wenjuan Tang, Ju Ren, Kun Deng, and Yaoxue Zhang. 2019. Secure data aggregation of lightweight e-healthcare IoT devices with fair incentives. IEEE Internet of Things Journal 6, 5 (2019), 8714-8726.
- Noshina Tariq, Ayesha Qamar, Muhammad Asim, and Farrukh A. Khan. 2020. Blockchain and smart healthcare security: A survey. Procedia Computer Science 175 (2020), 615-620.
- Matt Tatam, Bharanidharan Shanmugam, Sami Azam, and Krishnan Kannoorpatti. 2021. A review of threat modelling approaches for APT-style attacks. Heliyon 7, 1, Article e05969 (2021), 19 pages.
- Geethapriya Thamilarasu, Adedayo Odesile, and Andrew Hoang. 2020. An intrusion detection system for internet of medical things. IEEE Access 8 (2020), 181560-181576.
- The EU MDR. 2021. Medical Device Regulation (EU) 2017/745 (EU MDR). Retrieved from https://eumdr.com.
- The MITRE Corporation. 2021. MITRE ATT&CK v9.0. https://attack.mitre.org/versions/v9.
- Tolijan Trajanovski and Ning Zhang. 2022. IoT-BDA Botnet Analysis Dataset. https://doi.org/10.21227/sf59-sz80
- Devrim Unal. 2021. BlueTack. https://doi.org/10.21227/skhs-0b39
- U.S. Food & Drug Administration. 2022. Medical Device Safety. Retrieved from https://www.fda.gov/medical-devices/ medical-device-safety.
- Ivan Vaccari, Giovanni Chiola, Maurizio Aiello, Maurizio Mongelli, and Enrico Cambiaso. 2020. MQTTset, a new dataset for machine learning techniques on MQTT. Sens 20, 22, Article 6578 (2020), 17 pages.
- Junchao Wang et al. 2018. An ASIC implementation of security scheme for body area networks. In Proceedings of the 2018 IEEE international symposium on circuits and systems. IEEE, 1-5.
- Tiankuo Wei and Sicong Liu. 2021. Sparse learning based implantable medical device transmission against eavesdrop- ping. In Proceedings of the 2021 15th International Symposium on Medical Information and Communication Technology (ISMICT). IEEE, 70-75.
- Longfei Wu, Haotian Chi, and Xiaojiang Du. 2018. A secure proxy-based access control scheme for implantable medical devices. arXiv:1803.07751. Retrieved from https://arxiv.org/abs/1803.07751.
- Fan Wu et al. 2018. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems 82 (2018), 727-737.
- Weitao Xu et al. 2017. KEH-Gait: Towards a mobile healthcare user authentication system by kinetic energy harvest- ing. In Proc. 2017 Netw. Dist. Syst. Sec. Symp. Internet Society, 1-15.
- Tahreem Yaqoob, Haider Abbas, and Mohammed Atiquzzaman. 2019. Security vulnerabilities, attacks, countermea- sures, and regulations of networked medical devices-A review. IEEE Communications Surveys and Tutorials 21, 4 (2019), 3723-3768.
- David Zaldivar, Lo'ai A. Tawalbeh, and Fadi Muheidat. 2020. Investigating the security threats on networked med- ical devices. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference. IEEE, 0488-0493.
- Meng Zhang, Anand Raghunathan, and Niraj K. Jha. 2014. Trustworthiness of medical devices and body area net- works. Proceedings of the IEEE 102, 8 (2014), 1174-1188.
- Xiaoshuai Zhang and Stefan Poslad. 2018. Blockchain support for flexible queries with granular access control to electronic medical records (EMR). In Proceedings of the 2018 IEEE International Conference on Communications. IEEE, 1-6.
- Yinghui Zhang, Dong Zheng, and Robert H. Deng. 2018. Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal 5, 3 (2018), 2130-2145.
- Mohammed Zubair, Devrim Unal, Abdulla Al-Ali, and Abdullatif Shikfa. 2019. Exploiting bluetooth vulnerabilities in e-health IoT devices. In Proc. 3rd Int. Conf. Future Netw. Dist. Syst. ACM, Article 10, 7 pages. Received 23 December 2021; revised 30 September 2022; accepted 8 November 2022