Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study

被引:11
作者
Marquez, Gaston [1 ,3 ]
Astudillo, Hernan [1 ,3 ]
Taramasco, Carla [2 ,3 ]
机构
[1] Univ Tecn Federico Santa Maria, Dept Informat, Valparaiso 2520000, Chile
[2] Univ Valparaiso, Escuela Ingn Civil Informat, Valparaiso 2520000, Chile
[3] Ctr Nacl Sistemas Informac Salud CENS, Area Calidad, Santiago 8380000, Chile
关键词
Telehealth systems; security; software engineering; systematic mapping study; HEALTH; TELEMEDICINE; NETWORK;
D O I
10.1109/ACCESS.2020.2964988
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Telehealth systems deliver remote care of elderly and physically less able patients as well as remote surgeries, treatments, and diagnoses. In this regard, several systemic properties must be satisfied (such as security) in order to ensure the functionality of Telehealth systems. Although existing studies discuss different security episodes that involve Telehealth systems, it is difficult to have a clear standpoint about which are the most reported security issues and which solutions have been proposed. Furthermore, since Telehealth systems are composed of several software systems, it is not clear which critical areas of Software Engineering are relevant to develop secure Telehealth systems. This article reports a systematic mapping study (SMS) whose purpose is to detect, organize, and characterize security issues in Telehealth systems. Based on the SMS results, we examine how Software Engineering may help to develop secure Telehealth systems. From over a thousand studies, we distinguished and classified 41 primary studies. Results show that (i) four security classifications (attacks, vulnerabilities, weaknesses, and threats) concentrate the most reported security issues; (ii) three security strategies (detect attacks, stop or mitigate attacks and react to attacks) characterize security issues, and (iii) the most relevant research themes are related to insecure data transmission and privacy. The SMS's findings suggest that software design, requirements, and models are key areas to develop secure Telehealth systems.
引用
收藏
页码:10933 / 10950
页数:18
相关论文
共 45 条
  • [1] A New Sensors-Based Covert Channel on Android
    Al-Haiqi, Ahmed
    Ismail, Mahamod
    Nordin, Rosdiadee
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [2] [Anonymous], [No title captured]
  • [3] [Anonymous], [No title captured]
  • [4] [Anonymous], [No title captured]
  • [5] [Anonymous], [No title captured]
  • [6] [Anonymous], [No title captured]
  • [7] [Anonymous], TEL GLOSS
  • [8] [Anonymous], 2013, SECURITY PATTERNS PR
  • [9] [Anonymous], 2015, BUILDING MICROSERVIC
  • [10] [Anonymous], [No title captured]