Applsci 12 11039 v2
Applsci 12 11039 v2
sciences
Article
Security of Blockchain and AI-Empowered Smart Healthcare:
Application-Based Analysis
Abdulatif Alabdulatif 1, * , Ibrahim Khalil 2 and Mohammad Saidur Rahman 2
1 Department of Computer Science, College of Computer, Qassim University, Buraydah 52571, Saudi Arabia
2 Computer Science and Software Engineering, School of Science, RMIT University,
Melbourne, VIC 3000, Australia
* Correspondence: [email protected]
Abstract: A smart device carries a great amount of sensitive patient data as it offers innovative and
enhanced functionalities in the smart healthcare system. Moreover, the components of healthcare
systems are interconnected via the Internet, bringing significant changes to the delivery of healthcare
services to individuals. However, easy access to healthcare services and applications has given rise to
severe risks and vulnerabilities that hamper the performance of a smart healthcare system. Moreover,
a large number of heterogeneous devices accumulate data that vary in terms of size and formats,
making it challenging to manage the data in the healthcare repository and secure it from attackers
who seek to profit from the data. Thus, smart healthcare systems are susceptible to numerous security
threats and risks, such as hardware and software-based attacks, system-level attacks, and network
attacks that have the potential to place patients’ lives at risk. An analysis of the literature revealed a
research gap in that most security surveys on the healthcare ecosystem examined only the security
challenges and did not explore the possibility of integrating modern technologies to alleviate security
issues in the smart healthcare system. Therefore, in this article, we conduct a comprehensive review
Citation: Alabdulatif, A.; Khalil, I.; of the various most recent security challenges and their countermeasures in the smart healthcare
Saidur Rahman, M. Security of environment. In addition, an artificial intelligence (AI) and blockchain-based secure architecture is
Blockchain and AI-Empowered proposed as a case study to analyse malware and network attacks on wearable devices. The proposed
Smart Healthcare: Application-Based architecture is evaluated using various performance metrics such as blockchain scalability, accuracy,
Analysis. Appl. Sci. 2022, 12, 11039. and dynamic malware analysis. Lastly, we highlight different open issues and research challenges
https://doi.org/10.3390/app122111039 facing smart healthcare systems.
Academic Editors: Chunhua Su, Keywords: smart healthcare systems; security; data privacy; Internet of things; blockchain; wearable
Keping Yu, Celestine Iwendi and devices; medical devices
Thippa Reddy Gadekallu
remotely monitoring patients, smart applications for patients and caregivers, employee
management, and the care of critical patients. However, smart healthcare systems are
hindered by the security challenges that threaten the regular operations of a medical infras-
tructure. An adversary can discover security vulnerabilities in the hospital infrastructure
(e.g., defibrillator, patient monitor, central server, etc.) that can be exploited using a ma-
licious payload (e.g., ransomware, trojans, etc.) to put the patient’s life at risk. A recent
report by Fortified Health Security stated that, at the beginning of 2022, the healthcare
sector reported 337 data breaches [1]. Figure 1 shows the financial loss due to cyberattacks
on the healthcare industry from 2006–2026. The data were acquired from [2,3], and shows
the average financial loss to the US organizations due to the data breaches. The report
shown in [3] explains that the healthcare industry is the most affected sector according
to the number of breaches that occurred in 2022. In Figure 1, the data from 2006–2022
are real-time data acquired from the [3]; further, the data are forecasted from 2022–2026
using an exponential smoothing algorithm (ESA) that takes time series or year data to
predict the forecasted value. The forecasted value is our prediction value based on the
previous year’s value (it is acquired by the ESA algorithm ). From Figure 1 it is clear that
the healthcare sector is strongly affected by the lucrative business of the attacker that cost
8.7 million in the current year. This financial loss is detrimental to the nation’s economy.
The attackers leverage the security vulnerabilities either from the communication protocol
or from hardware/software services, and exploit the vulnerability using nefarious attacks
(e.g., Denial-of-Service (DoS), Man-in-the-Middle (MiTM), software-based attacks, data
integrity attacks, and hardware-based attacks) and attempt to gain access to the legitimate
healthcare resources. Therefore, it has become imperative to amalgamate different tech-
nologies and integrate them into the first line of defence (e.g., firewalls, access controls) in
order to detect and mitigate or prevent security threats efficiently before they jeopardize
the smart healthcare system.
12
Cost in million (U.S. dollar)
10
0
2006 2008 2010 2012 2014 2016 2018 2020 2022 2024 2026
Figure 1. Total financial loss due to cyberattacks on the healthcare industry (2006–2026) [3].
registration and authentication purposes. Then, the data are processed (i.e., prediction and
classification using AI algorithms),and this step is overseen by the trusted authority. Their
proposed scheme outperforms others in terms of delay, throughput, computation time, and
accuracy with other baseline works.
However, AI algorithms cannot deal with data integrity attacks, where an attacker
intercepts the communication in order to fetch and inject the malicious code into the
legitimate data. In addition, the attacker passively (covertly) listens to the network commu-
nication to find sensitive information about the healthcare resources, which includes the
number of patients are in critical conditions, what the thresholds of implant devices are,
and login credentials of patient information systems [8]. This information is crucial from the
security perspective because if the information gets into the wrong hands, severe privacy-
related issues can threaten the smart healthcare system. Hence, the researcher has adopted
blockchain technology characterised by decentralization, immutability, transparency, and
security [9,10]. Pinto et al. in [11] explored the benefits of blockchain technology in the
smart healthcare system, as it resolves the issue of data integrity, transparency, and security.
They proposed a traceable system for electronic health records, whereby a patient and user
can securely exchange their data. They used a private blockchain by implementing it in the
HyperLedger Fabric, where two separate databases are maintained for data traceability.
Further, the authors in [12] studied the heterogeneity problem of the smart healthcare sys-
tem resulting from the variety of devices and data formats, which makes data management
difficult. To address this issue, the authors presented a blockchain and cloud-based secure
and efficient framework for better interoperability in smart healthcare systems. The inte-
gration of blockchain with cloud computing reduces the computational cost and increases
the security and privacy of the smart healthcare system. Gohar et al. in [12] discusses the
benefits of amalgamating blockchain and cloud technology to offer cost-effective and secure
data storage of medical data. They proposed a five-tier secure and reliable framework for
better interoperability between different healthcare providers. Next, Dhairya et al. in [13]
proposed an AI and blockchain-based secure approach to securely transmit securely a
patient’s medical data to the medical staff. Firstly, they applied machine learning models
to classify malicious data obtained by wearables and remove them from the healthcare
systems. Then, they used blockchain technology to store the non-malicious wearable data
to confront data integrity attacks. Similarly, the authors of [14] presented a collaborative
framework comprising a deep learning model, blockchain, and 6G network interface. In
their proposed framework, the predicted data from the deep learning models is stored
inside the public blockchain to offer secure data storage. Moreover, the communication
between each entity of their proposed framework is provided by the 6G network that offers
low latency communication.
Despite applying the above-mentioned technologies in the smart healthcare system,
numerous modern attacks still pose a threat to data security. Hence, the purpose of this
current study is to examine various security attacks and their countermeasures for the
smart healthcare ecosystem. First, we describe the emerging technologies and their impact
on the smart healthcare system. Then, we examine recent security attacks on the healthcare
environment, which includes smart healthcare systems, electronic health records, and
patient information systems. Then a security solutions taxonomy is proposed to illustrate
the different solutions proposed by the scientific community across the globe. Then, a
comprehensive case study is conducted to mitigate cyber attacks on the smart healthcare
system, which is evaluated using different performance metrics, such as accuracy, scalability,
and malware dynamic analysis. Finally, we discuss several open issues and research
challenges (in line with security) that still hinder the smart healthcare system’s performance.
healthcare system, but most of the surveys target electronic healthcare record databases,
AI-based healthcare systems, and body area networks, where not all security attacks and
their countermeasures are explored. For instance, Usman et al. in [15] presented a layered
architecture for a body area network; then, at each layer, its security requirements are
investigated. The study investigated various security threats and challenges, particularly
for nano-networks and medical devices in body area networks. The authors of [16] explored
security and privacy concerns for network-based medical devices. This exhaustive survey
includes various medical devices, such as implantable, in and out body sensors, and remote
healthcare monitoring interfaces with their regulatory standards and security challenges.
