4 - Machine Learning For Healthcare-IoT Security A Review and Risk Mitigation
4 - Machine Learning For Healthcare-IoT Security A Review and Risk Mitigation
Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, Lubna Luxmi Dhirani
Publication date
22-12-2023
Published in
Licence
This work is made available under the CC BY-NC-SA 4.0 licence and should only be used in accordance with
that licence. For more information on the specific terms, consult the repository record for this item.
Document Version
1
Akhi Khatun, M., Farheen Memon, S., Eising, C.and Luxmi Dhirani, L. (2023) ‘Machine learning for
healthcare-IoT security: a review and risk mitigation’, available: https://doi.org/10.34961/researchrepository-
ul.24972507.v1.
This work was downloaded from the University of Limerick research repository.
For more information on this work, the University of Limerick research repository or to report an issue, you can
contact the repository administrators at [email protected]. If you feel that this work breaches copyright, please provide
details and we will remove access to the work immediately while we investigate your claim.
Received 17 November 2023, accepted 11 December 2023, date of publication 22 December 2023,
date of current version 29 December 2023.
Digital Object Identifier 10.1109/ACCESS.2023.3346320
ABSTRACT The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-
driven infrastructure that highly relies on smart sensing devices (i.e., blood pressure monitors, temperature
sensors, etc.) for faster response time, treatments, and diagnosis. However, with the evolving cyber threat
landscape, IoT devices have become more vulnerable to the broader risk surface (e.g., risks associated with
generative AI, 5G-IoT, etc.), which, if exploited, may lead to data breaches, unauthorized access, and lack
of command and control and potential harm. This paper reviews the fundamentals of healthcare IoT, its
privacy, and data security challenges associated with machine learning and H-IoT devices. The paper further
emphasizes the importance of monitoring healthcare IoT layers such as perception, network, cloud, and
application. Detecting and responding to anomalies involves various cyber-attacks and protocols such as
Wi-Fi 6, Narrowband Internet of Things (NB-IoT), Bluetooth, ZigBee, LoRa, and 5G New Radio (5G NR).
A robust authentication mechanism based on machine learning and deep learning techniques is required to
protect and mitigate H-IoT devices from increasing cybersecurity vulnerabilities. Hence, in this review paper,
security and privacy challenges and risk mitigation strategies for building resilience in H-IoT are explored
and reported.
INDEX TERMS Healthcare-IoT, generative AI, 5G-IoT, security and privacy challenges, cybersecurity,
attacks, anomaly detection, machine learning, deep learning, mitigation techniques, 5G NR.
by integrating IoT body sensors, such as brain waves, body In contrast to static patient monitoring systems, dynamic
temperature, and blood pressure sensors, as depicted in patient monitoring systems can be used at home, work,
Figure 1. Moreover, the diagram also illustrates how data or in the hospital. According to Figure 1, healthcare systems
is stored and transmitted to the cloud via edge nodes/layers consist of identifying, locating, sensing, and connecting.
for data processing and storage. IoT devices transmit data in H-IoT components include emergency medical services,
milliseconds and require high reliability, scalability, and end- information technology, sensors, lab-on-a-chip technologies,
to-end (E2E) latency connectivity networks [1]. Connecting wearable devices, connectivity devices, big data, and cloud
the IoT devices with an edge-to-cloud environment is computing [21].
essential to facilitate the required/comprehensive health Nowadays, smartphones enable rapid task completion
monitoring (security and reliability metrics). by monitoring and collecting regular updates on patients’
As per [11], the need and usage of IoT devices will healthcare data [22]. For instance, an individual can promptly
increase significantly; by 2025, there will be more than receive notifications when their heart rhythm changes when
41 billion IoT devices used worldwide, with the capacity they wear a wristband linked to their smartphone [23].
to produce 78 zettabytes of data. Because of its usability, Furthermore, IoT allows the healthcare system to monitor and
efficiency, and applications, these devices have the potential track community resources more efficiently and reliably [24].
to further advance healthcare by reducing costs, improving However, H-IoT has several risks, including privacy leakage
patient well-being, and facilitating the efficient delivery of during medical data uploading [25]. The risk of patient
faster diagnostics, thereby improving medical services [12]. data disclosure may considerably discourage patients from
Furthermore, IoT can provide the migration of patients sharing their medical information because confidentiality is
from traditional healthcare management methods to new at risk [26]. Maintaining confidentiality and credibility in
cloud-based systems, among other vital innovations [13]. healthcare interactions are fundamental factors for addressing
Employing Healthcare-IoT (H-IoT), remote monitoring of these risks. Moreover, resolving such security concerns will
patients can save millions of lives and money, while facilitate seamless deployment and adoption of H-IoT.
other functions still have a crucial role across healthcare Over the years, several review papers have been published
environments [14]. This type of remote monitoring of patients on the secure H-IoT [27], [28], [29], [30], [31], [32], [33],
can assist in identifying health issues early on and making [34], [35], [36], [37], [38]. There is, however, a noticeable gap
treatment plans more personalized. Similarly, IoT can benefit in the existing review regarding the security of H-IoT, often
medical management, including medication and instrumental failing to address all necessary aspects holistically. Most of
errors, and medication administration-allowing patients to the discussions focus heavily on the technical aspects of H-
take their medications at the right time and with the correct IoT devices, diving deep into their specs and applications
dosage [15]. Medication error prevention programs can and skipping over the essential issue of data security.
improve patient outcomes and reduce healthcare costs. For During the discussion of machine learning, the focus is on
example, H-IoT could significantly improve health outcomes its potential application in healthcare instead of exploring
and healthcare costs for residents of care homes who how it can enhance security protocols, such as detecting
frequently manage multiple medical conditions and take unusual data patterns that may indicate a cybersecurity
various medications [16]. threat. Security issues related to remote patient monitoring
IoT healthcare frameworks utilize a variety of sophisti- in H-IoT have not been discussed in existing reviews either.
cated sensors, including diagnostic, sensitive, and preventive In [39], the authors analyze the Internet of Medical Things
sensors, for the implementation of healthcare systems [17]. (IoMT) security controls in a sustainable context but do
Over the past few years, healthcare researchers have primarily not address specific issues like remote patient monitoring
focused on finding ways to monitor patients remotely or the use of AI in IoMT security. In [40], IoT and AI are
and transmit health reports in real-time to physicians. explored, and a smart pill bottle case study is presented;
Researchers have identified several major challenges related however, detailed comparisons of these technologies appear
to health surveillance systems. The challenges include data lacking, and alternative cybersecurity strategies may not
privacy, interoperability issues, data quality issues, and be fully considered. In [41], the authors reviewed the
limitations associated with real-time analysis [18], [19]. wireless body area network-based IoT healthcare systems
Patient monitoring concerns can be classified into two but did not provide a detailed exploration of real-world
categories: static and dynamic monitoring. Smart hospitals implementations and case studies. Furthermore, although
use static monitoring systems to record patients’ health the discussion acknowledges security and privacy concerns,
status periodically. Moreover, as a static monitoring system, it does not provide in-depth solutions or strategies to address
medical staff, including doctors and nurses, manually collect identified challenges within IoT healthcare systems. In [42],
patients’ vital signs during specific periods. The frequency of a review of the Internet of Healthcare Things (IoHT),
manual data collection within hospitals varies based on fac- covers its technologies, applications, and inherent challenges,
tors such as physicians’ workload, working hours, patients’ particularly security and privacy concerns. Though it explores
health conditions, and hospital leadership guidance [20]. many issues, notably privacy and security, it modestly
limits its explanations to practical solutions. In [43], the This paper aims to review current research on AI and
authors discuss the development of fifth-generation (5G) ML techniques that can enhance H-IoT security, build cyber
technology within the H-IoT space, including network resilience within the healthcare infrastructure, and enable
slicing, security, and energy efficiency. Despite this, certain it to detect, protect, and respond to novel cyber threats.
topics remain unresolved and require more exploration and The paper also covers a broad spectrum of cybersecurity
innovation. These include data security, efficient resource issues from the European Union Agency for Cybersecurity
management, and energy conservation. Healthcare services (ENISA) 2030 cyber threat landscape foresight [46] per-
use large amounts of energy for heating, ventilation, and air spective, including complexities associated with IoT layers.
conditioning (HVAC) [44]. HVAC systems can adjust their Furthermore, this review outlines promising avenues for
settings in real time using IoT sensors. future research and highlights the advancements in the field.
In H-IoT research, secure data access presents a pivotal The paper highlights the following key contributions:
challenge, particularly regarding healthcare data regulations • Reviews key aspects of cybersecurity, big data, e-health,
and strict policies that protect patient identity/confidentiality. and cloud computing in H-IoT.
