“…In recent studies, Deebak et al [ 14 ] have device single user sign-in (SUSI) mechanism for the protection of multimedia data using the public key and encryption-decryption method in Remote Medical Point of Care (RM-PoC). The simulation studies have shown the higher efficiency in data computation and data transmission processes.…”
Internet of Medical Things (IoMT) has emerged as an integral part of the smart health monitoring system in the present world. The smart health monitoring deals with not only for emergency and hospital services but also for maintaining a healthy lifestyle. The industry 5.0 and 5/6G has allowed the development of cost-efficient sensors and devices which can collect a wide range of human biological data and transfer it through wireless network communication in real time. This led to real-time monitoring of patient data through multiple IoMT devices from remote locations. The IoMT network registers a large number of patients and devices every day, along with the generation of huge amount of big data or health data. This patient data should retain data privacy and data security on the IoMT network to avoid any misuse. To attain such data security and privacy of the patient and IoMT devices, a three-level/tier network integrated with blockchain and interplanetary file system (IPFS) has been proposed. The proposed network is making the best use of IPFS and blockchain technology for security and data exchange in a three-level healthcare network. The present framework has been evaluated for various network activities for validating the scalability of the network. The network was found to be efficient in handling complex data with the capability of scalability.
“…In recent studies, Deebak et al [ 14 ] have device single user sign-in (SUSI) mechanism for the protection of multimedia data using the public key and encryption-decryption method in Remote Medical Point of Care (RM-PoC). The simulation studies have shown the higher efficiency in data computation and data transmission processes.…”
Internet of Medical Things (IoMT) has emerged as an integral part of the smart health monitoring system in the present world. The smart health monitoring deals with not only for emergency and hospital services but also for maintaining a healthy lifestyle. The industry 5.0 and 5/6G has allowed the development of cost-efficient sensors and devices which can collect a wide range of human biological data and transfer it through wireless network communication in real time. This led to real-time monitoring of patient data through multiple IoMT devices from remote locations. The IoMT network registers a large number of patients and devices every day, along with the generation of huge amount of big data or health data. This patient data should retain data privacy and data security on the IoMT network to avoid any misuse. To attain such data security and privacy of the patient and IoMT devices, a three-level/tier network integrated with blockchain and interplanetary file system (IPFS) has been proposed. The proposed network is making the best use of IPFS and blockchain technology for security and data exchange in a three-level healthcare network. The present framework has been evaluated for various network activities for validating the scalability of the network. The network was found to be efficient in handling complex data with the capability of scalability.
“…Existing solutions include the use of multifactor authentication and the monitoring of the log activity of user accounts and revoking account access if no longer needed [ 10 ]. Deebak et al [ 51 ] proposed a chaotic map–based authenticated security framework for remote point of care. Health organizations such as those in the United Kingdom have started using services to monitor their remote access infrastructure constantly and to investigate anomalies.…”
Section: Resultsmentioning
confidence: 99%
“…Argaw et al [10] Apply multifactor authentication Deebak et al [51] Apply a chaotic map-based authenticated security framework for remote point of care Zorz [52] Apply remote access monitoring such as the NHS d attack surface reduction rules NHS Digital [53] Apply perimeter security solution such as NHS Secure Boundary to enable secure access Rezaeibagha et al [54] The health care sector needs to ensure data protection mechanisms for securing system access and transmitting data…”
Section: Secure the Remote Work Environmentmentioning
Background
COVID-19 has challenged the resilience of the health care information system, which has affected our ability to achieve the global goal of health and well-being. The pandemic has resulted in a number of recent cyberattacks on hospitals, pharmaceutical companies, the US Department of Health and Human Services, the World Health Organization and its partners, and others.
Objective
The aim of this review was to identify key cybersecurity challenges, solutions adapted by the health sector, and areas of improvement needed to counteract the recent increases in cyberattacks (eg, phishing campaigns and ransomware attacks), which have been used by attackers to exploit vulnerabilities in technology and people introduced through changes to working practices in response to the COVID-19 pandemic.
Methods
A scoping review was conducted by searching two major scientific databases (PubMed and Scopus) using the search formula “(covid OR healthcare) AND cybersecurity.” Reports, news articles, and industry white papers were also included if they were related directly to previously published works, or if they were the only available sources at the time of writing. Only articles in English published in the last decade were included (ie, 2011-2020) in order to focus on current issues, challenges, and solutions.
Results
We identified 9 main challenges in cybersecurity, 11 key solutions that health care organizations adapted to address these challenges, and 4 key areas that need to be strengthened in terms of cybersecurity capacity in the health sector. We also found that the most prominent and significant methods of cyberattacks that occurred during the pandemic were related to phishing, ransomware, distributed denial-of-service attacks, and malware.
Conclusions
This scoping review identified the most impactful methods of cyberattacks that targeted the health sector during the COVID-19 pandemic, as well as the challenges in cybersecurity, solutions, and areas in need of improvement. We provided useful insights to the health sector on cybersecurity issues during the COVID-19 pandemic as well as other epidemics or pandemics that may materialize in the future.
It is crucial to support emergency applications provided by vehicular adhoc network (VANET) through enabling vehicles to quickly access to the infrastructure and consequently request rescue services. Additionally, the communication channels between vehicles and the infrastructure lack various security features due to the inferior wireless characteristics of their environment. However, most of the existing authentication schemes which are used to fix the security drawbacks lead to heavy computations and large storage burdens on the vehicle onboard unit (OBU). These schemes utilize secure channels while distributing the network parameters between the various participants. Yet, it is not efficient to establish secure channels during the interactions between entities. Furthermore, lightweight cryptography is an efficient security solution which is adequate for OBU to maintain a reasonable efficiency with low computational and communication costs. Two basic demerits for lightweight authentication protocols are highlighted as follows: Firstly, symmetric key-based authentication protocols dismiss achieving non-repudiation feature, leading to several security attacks in VANET. Secondly, public key-based authentication schemes are relied on elliptic curve cryptography (ECC) which makes the protocol implementation more difficult. Hence, this paper introduces a novel authentication protocol that utilizes Chebyshev chaotic maps to secure connectivity between the vehicles and infrastructure without using secure channels to distribute the network parameters. The new protocol combines the concept of the symmetric key cryptography with the public key signature to satisfy both the lightweight property and non-repudiation feature. Thus, this protocol introduces a novel network model which is the lowest hardware complexity, compared with others. The performance analysis is performed by Wolfram Mathematica, proving that the proposed protocol is superior in terms of security and performance aspects; its computation and storage costs of OBU are enhanced with 24.09% and 16.99%, respectively, compared to the most competing scheme. Besides, the Scyther simulation confirms the security of the protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.