The authors describe each security attack vector, such as eavesdropping, information dis-
closure, DoS, replay, sniffing attacks, etc., and its impact on medical devices. Further, they
reveal the shortcomings of the existing regulations and countermeasures applied to address
the security issues in network-based medical devices.
Then, Sun et al. in [17] studied the security and privacy vulnerabilities of IoT-based
healthcare devices. They first proposed an architecture where each level of the architecture is
endogenously explored for security and privacy challenges. They discuss attacks, such as au-
thentication, data integrity, access control, key management, and DoS attack with their security
solutions. The authors of [18] conducted a comprehensive study of security requirements of
Healthcare 4.0, and elaborated on the requirements such as mutual authentication, anonymity,
untraceability, perfect forward secrecy, and attack resistance [19]. Further, a taxonomy is
presented comprised of various components of Healthcare 4.0, feasible security solutions
are proposed. The authors of [20] explored the benefits of blockchain technology in tackling
security and privacy attacks in electronic health record systems. They reviewed different
blockchain-based schemes used to secure data storage, data sharing, and data audit of health-
care systems. Next, Bhuiyan et al. in [21] presented an exhaustive survey of IoT-based health-
care systems, where they focused on IoT-enabled healthcare infrastructure, standard protocols,
IoT healthcare security challenges, and market opportunities. In regard to security issues,
they reviewed device compromisation, information disclosure, and authentication attacks.
Furthermore, a threat model is discussed where they emphasise the importance of having a
risk management process to counter the security challenges. Jagatheesaperumal et al. in [22]
reviewed the emerging technologies to offer security solutions in the healthcare environment.
They discussed technologies such as IoT, futuristic networks, AI, and big data analytics and
the role of these technologies in providing effective healthcare security solutions. However,
most of the aforementioned studies explore general security attacks on a specific compo-
nent of healthcare, such as smart devices, electronic healthcare records, and remote patient
monitoring systems; but none of them gives a comprehensive details of those attacks and
how they influence healthcare organization and the patient’s life. Besides, a few surveys
have not explored possible modern-day attacks, and their countermeasures. For instance,
the authors of [20] reviewed only blockchain-based security solutions for the healthcare en-
vironment. In addition, the study did not investigates the recent attacks lunched on the
smart healthcare system and how they impacts on the healthcare organization. Therefore, a
comprehensive study is required that investigates recent security and privacy issues in smart
healthcare systems. Moreover, this study would examine the role of modern technologies
in confronting traditional and modern-day security attacks. Table 1 shows the comparative
analysis between the existing and presented studies.
Table 1. Comparative analysis of the existing state-of-the-art studies and the proposed studies.
Open Case
Author Year Contributions Taxonomy Cons
Issues Study
Concise survey on security and privacy Only body area network-based
Usman et al. [15] 2018 Yes No No
issues of wireless body area network security attacks were considered
Security solutions are not
Studied security threats in
Yaqoob et al. [16] 2019 Yes Yes No resistant towards modern
network-based medical devices
security attacks
Appl. Sci. 2022, 12, 11039 5 of 32
Table 1. Cont.
Open Case
Author Year Contributions Taxonomy Cons
Issues Study
Survey on security requirements for Very consice security attacks are
Sun et al. [17] 2019 Yes No No
Internet of medical things studied
Comprehensive survey on security and Most of the security solutions are
Hathaliya et al. [18] 2020 Yes Yes No
privacy issues of healthcare 4.0 based on authentication schemes
Review of blockchain-based security
Only blockchain-based security
Shi et al. [20] 2020 solutions for electronic healthcare Yes No No
solutions are explored
systems
Review of healthcare applications,
security, protocols and market Solutions are not operable with
Bhuiyan et al. [21] 2021 Yes Yes No
opportunities of IoT-based healthcare advance security vulnerabilities
system
Explored emerging technologies to
Jagathee saperumal Security attacks are partially
2022 offer security solutions in healthcare Yes No Yes
et al. [22] explored
systems
Explored security and privacy
The proposed
2022 solutions with their countermeasures Yes Yes Yes -
review
in smart healthcare systems
1.3. Organization
This article comprises the following sections: Section 2 discusses the emerging technolo-
gies being applied in smart healthcare systems. Section 3 explores various security threats to
and vulnerabilities of the smart healthcare system. Section 4 presents a taxonomy of security
countermeasures that can ensure security. Section 5 proposes a secure architecture to mitigate
the security risks in smart healthcare systems. Section 6 discusses the open issues and research
challenges of smart healthcare systems. Finally, Section 7 concludes the paper.
care and improve the performance of the traditional healthcare system. The following
are the key technologies adapted by the smart healthcare systems. Figure 2 illustrates
key-enabler technologies with their essential characteristics in the smart healthcare system.
Moreover, Table 2 shows the comparative analysis of various services offered by the modern
technologies such as blockchain, IoT, AI, and cloud computing. Then, Table 3 presents a
comprehensive analysis of the aforementioned modern technologies in the smart healthcare
systems comprehensively.
• Remote • Predictive
patient IoT AI analysis
monitoring
• SOP's
• Telesurgery validation
• Telemedicine • Improving
diagnosis
Emerging
technologies
in healthcare
• Human organ • Hybrid cloud for
supplychain data management
management
• Privacy in • Virtual medical
bio-informatics university
• Streamline Cloud
Blockchain • Increased
care and computing
prevent costly collaboration
mistakes in data sharing
• Drug
• Secure • Data storage • Interoperability
traceability
EHR and scalability in devices
and safety
Figure 2. Emerging technologies and framework of smart healthcare systems with their essen-
tial characteristics.
Modern
Authors Year Objective Pros Cons
Technology
IoT edge-enabled medical
Anonymity, scalability,
management system for Performance of system
Subahi et al. [26] 2019 IoT and efficiency parameters
better recommendation in needs to be improved
are not considered
healthcare systems
Presented a UAV and
Communication and
blockchain-based outdoor Improved scalability, latency,
Gupta et al. [27] 2020 UAV computation overhead is
delivery scheme for and network bandwidth
not focused
healthcare 4.0
Proposed an EHR scheme in Anonymous, high Should be implemented in
Ray et al. [28] 2021 Blockchain
IoT-based blockchain system interoperability, low cost real-time environment
Studied a vision-based
Wearable Need to consider latency
Gourob et al. [29] 2021 gesture recognition system Real-time execution
technology and reliability parameters
for controlling robotic hand
Presented a consortium
Need to minimize
blockchain-based system to Authenticated and
Subramanian et al. [30] 2021 Blockchain transaction fee and power
secure the data of diabetic improved transaction speed
consumption
patients
Discussed a healthcare Communication and
High robustness and quality
Tomasicchio et al. [25] 2022 emergency management to IoT computation overhead is
of service
monitor wide epidemics not discussed
Appl. Sci. 2022, 12, 11039 8 of 32
Table 3. Cont.
Modern
Authors Year Objective Pros Cons
Technology
Presented an AI-based Not focused security
Fair and preserve data
Parra et al. [31] 2022 recommendation system in AI attacks such as data
screening
a healthcare scenario modification and spoofing
Performed healthcare data Need to ensure security
Elayan et al. [32] 2022 analysis using deep AI Reduced operational costs against cyber and
federated learning privilege attacks
A Fog and blockchain-based
Cloud Low latency, high scalability, Need to check feasibility in
Costa et al. [33] 2022 architecture to manage the
computing and feasibility a virtual environment
global vaccination
to train on the data. Therefore, they adopted the decentralized algorithm, i.e., federated
learning to develop a message queuing telemetry transport (MQTT)-based distributed
networking framework for brain tumour segmentation. Their results show that their
proposed framework has better accuracy and latency performance in the regular operations
of the healthcare systems.
consider the scenario where elderly people are being treated with the help of wearable
sensor technologies. Thus, Mansour et al. [53] applied an AI and Internet of Things (IoT)-
based disease diagnosis model for smart healthcare systems. They have considered the
Cascaded Long Short Term Memory model for an efficient heart and diabetes diagnosis,
achieving the improved accuracy.