Looking at the various ransomware attacks and data • Discusses machine learning techniques such as anomaly
breaches [45] that healthcare sectors have suffered in the detection, device classification, and critical use cases
past, affecting millions of patients globally, demonstrates for security enhancement such as intrusion detection,
the urgency and need to mitigate these growing cyber authentication, and access control.
risks. The COOJA simulator has reshaped This complex • Highlights the challenges and potential solutions related
research area, allowing researchers to emulate H-IoT device to H-IoT security, along with future research directions.
behaviors without interacting directly with sensitive data. Figure 2 presents the structure of this survey paper as
Data collection from H-IoT devices was not discussed follows: section II explains 26 different types of cyber
in previous surveys. In addition, there was a limitation attacks carried out across the four main layers of the
on how malicious data could be collected for anomaly H-IoT architecture, section III describes the interaction
detection by ML. This paper reviews the security aspects of between emerging technologies, such as machine learning
H-IoT applications, pinpoints vulnerabilities, and uses ML to and cloud computing, e-Health system and also discusses
suggest solutions, providing an enhanced understanding of the risks associated to Healthcare-IoT, section IV emphasizes
the security issues associated with H-IoT that incorporates risk mitigation strategies, reviews the evolution of cyber-
both practical and theoretical considerations. In addition to security challenges in healthcare over the last five years,
highlighting the mitigation of H-IoT security challenges, this and provides a comparative analysis of H-IoT attack data-
review also illustrates the use of COOJA simulator tools, sets, section V explores specific H-IoT layers, including
which allows a unique perspective to be gained that makes data collection, applications with an emphasis on routing
this survey distinctive from those previously conducted. attacks, and network layers, as well as COOJA simulator,
section VI focuses on feature extraction, intrusion and event layer, (II) the network layer, (III) the cloud or processing
detection, system reliability, and machine learning techniques layer, and (IV) the application layer [47]. Cybersecurity
to enhance cybersecurity, and convolutional neural network threats and attacks emerge at these layers, causing significant
in the H-IoT, section VII consists of solutions designed for challenges (i.e., routing attacks, impersonating, tampering,
future H-IoT environments, including anomaly detection, or data transit attacks at the perception layer, denial of service
security, and privacy, section VIII outlines the future of and distributed denial of service (DoS/DDoS) or man-in-the-
H-IoT technologies, software defined networks, challenges, middle (MITM) attacks at the network layer, Cloud-malware
and mitigation strategies and finally, section IX concludes the injection or Brute-force attacks at the Cloud-IoT Layer and
paper, exploring future directions in H-IoT security. SQL injection or Cross-Site Scripting (XSS) attacks at the
application layer) [48], [49], [50], [51], [52], [53], [54]. This
II. CYBERSECURITY THREATS AND ATTACKS IN section discusses 26 different cyberattacks and demonstrates
HEALTHCARE-IoT their specific mechanisms and impact on the infrastructure.
Healthcare Internet of Things (H-IoT) requires a thorough Figure 3 illustrates the details of healthcare IoT layers. It also
understanding of the technical architecture, typically catego- provides a detailed explanation and insights into the most
rized into four layers. These layers include (I) the perception prevalent threats and attacks at different H-IoT layers.
session identifiers, or other confidential information. expenditures. Cloud computing, however, provides com-
In addition, the attacker can control the device directly, puting power and storage resources for H-IoT to support
sending users to malicious websites or causing direct machine learning based on big data collected from IoT
damage to the device. devices [150]. ML algorithms utilize the cloud to process and
• Unauthorised Scripts Attacks: These attacks occur analyze data and provide a secure and scalable computing
when unwanted or malicious scripts are executed environment [151].
without the user’s consent. In contrast to XSS attacks, Desai et al. [152] developed a Health-Cloud platform
which target the user’s browser, unauthorized scripts using machine learning and cloud computing to track
can run anywhere in the system or application. Data patients suffering from heart-related diseases. Moreover, the
breaches, system malfunctions, or other vulnerabilities researchers built a live data analysis iOS App using Google
may result from this [142]. Cloud Firebase.
• Code Injection Attacks: Code injection attacks that Abdelaziz et al. [153] investigate the use of IoT and
use SQL injection break the data-code isolation rule by cloud computing in healthcare to predict chronic kidney
inserting malicious SQL codes into input fields [50]. illness in a city of the future. IoT devices transmit chronic
Attackers can embed these malicious SQL commands kidney disease (CKD) data to cloud storage, improving
in web forms, URLs, or page requests. Without proper prediction accuracy. The hybrid model, which combines
filters, a web application may process these harmful linear regression and neural networks, predicts CKD with
commands incorrectly. As a result, unwanted access to 97.8% accuracy. Cloud IoT offers tremendous potential
the database can occur [143]. in healthcare services, benefiting patients and smart city
stakeholders.
III. EMERGING TECHNOLOGY AND SECURITY IN H-IoT
Technological advancements, including the IoT, machine B. ELECTRONIC-HEALTH (E-HEALTH) SYSTEMS
learning, and cloud computing, are gradually reshaping The exchange of health records between doctors and patients
healthcare. This development creates innovative healthcare is now conducted largely electronically, using technology to
solutions but also challenges, particularly when it comes transfer patient data efficiently and facilitate communications
to data security. AI and machine learning have made between doctors and their patients. As illustrated in Figure 8,
great progress in cyber security domains such as intrusion e-health application systems can solve several problems asso-
detection and malware mitigation [144]. This section explores ciated with traditional healthcare systems, including online
the conjunction of machine learning and cloud technolo- appointments, medical evidence, information technology,
gies, investigating emerging trends and attendant security communication, e-prescribing, medical history, reminders,
considerations within e-health applications to establish a payment management, and lab analysis. e-healthcare services
secure and innovative framework for H-IoT implementations. can enhance patient data and health information manage-
This section further explores the connections between ment [154]. As a result, patients can access their medical
machine learning and cloud technologies within e-health, records online, receive remote consultations, and use mobile
navigating through emerging trends and assessing related health applications to manage their health, which increases
security concerns. Deep learning (DL) and machine learning accessibility and empowers patients.
are increasingly integral to mitigating cyber threats; how- Maksimović and Vujović [155] describe the gradual
ever, how these technologies impact e-health is a crucial adoption of e-health platforms primarily due to infrastructure
issue [145]. This section aims to provide a secure and and political restrictions. Despite these challenges, e-health
innovative foundation for H-IoT implementations. and IoT convergence is progressing. However, there are
hurdles like consistency, security, and interoperability in
A. MACHINE LEARNING WITH CLOUD COMPUTING IoT integration. Privacy concerns and regulations further
complicate the adoption of large-scale technologies. The
Researchers all over the world have applied machine learning
paper highlights the influence of IoT in e-health and outlines
to a variety of applications and domains [146]. Recently,
these crucial challenges, emphasizing the importance of
ML has drawn the attention of H-IoT researchers [147].
overcoming barriers to implementation. Zhang et al. [156]
In the context of H-IoT, machine learning is beneficial for
explore how 5G technology can revolutionize e-health. While
remote monitoring and real-time treatment of diseases [19],
5G promises reliable access to e-health, current efforts
[148]. ML algorithms such as Support Vector Machines
are insufficient. This paper also discusses technological
(SVMs), decision trees, random forests, and Artificial Neural
aspects, practical use cases, research trends, and challenges
Networks (ANNs) can analyze huge volumes of medical
in advancing 5G e-health.
data collected by healthcare-related smart devices, including
vital signs and medical histories [149]. In this process,
ML techniques are applied to analyze massive datasets to C. BIG DATA IN HEALTHCARE-IoT
find patterns and generate insights that may assist clinical IoT networks generate enormous amounts of data at
decisions, improve patient outcomes, and reduce healthcare every moment. Therefore, manipulating so many datasets
Insurance Portability and Accountability Act (HIPAA) [86], example, electronic health records (EHRs) for patient data,
[202] while processing United States healthcare data. This remote consultation platforms, real-time monitoring systems,
layer presents unique challenges and complexities. For medical resources, medical care, and diagnosis personnel.
Moreover, the medical application layer processes organizes, using machine learning and deep learning while considering
and maintains medical records. This layer ensures that device limitations.
patients’ data is authentic, secure, private, and reliable According to [217], especially in e-health applications,
when transmitted over the communication system [203]. protecting sensitive patient data from routing attacks and
Numerous application layer protocols exist, including Mes- security threats is pivotal in 5G-IoT. Cloud-based e-health
sage Queuing Telemetry Transport (MQTT), Hypertext data is at risk of various cyber-threats (i.e., ransomware,
Transfer Protocol (HTPP), WebSockets, RESTful, Secure- loss of privacy, and digital identity fraud) and attacks
MQTT, and Constrained Application Protocol (CoAP) [204]. mentioned in section II. CNN-DMA is a deep learning model
Choosing the appropriate protocol for H-IoT depends on its that detects malware attacks using a Convolutions Neural
application [205]. Network (CNN). The e-health apps enabled with 5G-IoT
and deep learning models such as CNN-DMA are useful
for ensuring data safety and system security against cyber-
C. ROUTING ATTACK AND NETWORK LAYER attacks. The deep learning models can be trained directly
The network layer defines paths for the routing of data from original data, such as images and text [218]. Therefore,
over the network. It has been demonstrated that low-power raw data does not need to be preprocessed before being used
wireless networks with multiple hops are susceptible to for training. Moreover, deep learning algorithms enable the
a wide range of attacks, with routing attacks emerging seamless execution of security protocols without consuming
as one of the most significant threats in the H-IoT envi- significant computing resources, which is one of the major
ronment [206]. There are many routing attacks, including benefits of 5G cybersecurity [219].
selective forwarding attacks and replay attacks [207]. In the In light of the delicate nature of healthcare data, enhancing
selective forwarding attack, control packets are deliberately security within H-IoT’s network layers is imperative. The
forwarded within the Routing Protocol for Low-Power and examples show that leveraging machine learning and deep
Lossy Networks (RPL) while data packets are dropped. learning can neutralize and mitigate these risks. Following
In conjunction with sinkhole attacks, this strategy can disrupt this sub-section, the discussion will focus on the COOJA
established routing paths and lead to severe consequences simulator, a useful tool for studying and understanding these
for the network [208]. A replay attack entails capturing and attacks in a simulated IoT environment to help develop secure
re-transmitting packets captured from nearby nodes by an network protocols.
unauthorized node or attacker [209]. The purpose of these
attacks is to manipulate or obstruct the transmission of
data packets to impair the integrity of the network [210]. D. COOJA SIMULATOR
Furthermore, rank and wormhole attacks are susceptible to The COOJA simulator runs on Contiki OS, a portable
IoT routing protocols due to their lightweight nature and operating system with limited resources designed specifically
limited computational resources. Using these attacks, IoT for devices such as sensor nodes [220]. It is built upon an
infrastructures can be devastated by attacks targeting control event-driven kernel while also supporting multi-threading.
messages and resources [211]. It supports a complete TCP/IP stack through IP and
Routing and network layers receive data sent by medical programming protothreads. Simulating sensor nodes based
data collection layers. These layers use protocols such as Wi- on their real characteristics is the main advantage of the
Fi 6, Narrowband Internet of Things (NB-IoT), Bluetooth, COOJA simulator. The process executes program code from
IPv6 Over Low-Power Wireless Personal Area Networks ContikiOS and TinyOS using Java Native Interface (JNI).
