2021
DOI: 10.1109/access.2021.3093442
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things

Abstract: Advances in synthetic biology and nanotechnology resulted in tools that can be used to control, reuse, modify, and re-engineer cells' structure, as well as enabling engineers to effectively use biological cells as programmable substrates to realize Bio-NanoThings (biological embedded computing devices). Bio-NanoThings are tiny, non-intrusive, and concealable devices that can be used for in-vivo applications such as intra-body sensing and actuation networks, where the use of artificial devices can be detrimenta… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 233 publications
(317 reference statements)
0
18
0
Order By: Relevance
“…Security and Privacy: The requirements for security and privacy are application-dependent. Particularly, intrusion into the body through IoNT systems (e.g., MC-based IoBNT systems and WBAN) may lead to bio-cyber attacks [191]- [193]. The challenge is to design stringent security-related measures that minimize the probability of intrusion (also as a potential source of abnormality) into the networks.…”
Section: B System Designmentioning
confidence: 99%
See 2 more Smart Citations
“…Security and Privacy: The requirements for security and privacy are application-dependent. Particularly, intrusion into the body through IoNT systems (e.g., MC-based IoBNT systems and WBAN) may lead to bio-cyber attacks [191]- [193]. The challenge is to design stringent security-related measures that minimize the probability of intrusion (also as a potential source of abnormality) into the networks.…”
Section: B System Designmentioning
confidence: 99%
“…The challenge is to design stringent security-related measures that minimize the probability of intrusion (also as a potential source of abnormality) into the networks. Authors in [191] also discuss challenges in designing interfaces for secure communications at the intersection of IoNTs and conventional communication systems. As previously mentioned in Subsection IV-C1, the attacks on intra-sensor and S2FC links may launch spoofing, sentry, blackhole, and eavesdropping attacks [131].…”
Section: B System Designmentioning
confidence: 99%
See 1 more Smart Citation
“…In a related development, the interfaces in conventional network nodes are increasingly taking over more computing functions, e.g., at the interfaces between the nodes and the network in the form of smart network interface cards (NICs) [350]- [353]. An interesting future research direction is to expand the functionalities of existing cyber-bio interfaces that interconnect conventional networks with DBMC nanonetworks, e.g., [191], [354]- [357], to incorporate computing functions. Throughout, for computing and decision making in DBMC systems, the benefits and costs of utilizing emerging reinforcement learning approaches, such as [358], [359], should be investigated.…”
Section: ) Emerging Paradigms: Beyond Shannon Communication + Conflue...mentioning
confidence: 99%
“… Communication media; and  remote cloud architecture. Zafar et al [26] conducted research on interface design based on nanotechnology (RFID, Chip Implants, etc.) to prevent attacks through cyber networks.…”
Section: Wsn Security Systemsmentioning
confidence: 99%