DoS attack sends multiple packets from a single machine; conversely, in a DDoS attack, the
attackers use previously-hijacked machines and interconnect them (botnets) so that each
machine sends multiple packets to the target machine simultaneously, thereby harming the
healthcare ecosystems. Several cases have been reported in the past where DDoS has been
considered one of the most significant attack vectors in the healthcare environment. For
example, in 2014, attackers unleashed a DDoS attack on the Boston Children’s Hospital,
where ≈ 40,000 network resources were manipulated and controlled by the attacker’s home
computer [57]. This attack was so massive that the Boston hospital not the only facility to be
affected; the attack also had severe effects on other hospitals connected to the same network
interface. Furthermore, the impact of DDoS attacks become more severe when integrated
with other passive or active attacks, such as malware and injection attacks, leading to
huge losses to healthcare infrastructure. Cybersecurity and Infrastructure Security Agency
(CISA) recently disclosed a new vulnerability in patient monitoring systems (CME8000
devices) that could cause a massive DDoS attack [58]. The attacker can craft multiple user
datagram protocol (UDP) packets to crash the CME8000 devices and to gain momentary
access to the system setting, where they can install malicious firmware. Consequently,
CME8000 devices’ functionality is permanently changed, which places the patient’s life
at risk. The authors of [59] designed a device authentication mechanism for IoT-enabled
healthcare systems. They have adopted the authentication mechanism to secure the IoT-
based healthcare system against DoS attack along with the other attacks such as MITM and
eavesdropping attacks.
Proposed
taxonomy
Rowhammer attack Brute force attack Unauthorized access DNS-based phishing MITM
Quincy disclosed a data breach that affected ≈2 million individuals and 50 small facilities.
In a cyberattack, individuals’ data, such as date of birth, patient medical data, addresses,
patients health insurance, and social security numbers, where accessed by the attackers [60].
Later, in August 2022, Yuma Regional Medical Center was exposed to a ransomware attack
that stole the social security numbers of ≈700,000 individuals [61]. Sharma et al. [62]
proposed a blockchain-based architecture to secure and preserve the patient’s electronic
health records by executing a smart contract. Furthermore, they focused on confirming the
user’s identity utilizing the zero-knowledge proof and proxy re-encryption safeguard the
healthcare systems against data breaches.
raphy to generate public-private key pairs that encrypt and decrypt all files associated with
the system. Here, the attackers only publicize the private key only when the victim pays the
ransom. Such malware compromises the entire healthcare organization in terms of finance
and reputation. For instance, the Karakurt ransomware group extended its cyberattacks
and impacted thousands of lives. First, it performs scanning and reconnaissance to gather
information about its targets; then, it attempts to acquire sensitive patient information.
Once the information is acquired, it encrypts the files until the ransom is paid [67]. Further,
North Korean-based Maui ransomware is targeting US-based healthcare sectors, especially
electronic health records, imaging, and diagnostic services [68]. It is designed to remotely
control and encrypt a particular file on an infected machine; it uses advanced encryption
standard (AES) 128-bit encryption standard with unique public-private key pairs, here
the key pairs are further encrypted using the Rivest Shamir Adleman (RSA) algorithm.
Moreover, the authors of [69] explored different types of ransomware attacks and their
possible countermeasures in smart healthcare systems. They discussed the significant
benefits of modern technologies, such as AI, blockchain, software-defined networks, and
IoT, safeguarding the smart healthcare ecosystem against malicious attacks.
cannot adequately maintain its resources and infrastructure properly. This is one reason
that the attacker first uses reconnaissance, i.e., scans the entire organization’s network to
find strong and weak vulnerabilities, either in software or in hardware. Software-based
attacks can occur where the administrator does not update their software, tools, operating
system, utility, and firmware. Outdated and obsolete software poses a severe threat to the
healthcare infrastructure; for example, old bugs are not patched in the updated version of
the software. Recently, four vulnerabilities have been found in healthcare services, such
as CVE-2020-11022, 2020-11023, 2015-9251, and 2019-11358 are the basic jQuery-based vul-
nerabilities [74]. Another vulnerability, i.e., CVE-2020-0601, was found in the Biomerieux
product, where an attacker signed a malicious executable using a spoofed code-signing
certificate to proliferate ransomware attack [75]. Further, healthcare providers are not
updating their firmware, which opens up the gate for attackers to counterfeit firmware
that gains access to the medical devices and makes fake copies of the healthcare firmware.
Argaw et al. [76] proposed a risk-based approach to maintain the cybersecurity between
healthcare professionals, staff, patients, vendors, academics, and manufacturers in the
modern healthcare systems. Further, they have discussed about the recent security and
privacy research challenges to the healthcare systems due to the involvement of medical
devices during the remote monitoring of patient’s health.
issue, Gountia et al. in [79] studied a vulnerability in the design flow of biochip devices
where an attacker can manipulate the samples by leveraging attacks, such as DoS, hardware
malware, and counterfeiting. To respond to these security issues, the authors developed a
user-defined algorithm that efficiently assigns a checkpoint for error recovery to improve
the security of microfluidic biochips. Their results show that the proposed algorithm
outperforms other baseline approaches in terms of computational complexity and error
detection rate. Further, the authors of [80,81] explored security issues (IoT device attacks) in
IoT-based healthcare systems. They proposed a multi-layered scheme where they integrate
programmable gate arrays consisting of hardware-based cipher algorithms to optimize the
security and privacy of the IoT-based healthcare ecosystem. Their results show that the
proposed scheme outperforms others in terms of energy consumption, computation time,
and frequency rate towards tackling security threats of IoT healthcare systems.
highlighted various security loopholes in SCADA systems where the ransomware can
be directly attacked; also, it shows different countermeasures to tackle the attack. The
authors of [86] proposed a blockchain-based ransomware defence system, where all
healthcare devices are associated with the blockchain network. Here, if the attackers
lock the system and personal files, the locked system can fetch the data from the
blockchain node (data recovery using blockchain backups). The proposed system also
saves the ransomware signatures in the blockchain to detect it and prevent it from
attacking the smart healthcare systems.
• Outdated software—Most smart healthcare systems still rely on old legacy systems
running on outdated operating systems and software easily accessible by the attacker.
This outdated software leaves many footprints (sensitive data), such as X-rays, MRI
scans, and doctor-patient conversations, that can raise several privacy concerns if
they fall into the wrong hands. Recently, security experts explored key-enabler tech-
nologies to integrate endpoint detection [87], reputational analysis [88], and real-time
behavioural analysis to detect any suspicious activities in smart healthcare systems.
In addition, the researchers also suggest using different vulnerability management
tools (e.g., Nessus, Nexpose, Tenable, Qualys, etc.) [89] that show device and software
vulnerabilities and software configurations in order to reduce the attack surface and
protect the healthcare resources from any security attacks.
• Fake firmware update—Smart healthcare systems are facing a major challenge in
regularly patching the firmware of their medical devices firmware. T. It is left to the
device manufacturer and maintenance vendor to update and patch the devices and
their associated firmware. Nonetheless, with modern security attacks, the attackers
can easily lure the old patched firmware and convert it into counterfeit firmware
using remote attacks, physical tampering, and indirect modification that helps the
attacker to propagate their attack surface and impact a large number of healthcare
resources. To secure the healthcare device’s firmware from the fake firmware update,
a maintenance vendor must analyse the firmware using the firmware security testing
methodology. The methodology is composed of nine consecutive steps, such as
reconnaissance, securely obtaining the firmware copy, analysing firmware using
firmware characteristics, analysing the firmware filesystem, performing static analysis
on the firmware to find code-based vulnerabilities, emulating the firmware, analysing
the binaries of firmware, performing dynamic analysis on firmware, and exploiting
the previously-identified firmware vulnerabilities [90].
forwards it to the inference engine, which output the severity of the URL, i.e., very low, low,
medium, and very high.
Table 4. Comprehensive analysis of existing state-of-the-art work for security solutions in smart
healthcare systems.
OSI Layer
Author Year Objective 4 5 6 7 8 Security Approach
Secured
To detect trojan attacks on
[79] 2019 Yes No No Yes No Checkpoint assignment Physical layer
medical hardware devices
To develop a secure data
Hardware- Field programmable Physical layer,
[80] 2018 collection scheme for smart Yes No No Yes Yes
based attack gate array (FPGA) network layer
healthcare system
solutions
IoT Hardware Platform
To improve the security Security Advisor Physical and
[81] 2021 Yes No No Yes No
performance of IoT devices (IoT-HarPSecA) network layer
framework
Appl. Sci. 2022, 12, 11039 19 of 32
Table 4. Cont.