(6LoWPAN), RPL, WiMAX, ZigBee, Sigfox, LoRa, and 5G A Java Virtual Machine and C programming (a programming
NR (New Radio) to transmit data to the medical application language commonly used in firmware sensor nodes) are
layer [212], [213], [214]. This setup requires the analysis interconnected by the JNI. As a result, COOJA can provide
of routing attacks, potentially compromising confidentiality accurate simulations of sensor nodes or devices across
and accessibility of medical data. To ensure reliable and multiple platforms, including H-IoT, closely replicating real-
secure data transmission, protocol configurations designed world functionality. Moreover, it is crucial to note that the
for power-efficient and unstable networks should be carefully primary objectives of COOJA are extensibility and plug-
reviewed for vulnerability to various routing attacks [215]. in support. In contrast to the interface, the plug-in allows
Following the discussion of routing attacks and network users to interact with the simulator. Plug-ins, for example,
layers, this section explores the use of machine learning to enable users to control simulation speeds or observe network
detect such cyber attacks in H-IoT environments. traffic between nodes [221]. COOJA also has several inherent
As highlighted by [216], H-IoT networks are vulnerable tools, including the ‘‘radio logger,’’ which records all packets
to routing attacks, such as sinkholes and wormholes. The dispatched by nodes in the simulation and associates them
authors have introduced various ways to detect such attacks. with a universal timestamp [30]. As a versatile simulation
As a result of the limited resources of devices used in H-IoT, tool, COOJA allows for research across diverse environments
intrusion detection systems cannot be used. The proposed by generating and collecting data to thoroughly assess
method efficiently detected and handled network attacks wireless sensor networks and body area networks (WBANs)
IX. CONCLUSION
C. SOFTWARE-DEFINED NETWORK (SDN) IN This paper systematically dives into digital healthcare’s
HEALTHCARE-IOT fundamental elements and practical applications. It discusses
An emerging paradigm in computer networking is software- the essential technologies and methodologies for optimizing
defined networking. Data planes, control planes, and appli- these systems within Healthcare 5.0. The research focuses
cation planes are the three tiers of SDN. Data and control on various cyber threats, vulnerabilities, and cyber attacks
planes are separated to improve network performance. carried out at the different IoT layers and explores the
In contrast, traditional architectures combine data and control security and privacy of H-IoT through deep neural networks
planes onto one device, while SDN separates them to and AI. A demonstration of a cloud-based solution and
simplify network management [273], [274]. SDNs forward big data analytics using IoT and software-defined networks
packets according to predefined policies [275]. SDN-based is provided. This illustrates the advantages of a precise,
H-IoT consists of Sensor Controllers, Cloud Controllers, efficient, and secure healthcare ecosystem. The authors also
Network Controllers, and Closed-Loop Controllers, which present insights on the security challenges related to wireless
provide four types of services: data acquisition, network and communication technologies (i.e., 5G) in H-IoT and how
ML algorithms can enable the digital healthcare environment [22] A. A. Al-Atawi, F. Khan, and C. G. Kim, ‘‘Application and challenges of
to bridge those security gaps. IoT healthcare system in COVID-19,’’ Sensors, vol. 22, no. 19, p. 7304,
Sep. 2022.
[23] J. Mao, P. Zhou, X. Wang, H. Yao, L. Liang, Y. Zhao, J. Zhang, D. Ban,
REFERENCES and H. Zheng, ‘‘A health monitoring system based on flexible triboelectric
[1] L. L. Dhirani, E. Armstrong, and T. Newe, ‘‘Industrial IoT, cyber threats, sensors for intelligence medical Internet of Things and its applications in
and standards landscape: Evaluation and roadmap,’’ Sensors, vol. 21, virtual reality,’’ 2023, arXiv:2309.07185.
no. 11, p. 3901, Jun. 2021. [24] V. Subramaniyaswamy, G. Manogaran, R. Logesh, V. Vijayakumar,
[2] S. Zardari, N. Nisar, Z. Fatima, and L. L. Dhirani, ‘‘IoT—Assets N. Chilamkurti, D. Malathi, and N. Senthilselvan, ‘‘Retracted arti-
taxonomy, threats assessment and potential solutions,’’ in Proc. Global cle: An ontology-driven personalized food recommendation in IoT-based
Conf. Wireless Opt. Technol. (GCWOT), Jan. 2023, pp. 1–8. healthcare system,’’ J. Supercomput., vol. 75, no. 6, pp. 3184–3216,
[3] S. Latif, J. Qadir, S. Farooq, and M. Imran, ‘‘How 5G wire- Jun. 2019.
less (and concomitant technologies) will revolutionize healthcare?’’ [25] P. He, C. Lan, Y. Cui, R. Wang, and D. Wu, ‘‘Accelerated federated
Future Internet, vol. 9, no. 4, p. 93, Dec. 2017. [Online]. Available: learning with dynamic model partitioning for H-IoT,’’ in Proc. IEEE
https://www.mdpi.com/1999-5903/9/4/93 Wireless Commun. Netw. Conf. (WCNC), Mar. 2023, pp. 1–6.
[4] S. Majumder, T. Mondal, and M. Deen, ‘‘Wearable sensors for remote [26] S.-C. Cha, T.-Y. Hsu, Y. Xiang, and K.-H. Yeh, ‘‘Privacy enhancing
health monitoring,’’ Sensors, vol. 17, no. 12, p. 130, Jan. 2017. technologies in the Internet of Things: Perspectives and challenges,’’
[5] N. Wickramasinghe and F. Bodendorf, Delivering Superior Health and IEEE Internet Things J., vol. 6, no. 2, pp. 2159–2187, Apr. 2019.
Wellness Management With IoT and Analytics. Cham, Switzerland: [27] F. Subhan, A. Mirza, M. B. M. Su’ud, M. M. Alam, S. Nisar, U. Habib,
Springer, 2019. and M. Z. Iqbal, ‘‘AI-enabled wearable medical Internet of Things in
[6] O. Postolache, D. J. Hemanth, R. Alexandre, D. Gupta, O. Geman, healthcare system: A survey,’’ Appl. Sci., vol. 13, no. 3, p. 1394, Jan. 2023.
and A. Khanna, ‘‘Remote monitoring of physical rehabilitation of stroke [28] S. Swain, B. Bhushan, G. Dhiman, and W. Viriyasitavat, ‘‘Appositeness of
patients using IoT and virtual reality,’’ IEEE J. Sel. Areas Commun., optimized and reliable machine learning for healthcare: A survey,’’ Arch.
vol. 39, no. 2, pp. 562–573, Feb. 2021. Comput. Methods Eng., vol. 29, no. 6, pp. 3981–4003, Oct. 2022.
[7] P. K. Gupta, M. H. Nawaz, S. S. Mishra, K. Parappa, A. Silla, and [29] S. S. Gopalan, A. Raza, and W. Almobaideen, ‘‘IoT security in healthcare
R. Hanumegowda, ‘‘New age approaches to predictive healthcare using in using AI: A survey,’’ in Proc. Int. Conf. Commun., Signal Process., Their
silico drug design and Internet of Things (IoT),’’ Sustain. Energy Efficient Appl. (ICCSPA), Mar. 2021, pp. 1–6.
Comput. Paradigms Soc., vol. 8, pp. 127–151, Sep. 2021. [30] N. Finne, J. Eriksson, T. Voigt, G. Suciu, M.-A. Sachian, J. Ko, and
[8] M. Jayashankara, S. S. Udmale, A. K. Pandey, and R. S. Singh, ‘‘IoT H. Keipour, ‘‘Multi-trace: Multi-level data trace generation with the
healthcare architecture,’’ in IoT-Based Data Analytics for the Healthcare cooja simulator,’’ in Proc. 17th Int. Conf. Distrib. Comput. Sensor Syst.
Industry. Amsterdam, The Netherlands: Elsevier, 2021, pp. 9–29. (DCOSS), Jul. 2021, pp. 390–395.
[9] C. A. Tavera, J. H. Ortiz, O. I. Khalaf, D. F. Saavedra, and T. H. Aldhyani, [31] H. K. Bharadwaj, A. Agarwal, V. Chamola, N. R. Lakkaniga, V. Hassija,
‘‘Wearable wireless body area networks for medical applications,’’ M. Guizani, and B. Sikdar, ‘‘A review on the role of machine learning
Comput. Math. Methods Med., vol. 2021, Apr. 2021, Art. no. 5574376. in enabling IoT based healthcare applications,’’ IEEE Access, vol. 9,
[10] D. Gangwani, ‘‘AI- and IoT-based body sensor networks for healthcare pp. 38859–38890, 2021.
system,’’ Artif. Intell. Cyber-Phys. Syst., Princ. Appl., vol. 2, p. 17, [32] M. H. Kashani, M. Madanipour, M. Nikravan, P. Asghari, and
Mar. 2023. E. Mahdipour, ‘‘A systematic review of IoT in healthcare: Applications,
[11] Dell Inc. (2023). Edge to Core and the Internet of Things and techniques, and trends,’’ J. Netw. Comput. Appl., vol. 192, Oct. 2021,
Data Placement. Accessed: Dec. 15, 2023. [Online]. Available: Art. no. 103164.
https://tinyurl.com/mwj4ywfb
[33] Y. A. Qadri, A. Nauman, Y. B. Zikria, A. V. Vasilakos, and S. W. Kim,
[12] A. P. Plageras and K. E. Psannis, ‘‘Algorithms for big data delivery over
‘‘The future of healthcare Internet of Things: A survey of emerging tech-
the Internet of Things,’’ in Proc. IEEE 19th Conf. Bus. Informat. (CBI),
nologies,’’ IEEE Commun. Surveys Tuts., vol. 22, no. 2, pp. 1121–1167,
vol. 1, Jul. 2017, pp. 202–206.
2nd Quart., 2020.
[13] M. Usak, M. Kubiatko, M. S. Shabbir, O. V. Dudnik, K. Jermsittiparsert,
[34] A. Qayyum, J. Qadir, M. Bilal, and A. Al-Fuqaha, ‘‘Secure and robust
and L. Rajabion, ‘‘Health care service delivery based on the Internet of
machine learning for healthcare: A survey,’’ IEEE Rev. Biomed. Eng.,
Things: A systematic and comprehensive study,’’ Int. J. Commun. Syst.,
vol. 14, pp. 156–180, 2021.
vol. 33, no. 2, p. e4179, Jan. 2020.
