COVID-19: Secure Healthcare Internet of Things Networks, Current Trends and Challenges with Future Research Directions

被引:7
作者
Adil, Muhammad [1 ]
Ali, Jehad [2 ]
Jadoon, Muhammad Mohsin [3 ]
Alotaibi, Sattam Rabia [4 ]
Kumar, Neeraj [5 ,6 ,7 ,8 ]
Farouk, Ahmed [9 ]
Song, Houbing [10 ]
机构
[1] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[2] Ajou Univ Sejong Univ, Dept AI Convergence Network, Suwon 05006, South Korea
[3] Sino Pak Ctr Artificial Intelligence PAF IAST, Haripur 22620, Pakistan
[4] Taif Univ, Dept Elect Engn, Taif 2631126331, Saudi Arabia
[5] Thapar Univ, Patiala, Punjab, India
[6] Lebanese Amer Univ, Dept Elect & Comp Engn, Beirut, Lebanon
[7] King Abdulaziz Univ, Fac Comp & IT, Jeddah, Saudi Arabia
[8] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun, Uttarakhand, India
[9] South Valley Univ, Dept Comp Sci, Fac Comp & Artificial Intelligence, Hurghada, Egypt
[10] Univ Maryland Baltimore Cty, Dept Informat Syst, Baltimore, MD 21250 USA
关键词
Data privacy; authentication of patient wearable devices; healthcare IoT applications; COVID-19 and healthcare IoT applications; AUTHENTICATION SCHEME; ROUTING PROTOCOL; SMART HEALTH; EDGE-CLOUD; LOW-POWER; IOT; PRIVACY; LIGHTWEIGHT; ISSUES; TRUST;
D O I
10.1145/3558519
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of affirmed COVID-19 cases showed an enormous increase in the recent past throughout the globe. Keeping in view the catastrophic destruction of this devastating virus, there is a must-need situation to maximize the use of existing healthcare technologies such as the healthcare Internet of Things (H-IoT). In healthcare, patient wearable devices are widely recognized as a dormant technology with enormous capabilities to assess and combat various diseases, e.g., cough, seizure, temperature, heartbeat, and so on. As we know, in the H-IoT, patient-wearable devices are dispersed in an infrastructure-free environment that exposes them to several private and public coercion while accumulating and transmitting high sensitive data over the wireless communication channel. Therefore, security is the main concern of these applications, and thus, the primary focus of this article to outline the limitations and challenges in the present literature from 2019 to 2021, to identify the requirements of H-IoT applications used in the context of COVID-19. Following this, we will move one step ahead to explore the current security techniques adopted in these applications. Consequently, we will identify the network architectural, cryptographic, protocols, and operational security challenges during our study to recommend viable research directions and opportunities, which could be helpful and capable tominimize the network architecture, deployment, and maintenance cost with more productive outcomes.
引用
收藏
页数:25
相关论文
共 118 条
  • [1] Abadar Khaled, 2021, EUR J MOL CLIN MED, V7, P3432
  • [2] An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks
    Adil, Muhammad
    Almaiah, Mohammed Amin
    Alsayed, Alhuseen Omar
    Almomani, Omar
    [J]. SENSORS, 2020, 20 (08)
  • [3] MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks
    Adil, Muhammad
    Khan, Rahim
    Almaiah, Mohammed Amin
    Al-Zahrani, Mohammed
    Zakarya, Muhammad
    Amjad, Muhammad Saeed
    Ahmed, Rehan
    [J]. IEEE ACCESS, 2020, 8 (08): : 44459 - 44469
  • [4] A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic
    Ahamad, Shaik Shakeel
    Khan Pathan, Al-Sakib
    [J]. CONNECTION SCIENCE, 2021, 33 (03) : 532 - 554
  • [5] Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms
    Ahanger, Tariq Ahamed
    Aljumah, Abdullah
    [J]. IEEE ACCESS, 2019, 7 : 11020 - 11028
  • [6] Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks
    Ahmed, Firoz
    Ko, Young-Bae
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5143 - 5154
  • [7] Airehrour D, 2016, 2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P115, DOI 10.1109/ATNAC.2016.7878793
  • [8] Data Delivery in Wireless Multimedia Sensor Networks: Challenging and Defying in the IoT Era
    Al-Turjman, Fadi
    Radwan, Ayman
    [J]. IEEE WIRELESS COMMUNICATIONS, 2017, 24 (05) : 126 - 131
  • [9] IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art
    Albahri, A. S.
    Alwan, Jwan K.
    Taha, Zahraa K.
    Ismail, Sura F.
    Hamid, Rula A.
    Zaidan, A. A.
    Albahri, O. S.
    Zaidan, B. B.
    Alamoodi, A. H.
    Alsalem, M. A.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 173
  • [10] ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments
    Ali, Zeeshan
    Hussain, Sajid
    Rehman, Rana Haseeb Ur
    Munshi, Asmaa
    Liaqat, Misbah
    Kumar, Neeraj
    Chaudhry, Shehzad Ashraf
    [J]. IEEE ACCESS, 2020, 8 (08): : 107993 - 108003