OSI Layer
Author Year Objective 4 5 6 7 8 Security Approach
Secured
Detect malware in medical Attention-based AI Physical layer,
[82] 2022 No Yes No No No
devices technique network layer
Improve the security of
Oversampling with AI
[83] 2022 android wearable No Yes Yes No No Application layer
models
applications
Case study on Ransomware Dynamic malware
Software- [84] 2019 No Yes Yes No Yes Network layer
detection analysis
based attack
solution Provide a
Critical analysis of
comprehensive
[85] 2019 ransomware on SCADA No Yes Yes No No Network layer
analysis on
systems
ransomware
To develop a secure Blockchain and
framework to detect machine Network and
[86] 2022 No Yes Yes No Yes
ransomware in smart learning-based secure Application layer
healthcare systems framework
Equilibrium
Detect and defend the
[91] 2022 No No No No Yes optimization with Network layer
phishing attacks
transfer function
Phishing
Energy-Efficient phishing AI and Character-level
security [92] 2022 No No No No Yes Network layer
URL detection word encoding
solutions
Study the impact of
Fuzzy logic and data Application and
[93] 2022 COVID1-19 against the No No No No Yes
mining approaches network layer
malicious URL attacks
Centreless user
Develop a three factor
controlled single sign Application and
[94] 2022 authentication mechanism No No No Yes Yes
on authentication network layer
for smart healthcare system
mechanism
System-
Two stage authentication Physical,
based attack Physical unclonable
[95] 2020 scheme for IoT healthcare No No No Yes Yes application and
solution functions
systems network layer
To develop a static detection Static analysis using Physical,
[96] 2022 framework to detect No No No Yes Yes callback-based application and
privilege escalation attack programming network layer
Proposed a self anomaly
Proof-of-concept for
[97] 2020 detection system for No No No Yes Yes Network layer
anomaly detection
IoT-based devices
Proposed an energy-efficient
Communication-
and privacy preserving
based attack Cryptographic Application and
[98] 2021 framework to detect MiTM No No No Yes Yes
solutions mechanisms network layer
attack for smart healthcare
system
Lightweight
Proposed an authentication
authentication scheme Application and
[99] 2022 mechanism for wearable No No No Yes Yes
using different security network layer
devices
phases
Parameters- 4: DoS, 5: Malware, 6: Ransomware, 7: Data integrity, 8: Communication attack.
Malicious and
non-malicious csv csv csv
binaries Raw data
Attacker
Smart contracts
IPFS
Data splitting
IPFS IPFS
Windows
Sysinternals
IPFS
Training Testing Hospital
6G 6G
data data Store hash
value of data
Data Layer Malware Analysis Layer Intelligence Layer Blockchain Layer Application Layer
dataset is first analyzed using a statistical test to observe the distribution of the feature
space. For that, a parametric test is applied to the feature space (e.g., tcp.srcport, tcp.dstport,
tcp.windows, tcp.checksum, etc.) of the dataset to analyze the normal distribution. Figure 5
show that the dataset feature space does not follow a normal distribution. Therefore, we
used a non-parametric test, i.e., the Mann–Whitney U test, to analyse the dependency
between dependent and independent features.
A null hypothesis is created, i.e., a significant correlation between two features. The
null hypothesis is rejected if the p-value is smaller than the significance value, i.e., 0.05.
We used different features, i.e., mqtt.client and mqtt.conack.flags, to the Mann-Whitney U
Test that gives the p-value of 0.04, which is smaller than the significance. Hence, it rejects
the null hypothesis is rejected as there is no strong correlation between mqtt.client and
mqtt.conack.flags.
s t a t , p_value = mannwhitneyu ( data . mqtt . c l i e n t ,
data . mqtt . conack . f l a g s )
sign = 0.05
i f p_value < s i g n :
p r i n t ( ’No s i g n i f i c a n t c o r r e l a t i o n between two f e a t u r e s ) ’ )
else :
p r i n t ( ’ S i g n i f i c a n t c o r r e l a t i o n between two f e a t u r e s ) ’ )
Further, the dataset is preprocessed using various data preprocessing techniques,
such as missing values, normalization, and datatype casting. Then, the processed data
are forwarded to the AI models, where it is trained and validated using the real-time
network data extracted from the non-malware samples. Finally, the non-malware samples
containing malicious data are discarded from the proposed architecture, and only the
non-malware sample containing non-malicious data is forwarded to the next layer.
smart contract, which has predetermined conditions; upon meeting those conditions, the
data are validated [109]. Then, the data are received by the interplanetary file system (IPFS),
which hash the raw data to improve the response time of the blockchain network. Finally,
the hashed data are stored inside the public blockchain, where it is safeguarded from data
integrity attacks.
Further, Figure 8 shows the evaluation of the intelligence layer, where different AI-
based algorithms are trained using a standard dataset and validated using a generated
dataset from the malware samples. Here, the RF outperforms other algorithms in terms of
accuracy, i.e., 93.14%, because RF splits the entire dataset into small samples (as a decision
Appl. Sci. 2022, 12, 11039 24 of 32
tree) by using split node criteria. Then, each sample is individually trained, and the best
decision tree is chosen using majority voting (highest accuracy). Nevertheless, the other AI
algorithms are not optimized compared to RF because they need a few hyperparameters
so as to achieve good accuracy. Table 5 shows the performance analysis of the proposed
architecture in terms of precision, recall, log-loss score, and F1 score. Here, RF outperforms
in terms of precision, recall, log-loss score, and F1 score, i.e., 93.24%, 92.99%, 6.34%, and
93.67%, respectively compared to other AI models. Specifically, the accuracy parameter
shows how efficiently an AI model predicts the output. The higher the accuracy score, the
higher the AI model’s prediction performance. Conversely, the log-loss score shows an
error in the prediction output, i.e., the higher the log-loss score, the lower the AI model’s
prediction performance and vice-versa. Figure 9 illustrates the scalability comparison of the
blockchain network. The proposed architecture applies an IPFS-based blockchain that uses
hash data to store in the immutable ledger, unlike the conventional blockchain, which uses
raw data. The incorporation of IPFS improves the response time of the blockchain network
because one can more easily fetch the hash data from the blockchain network compared to
the raw data, resulting in a quick response time. This implies the higher the response time,
the higher the scalability of the proposed architecture. It is clear from the Figure 9 that the
IPFS-based blockchain has greater scalability than the conventional blockchain.
0.9
0.8
0.7
0.6
Accuracy
0.5
0.4
0.3
0.2
0.1
0
RF SVM NB LR Perceptron
Machine Learning Classifiers
Figure 8. Evaluation of the intelligence layer where different AI-based algorithms are trained using a
standard dataset and validated using a generated dataset from the malware samples.
private blockchain to store their data, although most of the private blockchain has a central
repository to maintain and control the private data of the healthcare ecosystem. The private
blockchains are severely affected by network-related attacks; therefore, the blockchain
is useful only for critical applications, such as covert military applications, where they
can integrate more sophisticated solutions at the cost of latency to strengthen the security
of the central repository of private blockchain. However, in smart healthcare systems,
maintaining the latency is challenging; hence, it is advisable not to use it. In our proposed
work, we have two security filters, i.e., malware and network-related attacks; both malware
and intelligence layers discard the malicious data from the proposed architecture. Only
non-malicious data are forwarded to the public blockchain; further, to improve the latency
of the smart healthcare system, we utilize the significant benefits of IPFS that improve the
response time of the blockchain network, resulting in greater scalability. As a result, the
proposed work is better and more robust than the existing work [11] in terms of accuracy,
scalability, and security.
80
Proposed architecture with IPFS
70 Proposed architecture with traditional blockchain
60
Scalability (ms)
50
40
30
20
10
0
0 15 30 45 60 75 90 105
Number of transactions
devices such as pacemaker, artificial joints, cardiac implants., attached to the patient’s
body, which gives rise to security issues in wireless communication between patient
and healthcare professionals during the remote treatment [112];
• Modern security attacks on smart healthcare systems—In addition to the typical at-
tacks such as DDoS, MITM, ransomware., the attackers have discovered new methods
of system attacking a system. The latest attacks include: software supply chain attacks;
attackers take advantage of the supplier network of a healthcare institution and capi-
talize on the system’s vulnerability. Internet of Things (IoT) attacks, A wide variety of
endpoint devices is now remotely connected to the Internet. The malware interprets
the changes caused by the system and manipulates the signals it receives to carry out
destructive activities [113];
• Accessibility of advanced technology in smart healthcare—With the modernization of
smart healthcare systems, healthcare professionals and staff have to manage advanced
technologies to handle the medical equipment for the remote monitoring of patients.