[35] G. S. Karthick and P. B. Pankajavalli, ‘‘A review on human healthcare
[14] S. M. Karunarathne, N. Saxena, and M. K. Khan, ‘‘Security and privacy in
Internet of Things: A technical perspective,’’ Social Netw. Comput. Sci.,
IoT smart healthcare,’’ IEEE Internet Comput., vol. 25, no. 4, pp. 37–48,
vol. 1, no. 4, p. 198, Jul. 2020.
Jul. 2021.
[15] A. Hanson and L. Haddad, Nursing Rights of Medication Administration. [36] F. T. Al-Dhief, N. M. A. Latiff, N. N. N. A. Malik, N. S. Salim,
Treasure Island, FL, USA: StatPearls Publishing, 2022. M. M. Baki, M. A. A. Albadr, and M. A. Mohammed, ‘‘A survey of
[16] M. Ciampi, A. Coronato, M. Naeem, and S. Silvestri, ‘‘An intelligent voice pathology surveillance systems based on Internet of Things and
environment for preventing medication errors in home treatment,’’ Expert machine learning algorithms,’’ IEEE Access, vol. 8, pp. 64514–64533,
Syst. Appl., vol. 193, May 2022, Art. no. 116434. 2020.
[17] G. Muhammad, M. S. Hossain, and N. Kumar, ‘‘EEG-based pathology [37] H. Ahmadi, G. Arji, L. Shahmoradi, R. Safdari, M. Nilashi, and
detection for home health monitoring,’’ IEEE J. Sel. Areas Commun., M. Alizadeh, ‘‘The application of Internet of Things in Healthcare: A sys-
vol. 39, no. 2, pp. 603–610, Feb. 2021. tematic literature review and classification,’’ Universal Access Inf. Soc.,
[18] L. Shrotriya, K. Sharma, D. Parashar, K. Mishra, S. S. Rawat, vol. 18, no. 4, pp. 837–869, Nov. 2019.
and H. Pagare, ‘‘Apache spark in healthcare: Advancing data-driven [38] K. Shailaja, B. Seetharamulu, and M. A. Jabbar, ‘‘Machine learning in
innovations and better patient care,’’ Int. J. Adv. Comput. Sci. Appl., healthcare: A review,’’ in Proc. 2nd Int. Conf. Electron., Commun. Aerosp.
vol. 14, no. 6, pp. 1–9, 2023. Technol. (ICECA), Mar. 2018, pp. 910–914.
[19] S. U. Amin and M. S. Hossain, ‘‘Edge intelligence and Internet of [39] G. Hatzivasilis, O. Soultatos, S. Ioannidis, C. Verikoukis, G. Demetriou,
Things in healthcare: A survey,’’ IEEE Access, vol. 9, pp. 45–59, and C. Tsatsoulis, ‘‘Review of security and privacy for the Internet of
2021. Medical Things (IoMT),’’ in Proc. 15th Int. Conf. Distrib. Comput. Sensor
[20] T. Shaik, X. Tao, N. Higgins, L. Li, R. Gururajan, X. Zhou, Syst. (DCOSS), May 2019, pp. 457–464.
and U. R. Acharya, ‘‘Remote patient monitoring using artificial [40] S. K. Jagatheesaperumal, P. Mishra, N. Moustafa, and R. Chauhan,
intelligence: Current state, applications, and challenges,’’ WIREs ‘‘A holistic survey on the use of emerging technologies to provision
Data Mining Knowl. Discovery, vol. 13, no. 2, p. e1485, secure healthcare solutions,’’ Comput. Electr. Eng., vol. 99, Apr. 2022,
Mar. 2023. Art. no. 107691.
[21] K. Hameed, I. S. Bajwa, S. Ramzan, W. Anwar, and A. Khan, ‘‘An intel- [41] M. M. Dhanvijay and S. C. Patil, ‘‘Internet of Things: A survey of
ligent IoT based healthcare system using fuzzy neural networks,’’ Sci. enabling technologies in healthcare and its applications,’’ Comput. Netw.,
Program., vol. 2020, pp. 1–15, Dec. 2020. vol. 153, pp. 113–131, Apr. 2019.
[42] S. Ketu and P. K. Mishra, ‘‘Internet of Healthcare Things: A contemporary [64] N. C. Luong, D. T. Hoang, P. Wang, D. Niyato, D. I. Kim, and Z. Han,
survey,’’ J. Netw. Comput. Appl., vol. 192, Oct. 2021, Art. no. 103179. ‘‘Data collection and wireless communication in Internet of Things (IoT)
[43] S. K and N. D. C, ‘‘Advancements and challenges in 5G networks,’’ in using economic analysis and pricing models: A survey,’’ IEEE Commun.
Proc. Int. Conf. Smart Syst. Appl. Electr. Sci. (ICSSES), Jul. 2023, pp. 1–6. Surveys Tuts., vol. 18, no. 4, pp. 2546–2590, 4th Quart., 2016.
[44] K. Bawaneh, F. G. Nezami, M. Rasheduzzaman, and B. Deken, [65] I. Cvitić and M. Vujić, ‘‘Classification of security risks in the IoT
‘‘Energy consumption analysis and characterization of healthcare environment,’’ Ann. DAAAM, vol. 26, no. 1, pp. 1–10, 2015.
facilities in the united states,’’ Energies, vol. 12, no. 19, p. 3775, [66] J. DiMaggio, The Art of Cyberwarfare: An Investigator’s Guide to
Oct. 2019. Espionage, Ransomware, and Organized Cybercrime. San Francisco, CA,
[45] E. Kost. (2023). 14 Biggest Healthcare Data Breaches [Updated USA: No Starch Press, 2022.
2023]. Accessed: Dec. 16, 2023. [Online]. Available: https://tinyurl. [67] A. Roohi, M. Adeel, and M. A. Shah, ‘‘DDoS in IoT: A roadmap towards
com/axrpc6x5 security & countermeasures,’’ in Proc. 25th Int. Conf. Autom. Comput.
[46] R. Mattioli, A. Malatras, E. N. Hunter, M. G. B. Penso, D. Bertram, (ICAC), Sep. 2019, pp. 1–6.
and I. Neubert, ‘‘ENISA foresight cybersecurity threats for 2030,’’ [68] K. Chen, S. Zhang, Z. Li, Y. Zhang, Q. Deng, S. Ray, and Y. Jin,
Eur. Union Agency Cybersecurity (ENISA), Athens, Greece, ‘‘Internet-of-Things security and vulnerabilities: Taxonomy, challenges,
Tech. Rep., 2023. Accessed: Dec. 15, 2023. [Online]. Available: and practice,’’ J. Hardw. Syst. Secur., vol. 2, no. 2, pp. 97–110, Jun. 2018.
https://tinyurl.com/3ahnvds7, doi: 10.1016/j.eswa.2021.116434. [69] M. Adil, R. Khan, J. Ali, B.-H. Roh, Q. T. H. Ta, and M. A. Almaiah,
[47] N. Chaurasia and P. Kumar, ‘‘A comprehensive study on issues and ‘‘An energy proficient load balancing routing scheme for wireless sensor
challenges related to privacy and security in IoT,’’ e-Prime-Adv. Electr. networks to maximize their lifespan in an operational environment,’’
Eng., Electron. Energy, vol. 4, Jun. 2023, Art. no. 100158. IEEE Access, vol. 8, pp. 163209–163224, 2020.
[48] F. Y. Yavuz, D. Ünal, and E. Gül, ‘‘Deep learning for detection of routing [70] M. N. Khan, H. U. Rahman, M. A. Almaiah, M. Z. Khan, A. Khan,
attacks in the Internet of Things,’’ Int. J. Comput. Intell. Syst., vol. 12, M. Raza, M. Al-Zahrani, O. Almomani, and R. Khan, ‘‘Improving energy
no. 1, pp. 39–58, 2018. efficiency with content-based adaptive and dynamic scheduling in wire-
[49] D. Puthal, S. Nepal, R. Ranjan, and J. Chen, ‘‘Threats to networking cloud less sensor networks,’’ IEEE Access, vol. 8, pp. 176495–176520, 2020.
and edge datacenters in the Internet of Things,’’ IEEE Cloud Comput., [71] M. H. Qasem, N. Obeid, A. Hudaib, M. A. Almaiah, A. Al-Zahrani,
vol. 3, no. 3, pp. 64–71, May 2016. and A. Al-Khasawneh, ‘‘Multi-agent system combined with distributed
[50] H. R. Abdulqadir, S. R. M. Zeebaree, H. M. Shukur, M. M. Sadeeq, data mining for mutual collaboration classification,’’ IEEE Access, vol. 9,
B. W. Salim, A. A. Salih, and S. F. Kak, ‘‘A study of moving from pp. 70531–70547, 2021.
cloud computing to fog computing,’’ Qubahan Academic J., vol. 1, no. 2, [72] M. A. Almaiah, Z. Dawahdeh, O. Almomani, A. Alsaaidah,
pp. 60–70, Apr. 2021. A. Al-Khasawneh, and S. Khawatreh, ‘‘A new hybrid text encryption
[51] A. R. Chordiya, S. Majumder, and A. Y. Javaid, ‘‘Man-in-the-middle approach over mobile ad hoc network,’’ Int. J. Electr. Comput. Eng.,
(MITM) attack based hijacking of HTTP traffic using open source vol. 10, no. 6, pp. 6461–6471, 2020.
tools,’’ in Proc. IEEE Int. Conf. Electro/Inf. Technol. (EIT), May 2018, [73] A. K. A. Hwaitat, M. Amin, O. Almomani, M. Al-Zahrani,
pp. 0438–0443. R. M. Al-Sayed, R. M. Asaifi, K. K. Adhim, A. Althunibat, and
[52] J. M. Alkhathami and S. M. Alzahrani, ‘‘Detection of SQL injection A. Alsaaidah, ‘‘Improved security particle swarm optimization (PSO)
attacks using machine learning in cloud computing platform,’’ J. Theor. algorithm to detect radio jamming attacks in mobile networks,’’ Int. J.