However, not all the healthcare professionals have had sufficient experience and
training enabling them to tackle the patient’s health symptoms through the usage of
innovative technologies. Thus, hospital management should train their professionals
or staff so that they become familiar with these technologies, although this can be
costly for hospitals [111,114];
• Scalability: Scalability is one of the major concerns that needs to be managed during
the wireless communication between patient and doctor in the remote treatment
set up. Depending on the patient’s health symptoms, healthcare professionals may
require several items of medical equipment and various implantable sensors to gather
the health data of patients and determine further treatment. Therefore, network
bandwidth needs to be optimized in smart healthcare systems for the reliable and
timely treatment of patients, since, low scalability communication between patient
and healthcare professionals can delay their treatment which can exacerbate a health
condition or even lead to the death or severe condition of patients [115].
7. Conclusions
The adoption of noteworthy catalyzers of innovations, such as AI, blockchain, IoT,
and cloud computing, will reshape the future of healthcare systems. However, the in-
tegration of these innovations of healthcare ecosystems comes with associated security
threats, including the manipulation of the patient monitor, exploitation of the healthcare
data repository, and interception of the communication between the healthcare provider
and the patient, all of which can jeopardize healthcare operations. Therefore, there is a
need to study different security challenges associated with smart healthcare systems along
with their security countermeasures. Hence, in this study, we first reviewed emerging
technologies and frameworks that offer automation, quality-of-service, fault tolerance, and
intelligent healthcare functionalities to patients. Then, we explored the various security and
privacy challenges facing the smart healthcare system, such as DoS, MiTM, data integrity
attacks, phishing, and hardware-based attacks. Further, based on the security challenges of
the healthcare industry, we reviewed prominent security solutions intended to strengthen
the security and privacy of smart healthcare systems. Another contribution to this study
is our proposal of an AI and blockchain-based secure architecture (as a case study) that
analyses the malware and network attacks on the smart healthcare system. First, medical
data are acquired from the data layer, which consists of different healthcare providers and
patients. Then, dynamic malware analysis is used to remove the data associated with the
malware by analysing its different characteristics, such as DLL, file size, hidden strings,
and signatures. Further, a standard dataset is used to train AI models for network-related
attacks in smart healthcare systems. The data are first preprocessed using data prepro-
cessing steps, such as the insertion of missing values, data normalization, and datatype
casting. Then, the preprocessed data are forwarded to the different AI models, such as
RF, NB, LR, and perceptron. The RF outperforms other existing AI algorithms in terms
Appl. Sci. 2022, 12, 11039 27 of 32
of accuracy, i.e., 93.14%. Further, the non-malicious data (classified from AI models) are
passed to the blockchain layer for secure data storage from data integrity attacks. Then,
the proposed architecture is evaluated using performance parameters, such as blockchain
scalability, accuracy, and dynamic malware analysis. Lastly, we discussed open issues and
research challenges associated with smart healthcare systems in order to encourage other
researchers and youngsters to offer better security solutions.
In future work, we intend to strengthen the security and privacy of AI and blockchain-
based smart healthcare systems by considering the various security attacks such as rowham-
mer, buffer overflow, masquerade, clone phishing, and phone phishing attacks, and the
mechanism to tackle the aforementioned security attacks to further maintain the security of
smart healthcare systems.
Author Contributions: Conceptualization, A.A.; Data curation, A.A. and I.K.; Funding acquisition,
A.A.; Investigation, A.A.; Software, A.A. and I.K.; visualization, M.S.R.; Writing—original draft, A.A.;
Writing—review & editing, M.S.R. All authors have read and agreed to the published version of the
manuscript.
Funding: The authors gratefully acknowledge Qassim University, represented by the Deanship of
Scientific Research, on the financial support for this research under the number (10118-coc-2020-1-3-I)
during the academic year 1441 AH/2020 AD.
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Top Mid-Year Healthcare Cybersecurity Trends. Available online: https://healthitsecurity.com/features/top-mid-year-
healthcare-cybersecurity-trends (accessed on 11 September 2022).
2. Average Cost of a Data Breach in the United States from 2006 to 2022. Available online: https://www.statista.com/statistics/27
3575/us-average-cost-incurred-by-a-data-breach/ (accessed on 21 September 2022).
3. Cost of a Data Breach 2022. Available online: https://www.ibm.com/reports/data-breach (accessed on 12 September 2022).
4. Patel, K.; Mehta, D.; Mistry, C.; Gupta, R.; Tanwar, S.; Kumar, N.; Alazab, M. Facial Sentiment Analysis Using AI Techniques:
State-of-the-Art, Taxonomies, and Challenges. IEEE Access 2020, 8, 90495–90519. https://doi.org/10.1109/ACCESS.2020.2993803.
[CrossRef]
5. Deebak, B.D.; Al-Turjman, F. Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet
of Medical Things. IEEE J. Sel. Areas Commun. 2021, 39, 346–360. https://doi.org/10.1109/JSAC.2020.3020599. [CrossRef]
6. Chiou, S.Y.; Ying, Z.; Liu, J. Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med.
Syst. 2016, 40, 101. [CrossRef]
7. Wazid, M.; Singh, J.; Das, A.K.; Shetty, S.; Khan, M.K.; Rodrigues, J.J.P.C. ASCP-IoMT: AI-Enabled Lightweight Secure Communication
Protocol for Internet of Medical Things. IEEE Access 2022, 10, 57990–58004. https://doi.org/10.1109/ACCESS.2022.3179418. [CrossRef]
8. Li, C.; Raghunathan, A.; Jha, N.K. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In
Proceedings of the 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, Columbia, MO,
USA, 13–15 June 2011; pp. 150–156. https://doi.org/10.1109/HEALTH.2011.6026732. [CrossRef]
9. Aggarwal, S.; Kumar, N.; Tanwar, S. Blockchain-Envisioned UAV Communication Using 6G Networks: Open Issues, Use Cases,
and Future Directions. IEEE Internet Things J. 2021, 8, 5416–5441. https://doi.org/10.1109/JIOT.2020.3020819. [CrossRef]
10. Gupta, R.; Shukla, A.; Tanwar, S. AaYusH: A Smart Contract-Based Telesurgery System for Healthcare 4.0. In Proceedings of the
2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland, 7–11 June 2020; pp. 1–6.
https://doi.org/10.1109/ICCWorkshops49005.2020.9145044. [CrossRef]
11. Pinto, R.P.; Silva, B.M.C.; Inácio, P.R.M. A System for the Promotion of Traceability and Ownership of Health Data Using
Blockchain. IEEE Access 2022, 10, 92760–92773. https://doi.org/10.1109/ACCESS.2022.3203193. [CrossRef]
12. Gohar, A.N.; Abdelmawgoud, S.A.; Farhan, M.S. A Patient-Centric Healthcare Framework Reference Architecture for Better Se-
mantic Interoperability Based on Blockchain, Cloud, and IoT. IEEE Access 2022, 10, 92137–92157.
https://doi.org/10.1109/ACCESS.2022.3202902. [CrossRef]
13. Jadav, D.; Patel, D.; Gupta, R.; Jadav, N.K.; Tanwar, S. BaRCODe: A Blockchain-based Framework for Remote COVID Detection
for Healthcare 5.0. In Proceedings of the 2022 IEEE International Conference on Communications Workshops (ICC Workshops),
Seoul, Korea, 16–20 May 2022; pp. 782–787. https://doi.org/10.1109/ICCWorkshops53468.2022.9814593. [CrossRef]
14. Mistry, C.; Thakker, U.; Gupta, R.; Obaidat, M.S.; Tanwar, S.; Kumar, N.; Rodrigues, J.J.P.C. MedBlock: An AI-enabled and
Blockchain-driven Medical Healthcare System for COVID-19. In Proceedings of the ICC 2021—IEEE International Conference on
Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. https://doi.org/10.1109/ICC42927.2021.9500397. [CrossRef]
Appl. Sci. 2022, 12, 11039 28 of 32
15. Usman, M.; Asghar, M.R.; Ansari, I.S.; Qaraqe, M. Security in Wireless Body Area Networks: From In-Body to Off-Body
Communications. IEEE Access 2018, 6, 58064–58074. https://doi.org/10.1109/ACCESS.2018.2873825. [CrossRef]
16. Yaqoob, T.; Abbas, H.; Atiquzzaman, M. Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked
Medical Devices—A Review. IEEE Commun. Surv. Tutor. 2019, 21, 3723–3768. https://doi.org/10.1109/COMST.2019.2914094.