Appl. Inf. Technol., vol. 100, no. 15, pp. 1–14, 2022. Adv. Comput. Sci. Appl., vol. 11, no. 4, pp. 1–12, 2020.
[53] B. Bhushan, G. Sahoo, and A. K. Rai, ‘‘Man-in-the-middle attack [74] M. A. Almaiah, A. Ali, F. Hajjej, M. F. Pasha, and M. A. Alohali,
in wireless and computer networking—A review,’’ in Proc. 3rd Int. ‘‘A lightweight hybrid deep learning privacy preserving model for FC-
Conf. Adv. Comput., Commun. Autom. (ICACCA) (Fall), Sep. 2017, based industrial Internet of Medical Things,’’ Sensors, vol. 22, no. 6,
pp. 1–6. p. 2112, Mar. 2022.
[54] A. Malik, B. Bhushan, S. B. Khan, R. Kashyap, R. Chaganti, and [75] M. A. Almaiah, F. Hajjej, A. Ali, M. F. Pasha, and O. Almomani, ‘‘A novel
N. Rakesh, ‘‘Security attacks and vulnerability analysis in mobile wireless hybrid trustworthy decentralized authentication and data preservation
networking,’’ in 5G Beyond. Singapore: Springer, 2023, pp. 81–110. model for digital healthcare IoT based CPS,’’ Sensors, vol. 22, no. 4,
[55] I. H. Sarker, A. I. Khan, Y. B. Abushark, and F. Alsolami, ‘‘Internet of p. 1448, Feb. 2022.
Things (IoT) security intelligence: A comprehensive overview, machine [76] F. Almudaires and M. Almaiah, ‘‘Data an overview of cybersecurity
learning solutions and research directions,’’ Mobile Netw. Appl., vol. 28, threats on credit card companies and credit card risk mitigation,’’ in Proc.
no. 1, pp. 296–312, Feb. 2023. Int. Conf. Inf. Technol. (ICIT), Jul. 2021, pp. 732–738.
[56] R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, ‘‘Internet of Things [77] Y. Alotaibi and M. Ilyas, ‘‘Security risks in Internet of Things
(IoT) security: Current status, challenges and prospective measures,’’ (IoT): A brief survey,’’ in Proc. 26th World Multi-Conf. Systemics,
in Proc. 10th Int. Conf. Internet Technol. Secured Trans. (ICITST), Cybern. Inform. (WMSCI), 2022, pp. 1–5.
Dec. 2015, pp. 336–341. [78] Y. Chahid, M. Benabdellah, and A. Azizi, ‘‘Internet of Things protocols
[57] N. A. Askar, A. Habbal, A. H. Mohammed, M. S. Sajat, Z. Y. Z. Yusupov, comparison, architecture, vulnerabilities and security: State of the art,’’ in
and D. Kodirov, ‘‘Architecture, protocols, and applications of the Internet Proc. 2nd Int. Conf. Comput. Wireless Commun. Syst., Nov. 2017, pp. 1–6.
of Medical Things (IoMT),’’ J. Commun., vol. 17, no. 11, pp. 900–918, [79] A. Abdullah, R. Hamad, M. Abdulrahman, H. Moala, and S. Elkhediri,
2022. ‘‘CyberSecurity: A review of Internet of Things (IoT) security issues,
[58] A. M. Albalawi and M. A. Almaiah, ‘‘Assessing and reviewing of cyber- challenges and techniques,’’ in Proc. 2nd Int. Conf. Comput. Appl. Inf.
security threats, attacks, mitigation techniques in IoT environment,’’ Secur. (ICCAIS), May 2019, pp. 1–6.
J. Theor. Appl. Inf. Technol, vol. 100, pp. 2988–3011, 2022. [80] Help Net Security. (2023). As Biohacking Evolves, How Vulnerable are
[59] A. Bekkali, M. Essaaidi, M. Boulmalf, and D. Majdoubi, ‘‘Systematic we to Cyber Threats? [Online]. Available: https://tinyurl.com/yts6bmr3
literature review of Internet of Things (IoT) security,’’ Adv. Indynamical [81] V. Varadharajan, U. Tupakula, and K. Karmakar, ‘‘Study of security
Syst. Appl., vol. 21, pp. 25–39, Jan. 2022. attacks against IoT infrastructures,’’ ISIF ASIA Funded Project, Tech.
[60] S. Zaman, M. R. A. Khandaker, R. T. Khan, F. Tariq, and K.-K. Wong, Rep. TR1, 2018.
‘‘Thinking out of the blocks: Holochain for distributed security in IoT [82] Cyber Resilience Act, Shaping Europe’s Digital Future, Legislative Pro-
healthcare,’’ IEEE Access, vol. 10, pp. 37064–37081, 2022. posal COM(2022) 713 Final, European Commission, Brussels, Belgium,
[61] V. Mohindru and A. Garg, ‘‘Security attacks in Internet of 2022, Accessed: Dec. 15, 2023. [Online]. Available: https://digital-
Things: A review,’’ in Proc. ICRIC, 2021, pp. 679–693. strategy.ec.europa.eu/en/library/cyber-resilience-act
[62] R. Khader and D. Eleyan, ‘‘Survey of DoS/DDoS attacks in IoT,’’ Sustain. [83] H. Meagher and L. L. Dhirani, ‘‘Cyber-resilience, principles, and
Eng. Innov., vol. 3, no. 1, pp. 23–28, Jan. 2021. practices,’’ in Cybersecurity Vigilance and Security Engineering of
[63] L. Hu, H. Wen, B. Wu, F. Pan, R.-F. Liao, H. Song, J. Tang, and Internet of Everything. Springer, 2023, pp. 57–74.
X. Wang, ‘‘Cooperative jamming for physical layer security enhancement [84] S. Sinha and B. Sindhu, ‘‘Impact of DoS attack in IoT system and
in Internet of Things,’’ IEEE Internet Things J., vol. 5, no. 1, pp. 219–228, identifying the attacker location for interference attacks,’’ in Proc. 6th
Feb. 2018. Int. Conf. Commun. Electron. Syst. (ICCES), Jul. 2021, pp. 657–662.
[85] European Commission. (2023). Directive on Measures for a High [106] P. Madani, N. Vlajic, and S. Sadeghpour, ‘‘MAC-layer spoofing detection
Common Level of Cybersecurity Across the Union (NIS2 Direc- and prevention in IoT systems: Randomized moving target approach,’’ in
tive). Accessed: Dec. 15, 2023. [Online]. Available: https://digital- Proc. Joint Workshop CPS&IoT Secur. Privacy, Nov. 2020, pp. 71–80.
strategy.ec.europa.eu/en/policies/nis2-directive [107] S. Murali and A. Jamalipour, ‘‘A lightweight intrusion detection for sybil
[86] ‘‘Complete guide to GDPR compliance,’’ Proton AG, Eur. Union, Plan- attack under mobile RPL in the Internet of Things,’’ IEEE Internet Things
les-Ouates, Switzerland, Tech. Rep., 2023. Accessed: Dec. 15, 2023. J., vol. 7, no. 1, pp. 379–388, Jan. 2020.
[Online]. Available: https://gdpr.eu/ [108] I. Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu, and W. Ni, ‘‘Anatomy
[87] M. M. Nasralla, I. García-Magariño, and J. Lloret, ‘‘Defenses against of threats to the Internet of Things,’’ IEEE Commun. Surveys Tuts.,
perception-layer attacks on IoT smart furniture for impaired people,’’ vol. 21, no. 2, pp. 1636–1675, 2nd Quart., 2019.
IEEE Access, vol. 8, pp. 119795–119805, 2020. [109] K. Ávila, P. Sanmartin, D. Jabba, and J. Gómez, ‘‘An analytical survey
[88] M. Sugadev, S. J. Rayen, J. Harirajkumar, R. Rathi, G. Anitha, S. Ramesh, of attack scenario parameters on the techniques of attack mitigation
and K. Ramaswamy, ‘‘Implementation of combined machine learning in WSN,’’ Wireless Pers. Commun., vol. 122, no. 4, pp. 3687–3718,
with the big data model in IoMT systems for the prediction of network Feb. 2022.
resource consumption and improving the data delivery,’’ Comput. Intell. [110] S. Al-Sarawi, M. Anbar, B. A. Alabsi, M. A. Aladaileh, and
Neurosci., vol. 2022, pp. 1–12, Jul. 2022. S. D. A. Rihan, ‘‘Passive rule-based approach to detect sinkhole attack
[89] I. Alihamidi, A. A. Madi, and A. Addaim, ‘‘Proposed architecture in RPL-based Internet of Things networks,’’ IEEE Access, vol. 11,
of e-health IoT,’’ in Proc. Int. Conf. Wireless Netw. Mobile Commun. pp. 94081–94093, 2023.
(WINCOM), Oct. 2019, pp. 1–7. [111] S. Deep, X. Zheng, A. Jolfaei, D. Yu, P. Ostovari, and A. K. Bashir,
[90] H. I. Ahmed, A. A. Nasr, S. Abdel-Mageid, and H. K. Aslan, ‘‘A survey ‘‘A survey of security and privacy issues in the Internet of Things from
of IoT security threats and defenses,’’ Int. J. Adv. Comput. Res., vol. 9, the layered context,’’ Trans. Emerg. Telecommun. Technol., vol. 33, no. 6,
no. 45, pp. 325–350, Oct. 2019. p. e3935, Jun. 2022.