[CrossRef]
17. Sun, Y.; Lo, F.P.W.; Lo, B. Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey. IEEE
Access 2019, 7, 183339–183355. https://doi.org/10.1109/ACCESS.2019.2960617. [CrossRef]
18. Hathaliya, J.J.; Tanwar, S. An exhaustive survey on security and privacy issues in Healthcare 4.0. Comput. Commun. 2020,
153, 311–335. https://doi.org/10.1016/j.comcom.2020.02.018. [CrossRef]
19. Banerjee, S.; Odelu, V.; Das, A.K.; Chattopadhyay, S.; Kumar, N.; Park, Y.; Tanwar, S. Design of an Anonymity-Preserving
Group Formation Based Authentication Protocol in Global Mobility Networks. IEEE Access 2018, 6, 20673–20693.
https://doi.org/10.1109/ACCESS.2018.2827027. [CrossRef]
20. Shi, S.; He, D.; Li, L.; Kumar, N.; Khan, M.K.; Choo, K.K.R. Applications of blockchain in ensuring the security and privacy of electronic
health record systems: A survey. Comput. Secur. 2020, 97, 101966. https://doi.org/10.1016/j.cose.2020.101966. [CrossRef]
21. Bhuiyan, M.N.; Rahman, M.M.; Billah, M.M.; Saha, D. Internet of Things (IoT): A Review of Its Enabling Technologies in
Healthcare Applications, Standards Protocols, Security, and Market Opportunities. IEEE Internet Things J. 2021, 8, 10474–10498.
https://doi.org/10.1109/JIOT.2021.3062630. [CrossRef]
22. Jagatheesaperumal, S.K.; Mishra, P.; Moustafa, N.; Chauhan, R. A holistic survey on the use of emerging technologies to provision
secure healthcare solutions. Comput. Electr. Eng. 2022, 99, 107691. https://doi.org/10.1016/j.compeleceng.2022.107691. [CrossRef]
23. Mezghani, E.; Exposito, E.; Drira, K. A Model-Driven Methodology for the Design of Autonomic and Cognitive IoT-Based Systems:
Application to Healthcare. IEEE Trans. Emerg. Top. Comput. Intell. 2017, 1, 224–234. https://doi.org/10.1109/TETCI.2017.2699218.
[CrossRef]
24. Haghi, M.; Neubert, S.; Geissler, A.; Fleischer, H.; Stoll, N.; Stoll, R.; Thurow, K. A Flexible and Pervasive IoT-Based
Healthcare Platform for Physiological and Environmental Parameters Monitoring. IEEE Internet Things J. 2020, 7, 5628–5647.
https://doi.org/10.1109/JIOT.2020.2980432. [CrossRef]
25. Tomasicchio, G.; Ceccarelli, A.; Matteis, A.D.; Spazzacampagna, L. A space-based healthcare emergency management system for
epidemics monitoring and response. In Proceedings of the 38th International Communications Satellite Systems Conference
(ICSSC 2021), Arlington, VA, USA, 27–30 September 2021; Volume 2021, pp. 195–199. https://doi.org/10.1049/icp.2022.0571.
[CrossRef]
26. Subahi, A.F. Edge-Based IoT Medical Record System: Requirements, Recommendations and Conceptual Design. IEEE Access
2019, 7, 94150–94159. https://doi.org/10.1109/ACCESS.2019.2927958. [CrossRef]
27. Gupta, R.; Shukla, A.; Mehta, P.; Bhattacharya, P.; Tanwar, S.; Tyagi, S.; Kumar, N. VAHAK: A Blockchain-based Out-
door Delivery Scheme using UAV for Healthcare 4.0 Services. In Proceedings of the IEEE INFOCOM 2020—IEEE Confer-
ence on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 255–260.
https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162738. [CrossRef]
28. Ray, P.P.; Chowhan, B.; Kumar, N.; Almogren, A. BIoTHR: Electronic Health Record Servicing Scheme in IoT-Blockchain
Ecosystem. IEEE Internet Things J. 2021, 8, 10857–10872. https://doi.org/10.1109/JIOT.2021.3050703. [CrossRef]
29. Hossain Gourob, J.; Raxit, S.; Hasan, A. A Robotic Hand: Controlled With Vision Based Hand Gesture Recognition System. In
Proceedings of the 2021 International Conference on Automation, Control and Mechatronics for Industry 4.0 (ACMI), Rajshahi,
Bangladesh, 8–9 July 2021; pp. 1–4. https://doi.org/10.1109/ACMI53878.2021.9528192. [CrossRef]
30. Subramanian, G.; Sreekantan Thampy, A. Implementation of Blockchain Consortium to Prioritize Diabetes Patients’ Healthcare
in Pandemic Situations. IEEE Access 2021, 9, 162459–162475. https://doi.org/10.1109/ACCESS.2021.3132302. [CrossRef]
31. Parra, C.M.; Gupta, M.; Dennehy, D. Likelihood of Questioning AI-Based Recommendations Due to Perceived Racial/Gender
Bias. IEEE Trans. Technol. Soc. 2022, 3, 41–45. https://doi.org/10.1109/TTS.2021.3120303. [CrossRef]
32. Elayan, H.; Aloqaily, M.; Guizani, M. Sustainability of Healthcare Data Analysis IoT-Based Systems Using Deep Federated
Learning. IEEE Internet Things J. 2022, 9, 7338–7346. https://doi.org/10.1109/JIOT.2021.3103635. [CrossRef]
33. De Moura Costa, H.J.; Da Costa, C.A.; Da Rosa Righi, R.; Antunes, R.S.; De Paz Santana, J.F.; Leithardt, V.R.Q. A
Fog and Blockchain Software Architecture for a Global Scale Vaccination Strategy. IEEE Access 2022, 10, 44290–44304.
https://doi.org/10.1109/ACCESS.2022.3169418. [CrossRef]
34. Rehman, M.U.; Shafique, A.; Ghadi, Y.Y.; Boulila, W.; Jan, S.U.; Gadekallu, T.R.; Driss, M.; Ahmad, J. A Novel Chaos-
Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis. IEEE Trans. Netw. Sci. Eng. 2022, 1–17.
https://doi.org/10.1109/TNSE.2022.3199235. [CrossRef]
35. Miranda, D.; Olivares, R.; Munoz, R.; Minonzio, J.G. Improvement of Patient Classification Using Feature Selection
Applied to Bidirectional Axial Transmission. IEEE Trans. Ultrason. Ferroelectr. Freq. Control. 2022, 69, 2663–2671.
https://doi.org/10.1109/TUFFC.2022.3195477. [CrossRef] [PubMed]
36. Alghatani, K.; Ammar, N.; Rezgui, A.; Shaban-Nejad, A. Precision Clinical Medicine Through Machine Learning: Using
High and Low Quantile Ranges of Vital Signs for Risk Stratification of ICU Patients. IEEE Access 2022, 10, 52418–52430.
https://doi.org/10.1109/ACCESS.2022.3175304. [CrossRef]
Appl. Sci. 2022, 12, 11039 29 of 32
37. Tanwar, S.; Vora, J.; Kaneriya, S.; Tyagi, S.; Kumar, N.; Sharma, V.; You, I. Human Arthritis Analysis in Fog Comput-
ing Environment Using Bayesian Network Classifier and Thread Protocol. IEEE Consum. Electron. Mag. 2020, 9, 88–94.
https://doi.org/10.1109/MCE.2019.2941456. [CrossRef]
38. Patel, V.A.; Bhattacharya, P.; Tanwar, S.; Gupta, R.; Sharma, G.; Bokoro, P.N.; Sharma, R. Adoption of Federated
Learning for Healthcare Informatics: Emerging Applications and Future Directions. IEEE Access 2022, 10, 90792–90826.
https://doi.org/10.1109/ACCESS.2022.3201876. [CrossRef]
39. Camajori Tedeschini, B.; Savazzi, S.; Stoklasa, R.; Barbieri, L.; Stathopoulos, I.; Nicoli, M.; Serio, L. Decentralized Fed-
erated Learning for Healthcare Networks: A Case Study on Tumor Segmentation. IEEE Access 2022, 10, 8693–8708.
https://doi.org/10.1109/ACCESS.2022.3141913. [CrossRef]
40. Gupta, R.; Reebadiya, D.; Tanwar, S.; Kumar, N.; Guizani, M. When Blockchain Meets Edge Intelligence: Trusted and Security
Solutions for Consumers. IEEE Netw. 2021, 35, 272–278. https://doi.org/10.1109/MNET.001.2000735. [CrossRef]
41. Kumari, A.; Gupta, R.; Tanwar, S.; Tyagi, S.; Kumar, N. When Blockchain Meets Smart Grid: Secure Energy Trading in Demand
Response Management. IEEE Netw. 2020, 34, 299–305. https://doi.org/10.1109/MNET.001.1900660. [CrossRef]
42. Wu, G.; Wang, S.; Ning, Z.; Zhu, B. Privacy-Preserved Electronic Medical Record Exchanging and Sharing: A Blockchain-Based
Smart Healthcare System. IEEE J. Biomed. Health Inform. 2022, 26, 1917–1927. https://doi.org/10.1109/JBHI.2021.3123643.
[CrossRef] [PubMed]
43. Kumari, A.; Gupta, R.; Tanwar, S.; Kumar, N. A Taxonomy of Blockchain-enabled Softwarization for Secure UAV Network.
Comput. Commun. 2020, 161, 304–323. https://doi.org/10.1016/j.comcom.2020.07.042. [CrossRef]
44. Prasad, V.K.; Bhavsar, M.D.; Tanwar, S. Influence of montoring: Fog and edge computing. Scalable Comput. Pract. Exp. 2019,
20, 365–376. [CrossRef]
45. Xu, B.; Zhou, F. The Roles of Cloud-Based Systems on the Cancer-Related Studies: A Systematic Literature Review. IEEE Access
2022, 10, 64126–64145. https://doi.org/10.1109/ACCESS.2022.3181147. [CrossRef]
46. Wang, K.; Shao, Y.; Xie, L.; Wu, J.; Guo, S. Adaptive and Fault-Tolerant Data Processing in Healthcare IoT Based on Fog
Computing. IEEE Trans. Netw. Sci. Eng. 2020, 7, 263–273. https://doi.org/10.1109/TNSE.2018.2859307. [CrossRef]
47. Isa, I.S.B.M.; El-Gorashi, T.E.H.; Musa, M.O.I.; Elmirghani, J.M.H. Energy Efficient Fog-Based Healthcare Monitoring Infrastruc-
ture. IEEE Access 2020, 8, 197828–197852. https://doi.org/10.1109/ACCESS.2020.3033555. [CrossRef]
48. Hassan, K.M.; Abdo, A.; Yakoub, A. Enhancement of Health Care Services Based on Cloud Computing in IOT Environment Using
Hybrid Swarm Intelligence. IEEE Access 2022, 10, 105877–105886. https://doi.org/10.1109/ACCESS.2022.3211512. [CrossRef]
49. Itoo, S.; Khan, A.A.; Kumar, V.; Alkhayyat, A.; Ahmad, M.; Srinivas, J. CKMIB: Construction of Key Agreement Protocol for Cloud
Medical Infrastructure Using Blockchain. IEEE Access 2022, 10, 67787–67801. https://doi.org/10.1109/ACCESS.2022.3185016.
[CrossRef]
50. Ansari, A.A.; Mishra, B.; Gera, P.; Khan, M.K.; Chakraborty, C.; Mishra, D. Privacy-Enabling Framework for Cloud-Assisted
Digital Healthcare Industry. IEEE Trans. Ind. Inform. 2022, 18, 8316–8325. https://doi.org/10.1109/TII.2022.3170148. [CrossRef]
51. Tanwar, S.; Kumar, N.; Niu, J.W. EEMHR: Energy-efficient multilevel heterogeneous routing protocol for wireless sensor networks.
Int. J. Commun. Syst. 2014, 27, 1289–1318. https://doi.org/10.1002/dac.2780. [CrossRef]
52. Rabbani, R.; Najafiaghdam, H.; Ghanbari, M.M.; Papageorgiou, E.P.; Zhao, B.; Roschelle, M.; Stojanovic, V.; Muller, R.; Anwar,
M. Towards an Implantable Fluorescence Image Sensor for Real-Time Monitoring of Immune Response in Cancer Therapy. In
Proceedings of the 2021 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC),
Guadalajara, Mexico, 31 October–4 November 2021; pp. 7399–7403.
53. Mansour, R.F.; Amraoui, A.E.; Nouaouri, I.; Díaz, V.G.; Gupta, D.; Kumar, S. Artificial Intelligence and Internet of Things Enabled Disease
Diagnosis Model for Smart Healthcare Systems. IEEE Access 2021, 9, 45137–45146. https://doi.org/10.1109/ACCESS.2021.3066365.
[CrossRef]
54. Mohsan, S.A.H.; Zahra, Q.U.A.; Khan, M.A.; Alsharif, M.H.; Elhaty, I.A.; Jahid, A. Role of Drone Technology Helping in
Alleviating the COVID-19 Pandemic. Micromachines 2022, 13, 1593. [CrossRef] [PubMed]
55. Ananthi, J.V.; Jose, P.S.H. Implementation of IoT and UAV Based WBAN for healthcare applications. In Proceedings of the 2021
Third International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 2–4 September
2021; pp. 37–42. https://doi.org/10.1109/ICIRCA51532.2021.9545052. [CrossRef]
56. Chaudhary, S.; Kakkar, R.; Jadav, N.K.; Nair, A.; Gupta, R.; Tanwar, S.; Agrawal, S.; Alshehri, M.D.; Sharma, R.; Sharma, G.; et al.
A Taxonomy on Smart Healthcare Technologies: Security Framework, Case Study, and Future Directions. J. Sens. 2022, 2022,
1863838. [CrossRef]
57. Boston Children’s Hospital Ddos Attacker Convicted. Bank Information Security. Available online: https://www.
bankinfosecurity.com/boston-childrens-hospital-ddos-attacker-convicted-a-11279 (accessed on 14 September 2022).
58. CISA Warns of Possible DDoS Risk in Contec Patient Monitor Medical Devices. Available online: https://www.scmagazine.
com/analysis/device-security/cisa-warns-of-possible-ddos-risk-in-contec-patient-monitor-medical-devices (accessed on 2
September 2022).
59. Joshitta, R.S.M.; Arockiam, L. Device authentication mechanism for IoT enabled healthcare system. In Proceedings of the 2017
International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET),
Chennai, India, 16–18 February 2017; pp. 1–6. https://doi.org/10.1109/ICAMMAET.2017.8186646. [CrossRef]
Appl. Sci. 2022, 12, 11039 30 of 32
84. Almashhadani, A.O.; Kaiiali, M.; Sezer, S.; O’Kane, P. A Multi-Classifier Network-Based Crypto Ransomware Detection System: A
Case Study of Locky Ransomware. IEEE Access 2019, 7, 47053–47067. https://doi.org/10.1109/ACCESS.2019.2907485. [CrossRef]
85. Javed Butt, U.; Abbod, M.; Lors, A.; Jahankhani, H.; Jamal, A.; Kumar, A. Ransomware Threat and its Impact on SCADA. In
Proceedings of the 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London, UK,
16–18 January 2019; pp. 205–212. https://doi.org/10.1109/ICGS3.2019.8688327. [CrossRef]
86. Wazid, M.; Das, A.K.; Shetty, S. BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart
Healthcare. IEEE Trans. Consum. Electron. 2022, 7, 1. https://doi.org/10.1109/TCE.2022.3208795. [CrossRef]
87. What Is Endpoint Detection and Response (EDR)? Available online: https://www.trellix.com/en-us/security-awareness/
endpoint/what-is-endpoint-detection-and-response.html (accessed on 20 August 2019).
88. What Is Reputation Analysis? Available online: https://vaultinfosec.com/service/next-gen-solutions/reputation-analysis
(accessed on 15 September 2022).
89. Top Vulnerability Management Tools for 2022. Available online: https://www.esecurityplanet.com/products/vulnerability-
management-software/ (accessed on 17 March 2019).