[91] E. A. A. Hagras, S. Aldosary, H. Khaled, and T. M. Hassan, ‘‘Physical [112] C. Hong and D. Shi, ‘‘A cloud-based control system architecture for
layer authenticated image encryption for IoT network based on biometric multi-UAV,’’ in Proc. 3rd Int. Conf. Robot., Control Autom., Aug. 2018,
chaotic signature for MPFrFT OFDM system,’’ Sensors, vol. 23, no. 18, pp. 25–30.
p. 7843, Sep. 2023. [113] M. K. Hooshmand and D. Hosahalli, ‘‘Network anomaly detection using
[92] Y. Zhu and M. Xu, ‘‘Enhancing network throughput via the equal deep learning techniques,’’ CAAI Trans. Intell. Technol., vol. 7, no. 2,
interval frame aggregation scheme for IEEE 802.11ax WLANs,’’ Chin. pp. 228–243, Jun. 2022.
J. Electron., vol. 32, no. 4, pp. 747–759, Jul. 2023. [114] R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, S. Garg, and M. M. Hassan,
[93] M. Chotalia and S. Gajjar, ‘‘Performance comparison of IEEE 802.11ax, ‘‘A distributed intrusion detection system to detect DDoS attacks in
802.11ac and 802.11n using network simulator NS3,’’ in Proc. Int. Conf. blockchain-enabled IoT network,’’ J. Parallel Distrib. Comput., vol. 164,
Comput. Sci., Commun. Secur. Springer, 2023, pp. 191–203. pp. 55–68, Jun. 2022.
[115] A. R. Wani, Q. Rana, U. Saxena, and N. Pandey, ‘‘Analysis and detection
[94] S. S. Sefati and S. Halunga, ‘‘Ultra-reliability and low-latency communi-
of DDoS attacks on cloud computing environment using machine learning
cations on the Internet of Things based on 5G network: Literature review,
techniques,’’ in Proc. IEEE Amity Int. Conf. Artif. Intell. (AICAI),
classification, and future research view,’’ Trans. Emerg. Telecommun.
Feb. 2019, pp. 870–875.
Technol., vol. 34, no. 6, p. e4770, Jun. 2023.
[116] I. Baako and S. Umar, ‘‘An integrated vulnerability assessment of
[95] A. Anjum, P. Agbaje, A. Mitra, E. Oseghale, E. Nwafor, and
electronic commerce websites,’’ Int. J. Inf. Eng. Electron. Bus., vol. 12,
H. Olufowobi, ‘‘Towards named data networking technology: Emerging
no. 5, pp. 24–32, Oct. 2020.
applications, use cases, and challenges for secure data communication,’’
[117] A. Singh, A. Sharma, N. Sharma, I. Kaushik, and B. Bhushan,
Future Gener. Comput. Syst., vol. 151, pp. 12–31, Feb. 2024.
‘‘Taxonomy of attacks on web based applications,’’ in Proc. 2nd Int. Conf.
[96] D. C. Valadares, N. C. Will, Á. Á. C. Sobrinho, A. C. Lima, I. S. Morais,
Intell. Comput., Instrum. Control Technol. (ICICICT), vol. 1, Jul. 2019,
and D. F. Santos, ‘‘Security challenges and recommendations in 5G-IoT
pp. 1231–1235.
scenarios,’’ in Proc. Int. Conf. Adv. Inf. Netw. Appl. Cham, Switzerland:
[118] H. Ibrahim, ‘‘A review on the mechanism mitigating and eliminating
Springer, 2023, pp. 558–573.
Internet crimes using modern technologies: Mitigating Internet crimes
[97] A. Sinha, A. R. Thukkaraju, and O. Vyas, ‘‘A multi agent framework to using modern technologies,’’ Wasit J. Comput. Math. Sci., vol. 1, no. 3,
detect in progress false data injection attacks for smart grid,’’ in Proc. Int. pp. 76–108, 2022.
Conf. Adv. Netw. Technol. Intell. Comput. Cham, Switzerland: Springer,
[119] T. Hu, Z. Zhang, P. Yi, D. Liang, Z. Li, Q. Ren, Y. Hu, and J. Lan,
2021, pp. 123–141.
‘‘SEAPP: A secure application management framework based on REST
[98] K. Sonar and H. Upadhyay, ‘‘A survey: DDoS attack on Internet of API access control in SDN-enabled cloud environment,’’ J. Parallel
Things,’’ Int. J. Eng. Res. Develop., vol. 10, no. 11, pp. 58–63, 2014. Distrib. Comput., vol. 147, pp. 108–123, Jan. 2021.
[99] B. S. Rawal, S. Patel, and M. Sathiyanarayanan, ‘‘Identifying DDoS [120] I. M, M. Kaur, M. Raj, S. R, and H.-N. Lee, ‘‘Cross channel scripting
attack using split-machine learning system in 5G and beyond net- and code injection attacks on web and cloud-based applications: A
works,’’ in Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM comprehensive review,’’ Sensors, vol. 22, no. 5, p. 1959, Mar. 2022.
WKSHPS), May 2022, pp. 1–6. [121] N. Krishnamoorthy and S. Umarani, ‘‘An experimental study on
[100] A. Munshi, N. A. Alqarni, and N. A. Almalki, ‘‘DDoS attack on IoT cloud computing security issues and a framework for xml DDoS
devices,’’ in Proc. 3rd Int. Conf. Comput. Appl. Inf. Secur. (ICCAIS), attack prevention,’’ J. Phys., Conf. Ser., vol. 2007, no. 1, Aug. 2021,
Mar. 2020, pp. 1–5. Art. no. 012058.
[101] E. Džaferović, A. Sokol, A. A. Almisreb, and S. M. Norzeli, ‘‘DoS and [122] U. K. Jannat and M. Mohankumar, ‘‘Proposed on attack analysis using
DDoS vulnerability of IoT: A review,’’ Sustain. Eng. Innov., vol. 1, no. 1, risk assessment and security risk assessment using attacks for cloud cyber
pp. 43–48, Jun. 2019. security,’’ Comput. Sci., vol. 3, p. 1, Mar. 2023.
[102] P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, [123] R. Geetha, A. K. Suntheya, and G. U. Srikanth, ‘‘Cloud integrated IoT
‘‘PAuthKey: A pervasive authentication protocol and key establishment enabled sensor network security: Research issues and solutions,’’ Wireless
scheme for wireless sensor networks in distributed IoT applications,’’ Int. Pers. Commun., vol. 113, no. 2, pp. 747–771, Jul. 2020.
J. Distrib. Sensor Netw., vol. 10, no. 7, Jul. 2014, Art. no. 357430. [124] R. Ponnumani and N. Partheeban, ‘‘Various threats and attack on
[103] Cyber Risk GmbH. (2022). The NIS 2 Directive. [Online]. Available: cloud computing: A review,’’ in Proc. 5th Int. Conf. Contemp. Comput.
https://www.nis-2-directive.com/ Informat. (ICI), Dec. 2022, pp. 1296–1300.
[104] K. G. Kumar and S. Sengan, ‘‘Improved network traffic by attacking [125] M. Abbasi, M. Plaza-Hernández, J. Prieto, and J. M. Corchado, ‘‘Security
denial of service to protect resource using Z-test based 4-tier geo- in the Internet of Things application layer: Requirements, threats, and
mark traceback (Z4TGT),’’ Wireless Pers. Commun., vol. 114, no. 4, solutions,’’ IEEE Access, vol. 10, pp. 97197–97216, 2022.
pp. 3541–3575, Oct. 2020. [126] S. Padmanaban, M. A. Nasab, M. E. Shiri, H. H. S. Javadi, M. A. Nasab,
[105] S. Hijazi and M. S. Obaidat, ‘‘Address resolution protocol spoofing M. Zand, and T. Samavat, ‘‘The role of Internet of Things in smart
attacks and security approaches: A survey,’’ Secur. Privacy, vol. 2, no. 1, homes,’’ in Artificial Intelligence-based Smart Power Systems. Hoboken,
p. e49, Jan. 2019. NJ, USA: Wiley, 2023, pp. 259–271.
[127] M. Kumar, C. Kondaiah, A. R. Pais, and R. S. Rao, ‘‘Machine learning [148] S. S. Ram, B. Apduhan, and N. Shiratori, ‘‘A machine learning
models for phishing detection from TLS traffic,’’ Cluster Comput., framework for edge computing to improve prediction accuracy in
vol. 26, no. 5, pp. 3263–3277, Oct. 2023. mobile health monitoring,’’ in Proc. 19th Int. Conf. Comput. Sci.
[128] A. Gaurav, B. B. Gupta, W. Alhalabi, A. Visvizi, and Y. Asiri, ‘‘A Appl. (ICCSA), Saint Petersburg, Russia. Cham, Switzerland: Springer,
comprehensive survey on DDoS attacks on various intelligent systems Jul. 2019, pp. 417–431.
and it’s defense techniques,’’ Int. J. Intell. Syst., vol. 37, no. 12, [149] P. Vanin, T. Newe, L. L. Dhirani, E. O’Connell, D. O’Shea, B. Lee, and
pp. 11407–11431, Dec. 2022. M. Rao, ‘‘A study of network intrusion detection systems using artificial
[129] R. Ahuja and M. Gupta, ‘‘Improved heuristic framework for cyber intelligence/machine learning,’’ Appl. Sci., vol. 12, no. 22, p. 11752,
security system on DDoS attack,’’ J. Data Acquisition Process., vol. 38, Nov. 2022.
no. 3, p. 3033, 2023. [150] L. L. Dhirani, T. Newe, and S. Nizamani, ‘‘Hybrid multi-cloud
[130] F. Shaikh, E. Bou-Harb, N. Neshenko, A. P. Wright, and N. Ghani, ‘‘Inter- demystifying slas for smart city enterprises using IoT applications,’’ in
net of Malicious Things: Correlating active and passive measurements for IoT Architectures, Models, and Platforms for Smart City Applications.
inferring and characterizing Internet-scale unsolicited IoT devices,’’ IEEE Hershey, PA, USA: IGI Global, 2020, pp. 52–67.
Commun. Mag., vol. 56, no. 9, pp. 170–177, Sep. 2018. [151] A. Sharma and U. K. Singh, ‘‘Modelling of smart risk assessment
approach for cloud computing environment using AI & supervised
[131] M. Jia, A. Komeily, Y. Wang, and R. S. Srinivasan, ‘‘Adopting
machine learning algorithms,’’ Global Transitions Proc., vol. 3, no. 1,
Internet of Things for the development of smart buildings: A review of
pp. 243–250, Jun. 2022.
enabling technologies and applications,’’ Autom. Construct., vol. 101,
pp. 111–126, May 2019. [152] F. Desai, D. Chowdhury, R. Kaur, M. Peeters, R. C. Arya, G. S. Wander,
S. S. Gill, and R. Buyya, ‘‘HealthCloud: A system for monitoring health
[132] A. Shifa, M. N. Asghar, and M. Fleury, ‘‘Multimedia security perspectives
status of heart patients using machine learning and cloud computing,’’
in IoT,’’ in Proc. 6th Int. Conf. Innov. Comput. Technol. (INTECH),
Internet Things, vol. 17, Mar. 2022, Art. no. 100485.
Aug. 2016, pp. 550–555.
[153] A. Abdelaziz, A. S. Salama, A. Riad, and A. N. Mahmoud, ‘‘A machine
[133] ‘‘Conti cyber attack on the HSE,’’ Nat. Cyber Secur. Centre, Dublin, learning model for predicting of chronic kidney disease based Internet of
Ireland, Tech. Rep. 2105161000-NCSC, 2021, Accessed: Dec. 15, 2023. Things and cloud computing in smart cities,’’ in Security in Smart Cities:
[Online]. Available: https://www.ncsc.gov.ie/pdfs/HSE_Conti_140521_ Models, Applications, and Challenges. Cham, Switzerland: Springer,
UPDATE.pdf 2019, pp. 93–114.
[134] M. S. Akhtar and T. Feng, ‘‘A systemic security and privacy review: [154] C. Butpheng, K.-H. Yeh, and H. Xiong, ‘‘Security and privacy in IoT-
Attacks and prevention mechanisms over IoT layers,’’ EAI Endorsed cloud-based e-health systems—A comprehensive review,’’ Symmetry,
Trans. Secur. Saf., vol. 8, no. 30, pp. 1–12, 2022. vol. 12, no. 7, p. 1191, Jul. 2020.
[135] M. A. Khatun, N. Chowdhury, and M. N. Uddin, ‘‘Malicious nodes [155] M. Maksimović and V. Vujović, ‘‘Internet of Things based e-health
detection based on artificial neural network in IoT environments,’’ in systems: Ideas, expectations and concerns,’’ in Handbook of Large-
Proc. IEEE 22nd Int. Conf. Comput. Inf. Technol. (ICCIT), Dec. 2019, Scale Distributed Computing in Smart Healthcare. Cham, Switzerland:
pp. 1–6. Springer, 2017, pp. 241–280.
[136] M. Al-Amin, M. A. Khatun, and M. N. Uddin, ‘‘Development of cyber [156] D. Zhang, J. J. P. C. Rodrigues, Y. Zhai, and T. Sato, ‘‘Design and
attack model for private network,’’ in Proc. 2nd Int. Conf. Interdiscipl. implementation of 5G e-health systems: Technologies, use cases, and
Cyber Phys. Syst. (ICPS), May 2022, pp. 216–221. future challenges,’’ IEEE Commun. Mag., vol. 59, no. 9, pp. 80–85,
[137] L. L. Dhirani, N. Mukhtiar, B. S. Chowdhry, and T. Newe, ‘‘Ethical Sep. 2021.
dilemmas and privacy issues in emerging technologies: A review,’’ [157] M. S. Hossain, S. U. Amin, M. Alsulaiman, and G. Muhammad,
Sensors, vol. 23, no. 3, p. 1151, Jan. 2023. ‘‘Applying deep learning for epilepsy seizure detection and brain mapping
[138] N. Comfort, ‘‘German banking regulator BaFin’s website hit by cyber visualization,’’ ACM Trans. Multimedia Comput., Commun., Appl.,
attack,’’ Bloomberg, New York, NY, USA, Tech. Rep., Sep. 2023. vol. 15, no. 1s, pp. 1–17, Jan. 2019.
Accessed: Dec. 15, 2023. [Online]. Available: https://tinyurl.com/ [158] C. Hewson, C. Vogel, and D. Laurent, Internet Research Methods.
tmja7jyn Newbury Park, CA, USA: Sage, 2015.
[139] A. Raj, ‘‘Critical infrastructure cyberattack on Japan’s biggest port,’’ [159] H. Asri, ‘‘IoT and reality mining for real-time disease prediction,’’ in
Tech Wire Asia, Kuala Lumpur, Malaysia, Tech. Rep., 2023. Accessed: IoT and Smart Devices for Sustainable Environment. Cham, Switzerland:
Dec. 15, 2023. [Online]. Available: https://tinyurl.com/2kn4mdxn Springer, 2022, pp. 85–102.
[140] K. A. Nagaty, ‘‘IoT commercial and industrial applications and AI- [160] F. D. G. Solfa and F. R. Simonato, ‘‘Big data analytics in healthcare:
powered IoT,’’ in Frontiers of Quality Electronic Design (QED) Exploring the role of machine learning in predicting patient outcomes
AI, IoT and Hardware Security. Cham, Switzerland: Springer, 2023, and improving healthcare delivery,’’ Int. J. Comput., Inf. Manuf., vol. 3,
pp. 465–500. no. 1, pp. 1–9, 2023.
[141] S. Gupta and B. B. Gupta, ‘‘Cross-site scripting (XSS) attacks and defense [161] G. Arji, H. Ahmadi, P. Avazpoor, and M. Hemmat, ‘‘Identifying resilience
mechanisms: Classification and state-of-the-art,’’ Int. J. Syst. Assurance strategies for disruption management in the healthcare supply chain
Eng. Manage., vol. 8, no. S1, pp. 512–530, Jan. 2017. during COVID-19 by digital innovations: A systematic literature review,’’
Informat. Med. Unlocked, vol. 38, Feb. 2023, Art. no. 101199.
[142] M. T. Louw and V. N. Venkatakrishnan, ‘‘Blueprint: Robust prevention
[162] L. L. Dhirani, T. Newe, and S. Nizamani, ‘‘Can IoT escape cloud QoS and
of cross-site scripting attacks for existing browsers,’’ in Proc. 30th IEEE
cost pitfalls,’’ in Proc. 12th Int. Conf. Sens. Technol. (ICST), Dec. 2018,
Symp. Secur. Privacy, May 2009, pp. 331–346.
pp. 65–70.
[143] D. Lu, J. Fei, and L. Liu, ‘‘A semantic learning-based SQL injection attack [163] H. Asri and Z. Jarir, ‘‘Toward a smart health: Big data analytics and IoT
detection technology,’’ Electronics, vol. 12, no. 6, p. 1344, Mar. 2023. for real-time miscarriage prediction,’’ J. Big Data, vol. 10, no. 1, pp. 1–23,
[144] Z. Zhang, H. A. Hamadi, E. Damiani, C. Y. Yeun, and F. Taher, Mar. 2023.
‘‘Explainable artificial intelligence applications in cyber security: State- [164] G. Sasubilli and A. Kumar, ‘‘Machine learning and big data implementa-
of-the-art in research,’’ IEEE Access, vol. 10, pp. 93104–93139, 2022. tion on health care data,’’ in Proc. 4th Int. Conf. Intell. Comput. Control
[145] S. M. Mathews, ‘‘Explainable artificial intelligence applications in NLP, Syst. (ICICCS), May 2020, pp. 859–864.
biomedical, and malware classification: A literature review,’’ in Proc. [165] A. D. C. Barriga, A. F. Martins, M. J. Simões, and D. Faustino,
Comput. Conf. Intell. Comput., vol. 2. Cham, Switzerland: Springer, 2019, ‘‘The COVID-19 pandemic: Yet another catalyst for governmental
pp. 1269–1292. mass surveillance?’’ Social Sci. Humanities Open, vol. 2, no. 1, 2020,
[146] M. R. Islam, M. U. Ahmed, S. Barua, and S. Begum, ‘‘A systematic review Art. no. 100096.
of explainable artificial intelligence in terms of different application [166] S. D. Suganthi, R. Anitha, V. Sureshkumar, S. Harish, and S. Agalya,
domains and tasks,’’ Appl. Sci., vol. 12, no. 3, p. 1353, Jan. 2022. ‘‘End to end light weight mutual authentication scheme in IoT-based
[147] H. H. Nguyen, F. Mirza, M. A. Naeem, and M. Nguyen, ‘‘A review on healthcare environment,’’ J. Reliable Intell. Environ., vol. 6, no. 1,
IoT healthcare monitoring applications and a vision for transforming pp. 3–13, Mar. 2020.
sensor data into real-time clinical feedback,’’ in Proc. IEEE 21st Int. [167] E. Gelenbe and M. Nakip, ‘‘Real-time cyberattack detection with offline
Conf. Comput. Supported Cooperat. Work Design (CSCWD), Apr. 2017, and online learning,’’ in Proc. IEEE 29th Int. Symp. Local Metrop. Area
pp. 257–262. Netw. (LANMAN), Jul. 2023, pp. 1–6.
[168] P. A. H. Williams and V. McCauley, ‘‘Always connected: The security [190] K. Bouabida, B. Lebouché, and M.-P. Pomey, ‘‘Telehealth and COVID-19
challenges of the healthcare Internet of Things,’’ in Proc. IEEE 3rd World pandemic: An overview of the telehealth use, advantages, challenges, and
Forum Internet Things (WF-IoT), Dec. 2016, pp. 30–35. opportunities during COVID-19 pandemic,’’ Healthcare, vol. 10, no. 11,
[169] M. Pons, E. Valenzuela, B. Rodríguez, J. A. Nolazco-Flores, and p. 2293, Nov. 2022.