90. OWASP Firmware Security Testing Methodology. Available online: https://scriptingxss.gitbook.io/firmware-security-testing-
methodology/ (accessed on 23 September 2019).
91. Minocha, S.; Singh, B. A novel phishing detection system using binary modified equilibrium optimizer for feature selection.
Comput. Electr. Eng. 2022, 98, 107689. https://doi.org/10.1016/j.compeleceng.2022.107689. [CrossRef]
92. Alshehri, M.; Abugabah, A.; Algarni, A.; Almotairi, S. Character-level word encoding deep learning model for combating cyber
threats in phishing URL detection. Comput. Electr. Eng. 2022, 100, 107868. https://doi.org/10.1016/j.compeleceng.2022.107868.
[CrossRef]
93. Rameem Zahra, S.; Ahsan Chishti, M.; Iqbal Baba, A.; Wu, F. Detecting Covid-19 chaos driven phishing/malicious URL attacks by a
fuzzy logic and data mining based intelligence system. Egypt. Inform. J. 2022, 23, 197–214. https://doi.org/10.1016/j.eij.2021.12.003.
[CrossRef]
94. Le, T.V.; Lu, C.F.; Hsu, C.L.; Do, T.K.; Chou, Y.F.; Wei, W.C. A Novel Three-Factor Authentication Protocol for Multiple Service Providers
in 6G-Aided Intelligent Healthcare Systems. IEEE Access 2022, 10, 28975–28990. https://doi.org/10.1109/ACCESS.2022.3158756.
[CrossRef]
95. Alladi, T.; Chamola, V.; Naren. HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks. IEEE J.
Sel. Areas Commun. 2021, 39, 361–369. https://doi.org/10.1109/JSAC.2020.3020605. [CrossRef]
96. Yin, J.; Li, M.; Wu, W.; Sun, D.; Zhou, J.; Huo, W.; Xue, J. Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware
with Protocol-Centric Static Analysis. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco,
CA, USA, 22–26 May 2022; pp. 1623–1637. https://doi.org/10.1109/SP46214.2022.9833723. [CrossRef]
97. Gong, S.; Ochiai, H.; Esaki, H. Scan-Based Self Anomaly Detection: Client-Side Mitigation of Channel-Based Man-in-the-Middle
Attacks Against Wi-Fi. In Proceedings of the 2020 IEEE 44th Annual Computers, Software, and Applications Conference
(COMPSAC), Madrid, Spain, 13–17 July 2020; pp. 1498–1503. https://doi.org/10.1109/COMPSAC48688.2020.00-43. [CrossRef]
98. Salem, O.; Alsubhi, K.; Shaafi, A.; Gheryani, M.; Mehaoua, A.; Boutaba, R. Man-in-the-Middle Attack Mitigation in Internet of
Medical Things. IEEE Trans. Ind. Inform. 2022, 18, 2053–2062. https://doi.org/10.1109/TII.2021.3089462. [CrossRef]
99. Zia, M.; Obaidat, M.S.; Mahmood, K.; Shamshad, S.; Saleem, M.A.; Chaudhry, S.A. A Provably Secure Lightweight
Key Agreement Protocol for Wireless Body Area Networks in Healthcare System. IEEE Trans. Ind. Inform. 2022, 1–8.
https://doi.org/10.1109/TII.2022.3202968. [CrossRef]
100. Letafati, M.; Behroozi, H.; Khalaj, B.H.; Jorswieck, E.A. Content-Based Medical Image Transmission Against Randomly-
Distributed Passive Eavesdroppers. In Proceedings of the 2021 IEEE International Conference on Communications Workshops
(ICC Workshops), Montreal, QC, Canada, 14–23 June 2021; pp. 1–7. https://doi.org/10.1109/ICCWorkshops50388.2021.9473492.
[CrossRef]
101. Awan, M.; Kansanen, K. Estimating Eavesdropping Risk for Next Generation Implants: Technology, Communications
and Computing. In Advances in Body Area Networks I; Springer: Berlin/Heidelberger, Germany, 2019; pp. 387–398.
https://doi.org/10.1007/978-3-030-02819-0_29. [CrossRef]
102. Alkeem, E.A.; Shehada, D.; Yeun, C.Y.; Zemerly, M.J.; Hu, J. New secure healthcare system using cloud of things. Clust. Comput.
2017, 20, 2211–2229. [CrossRef]
103. Rughoobur, P.; Nagowah, L. A lightweight replay attack detection framework for battery depended IoT devices de-
signed for healthcare. In Proceedings of the 2017 International Conference on Infocom Technologies and Unmanned
Systems (Trends and Future Directions) (ICTUS), Dubai, United Arab Emirates, 18–20 December 2017; pp. 811–817.
https://doi.org/10.1109/ICTUS.2017.8286118. [CrossRef]
104. Chaudhary, R.R.K.; Chatterjee, K. A lightweight security framework for electronic healthcare system. Int. J. Inf. Technol. 2022, 14,
3109–3121 [CrossRef]
105. Masmoudi, S.; Kaaniche, N.; Laurent, M. SPOT: Secure and Privacy-preserving prOximiTy protocol for e-healthcare systems.
IEEE Access 2022, 10, 106400–106414 https://doi.org/10.1109/ACCESS.2022.3208697. [CrossRef]
106. Verma, C.; Stoffová, V.; Illés, Z.; Tanwar, S.; Kumar, N. Machine Learning-Based Student’s Native Place Identification for
Real-Time. IEEE Dataport 2020, 8, 130840–130854. https://doi.org/10.1109/ACCESS.2020.3008830. [CrossRef]
Appl. Sci. 2022, 12, 11039 32 of 32
107. Hussain, F.; Abbas, S.G.; Shah, G.A.; Pires, I.M.; Fayyaz, U.U.; Shahzad, F.; Garcia, N.M.; Zdravevski, E. IoT Healthcare Security
Dataset. IEEE Dataport 2021. https://doi.org/10.21227/9w13-2t13. [CrossRef]
108. Reebadiya, D.; Rathod, T.; Gupta, R.; Tanwar, S.; Kumar, N. Blockchain-based Secure and Intelligent Sensing for Autonomous
Vehicles Activity Tracking Beyond 5G Networks. Peer-Peer Netw. Appl. 2021, 14, 2757–2774 https://doi.org/10.1007/s12083-021-
01073-x. [CrossRef]
109. Gupta, R.; Tanwar, S.; Kumar, N. Blockchain and 5G Integrated Softwarized UAV Network Management: Architecture, Solutions,
and Challenges. Phys. Commun. 2021, 47, 101–355 https://doi.org/10.1016/j.phycom.2021.101355. [CrossRef]
110. Ahad, A.; Tahir, M.; Yau, K.L.A. 5G-Based Smart Healthcare Network: Architecture, Taxonomy, Challenges and Future Research
Directions. IEEE Access 2019, 7, 100747–100762. https://doi.org/10.1109/ACCESS.2019.2930628. [CrossRef]
111. Navaz, A.N.; Serhani, M.A.; El Kassabi, H.T.; Al-Qirim, N.; Ismail, H. Trends, Technologies, and Key Challenges in Smart and
Connected Healthcare. IEEE Access 2021, 9, 74044–74067. https://doi.org/10.1109/ACCESS.2021.3079217. [CrossRef]
112. Wu, L.; Du, X.; Guizani, M.; Mohamed, A. Access Control Schemes for Implantable Medical Devices: A Survey. IEEE Internet
Things J. 2017, 4, 1272–1283. https://doi.org/10.1109/JIOT.2017.2708042. [CrossRef]
113. Dofe, J.; Nguyen, A.; Nguyen, A. Unified Countermeasures against Physical Attacks in Internet of Things—A survey. In
Proceedings of the 2021 IEEE International Symposium on Smart Electronic Systems (iSES), Jaipur, India, 18–22 December 2021;
pp. 194–199. https://doi.org/10.1109/iSES52644.2021.00053. [CrossRef]
114. Chengoden, R.; Victor, N.; Huynh-The, T.; Yenduri, G.; Jhaveri, R.H.; Alazab, M.; Bhattacharya, S.; Hegde, P.; Maddikunta, P.K.R.;
Gadekallu, T.R. Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions. arXiv 2022,
arXiv:2209.04160.
115. Algarni, A. A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems. IEEE Access 2019,
7, 101879–101894. https://doi.org/10.1109/ACCESS.2019.2930962. [CrossRef]