C. Del-Valle-Soto, ‘‘Utilization of 5G technologies in IoT applica- [191] L. Wang and R. Jones, ‘‘Big data, cybersecurity, and challenges in
tions: Current limitations by interference and network optimization healthcare,’’ in Proc. SoutheastCon, Apr. 2019, pp. 1–6.
difficulties—A review,’’ Sensors, vol. 23, no. 8, p. 3876, Apr. 2023. [192] L. Coventry and D. Branley, ‘‘Cybersecurity in healthcare: A narrative
[170] A. M. Seid, A. Erbad, H. N. Abishu, A. Albaseer, M. Abdallah, and review of trends, threats and ways forward,’’ Maturitas, vol. 113,
M. Guizani, ‘‘Multi-agent federated reinforcement learning for resource pp. 48–52, Jul. 2018.
allocation in UAV-enabled Internet of Medical Things networks,’’ IEEE [193] S. A. Wagan, J. Koo, I. F. Siddiqui, N. M. F. Qureshi, M. Attique, and
Internet Things J., p. 1, 2023. D. R. Shin, ‘‘A fuzzy-based duo-secure multi-modal framework for IoMT
[171] A. Rai, D. K. Singh, A. Sehgal, and K. Cengiz, Paradigms of Smart and anomaly detection,’’ J. King Saud Univ.-Comput. Inf. Sci., vol. 35, no. 1,
Intelligent Communication, 5G and Beyond. Singapore: Springer, 2023. pp. 131–144, Jan. 2023.
[172] M. Vermanen, M. M. Rantanen, and V. Harkke, ‘‘Ethical framework for [194] T. Thulasi and K. Sivamohan, ‘‘LSO-CSL: Light spectrum optimizer-
IoT deployment in SMEs: Individual perspective,’’ Internet Res., vol. 32, based convolutional stacked long short term memory for attack detection
no. 7, pp. 185–201, Dec. 2022. in IoT-based healthcare applications,’’ Expert Syst. Appl., vol. 232,
[173] K. Kandasamy, S. Srinivas, K. Achuthan, and V. P. Rangan, ‘‘IoT cyber Dec. 2023, Art. no. 120772.
risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, [195] K. Gupta, D. K. Sharma, K. D. Gupta, and A. Kumar, ‘‘A tree classifier
and risk ranking process,’’ EURASIP J. Inf. Secur., vol. 2020, no. 1, based network intrusion detection model for Internet of Medical Things,’’
pp. 1–18, Dec. 2020. Comput. Electr. Eng., vol. 102, Sep. 2022, Art. no. 108158.
[174] A. Karale, ‘‘The challenges of IoT addressing security, ethics, privacy, [196] A. A. Hady, A. Ghubaish, T. Salman, D. Unal, and R. Jain, ‘‘Intrusion
and laws,’’ Internet Things, vol. 15, Sep. 2021, Art. no. 100420. detection system for healthcare systems using medical and network data:
[175] L. Phillips, ‘‘Healthcare cybersecurity in 2023: Hive’s shutdown is good A comparison study,’’ IEEE Access, vol. 8, pp. 106576–106584, 2020.
news but cyberattacks are only getting worse,’’ Insider Intell., Jan. 2023. [197] S. Saif, P. Das, S. Biswas, M. Khari, and V. Shanmuganathan, ‘‘HIIDS:
[Online]. Available: https://tinyurl.com/mryu9yct Hybrid intelligent intrusion detection system empowered with machine
[176] J. McKeon, ‘‘Biggest healthcare data breaches reported this year, so far,’’ learning and metaheuristic algorithms for application in IoT based
TechTarget, Newton, MA, USA, Tech. Rep., 2023. [Online]. Available: healthcare,’’ Microprocessors Microsyst., Aug. 2022, Art. no. 104622.
https://tinyurl.com/2s3t6dmh [198] S. Ray, K. N. Mishra, and S. Dutta, ‘‘Detection and prevention of DDoS
[177] M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, and attacks on M-healthcare sensitive data: A novel approach,’’ Int. J. Inf.
M. Guizani, ‘‘A survey of machine and deep learning methods for Internet Technol., vol. 14, no. 3, pp. 1333–1341, May 2022.
of Things (IoT) security,’’ IEEE Commun. Surveys Tuts., vol. 22, no. 3, [199] A. Kumar, R. S. Umurzoqovich, N. D. Duong, P. Kanani, A. Kuppusamy,
pp. 1646–1685, 3rd Quart., 2020. M. Praneesh, and M. N. Hieu, ‘‘An intrusion identification and prevention
[178] J. Qiu, X. Liang, S. Shetty, and D. Bowden, ‘‘Towards secure and smart for cloud computing: From the perspective of deep learning,’’ Optik,
healthcare in smart cities using blockchain,’’ in Proc. IEEE Int. Smart vol. 270, Nov. 2022, Art. no. 170044.
Cities Conf. (ISC2), Sep. 2018, pp. 1–4. [200] R. M. S. Priya, P. K. R. Maddikunta, M. Parimala, S. Koppu,
[179] I. R. Vanani and M. Amirhosseini, ‘‘IoT-based diseases prediction and T. R. Gadekallu, C. L. Chowdhary, and M. Alazab, ‘‘An effective feature
diagnosis system for healthcare,’’ in Internet of Things for Healthcare engineering for DNN using hybrid PCA-GWO for intrusion detection in
Technologies. Singapore: Springer, 2021, pp. 21–48. IoMT architecture,’’ Comput. Commun., vol. 160, pp. 139–149, Jul. 2020.
[180] A. W. Kempa-Liehr, C. Y.-C. Lin, R. Britten, D. Armstrong, J. Wallace, [201] S. O. M. Kamel and S. A. Elhamayed, ‘‘Mitigating the impact of IoT
D. Mordaunt, and M. O’Sullivan, ‘‘Healthcare pathway discovery and routing attacks on power consumption in IoT healthcare environment
probabilistic machine learning,’’ Int. J. Med. Informat., vol. 137, using convolutional neural network,’’ Int. J. Comput. Netw. Inf. Secur.,
May 2020, Art. no. 104087. vol. 12, no. 4, pp. 11–29, Aug. 2020.
[181] A. U. Haq, J. P. Li, J. Khan, M. H. Memon, S. Nazir, S. Ahmad, [202] N. Terry, ‘‘Existential challenges for healthcare data protection in the
G. A. Khan, and A. Ali, ‘‘Intelligent machine learning approach for united states,’’ Ethics, Med. Public Health, vol. 3, no. 1, pp. 19–27,
effective recognition of diabetes in e-healthcare using clinical data,’’ Jan. 2017.
Sensors, vol. 20, no. 9, p. 2649, May 2020. [203] M. Bansal and Priya, ‘‘Application layer protocols for Internet of
[182] R. Vaishya, M. Javaid, I. H. Khan, and A. Haleem, ‘‘Artificial intelli- Healthcare Things (IoHT),’’ in Proc. 4th Int. Conf. Inventive Syst. Control
gence (AI) applications for COVID-19 pandemic,’’ Diabetes Metabolic (ICISC), Jan. 2020, pp. 369–376.
Syndrome, Clin. Res. Rev., vol. 14, no. 4, pp. 337–339, 2020. [204] M. N. Bhuiyan, M. M. Rahman, M. M. Billah, and D. Saha, ‘‘Internet
[183] A. Garcia-Perez, J. G. Cegarra-Navarro, M. P. Sallos, E. Martinez-Caro, of Things (IoT): A review of its enabling technologies in healthcare
and A. Chinnaswamy, ‘‘Resilience in healthcare systems: Cyber secu- applications, standards protocols, security, and market opportunities,’’
rity and digital transformation,’’ Technovation, vol. 121, Mar. 2023, IEEE Internet Things J., vol. 8, no. 13, pp. 10474–10498, Jul. 2021.
Art. no. 102583. [205] B. Mittelstadt, ‘‘Designing the health-related Internet of Things: Ethical
[184] A. J. Cartwright, ‘‘The elephant in the room: Cybersecurity in health- principles and guidelines,’’ Information, vol. 8, no. 3, p. 77, Jul. 2017.
care,’’ J. Clin. Monitor. Comput., vol. 37, no. 5, pp. 1123–1132, Oct. 2023. [206] T. A. Al-Amiedy, M. Anbar, B. Belaton, A. H. H. Kabla, I. H. Hasbullah,
[185] M. Javaid, A. Haleem, R. P. Singh, and R. Suman, ‘‘Towards insighting and Z. R. Alashhab, ‘‘A systematic literature review on machine
cybersecurity for healthcare domains: A comprehensive review of and deep learning approaches for detecting attacks in RPL-based
recent practices and trends,’’ Cyber Secur. Appl., vol. 1, Dec. 2023, 6LoWPAN of Internet of Things,’’ Sensors, vol. 22, no. 9, p. 3400,
Art. no. 100016. Apr. 2022.
[186] M. Kumar, A. Kumar, S. Verma, P. Bhattacharya, D. Ghimire, S.-H. Kim, [207] R. Saminathan, S. Saravanan, and P. Anbalagan, ‘‘Blockchain in health-
and A. S. M. S. Hosen, ‘‘Healthcare Internet of Things (H-IoT): Current care: A new dimension to healthcare data security,’’ in Hybridization of
trends, future prospects, applications, challenges, and security issues,’’ Blockchain and Cloud Computing: Overcoming Security Issues in IoT.
Electronics, vol. 12, no. 9, p. 2050, Apr. 2023. New York, NY, USA: Taylor & Francis Group, 2023, p. 45.
[187] B. Sharma, L. Sharma, C. Lal, and S. Roy, ‘‘Anomaly based network [208] B. H. Patel and P. Shah, ‘‘RPL routing protocol performance under
intrusion detection for IoT attacks using deep learning technique,’’ sinkhole and selective forwarding attack: Experimental and simulated
Comput. Electr. Eng., vol. 107, Apr. 2023, Art. no. 108626. evaluation,’’ TELKOMNIKA, Telecommun. Comput. Electron. Control,
[188] M. Khatkar, K. Kumar, B. Kumar, and P. Agarwal, ‘‘Parametric influence vol. 18, no. 4, pp. 1849–1856, 2020.
of intrusion detection system in healthcare sector using deep neural [209] I. Tomic and J. A. McCann, ‘‘A survey of potential security issues in
[LSTM] network,’’ J. Pharmaceutical Negative Results, vol. 14, no. 1, existing wireless sensor network protocols,’’ IEEE Internet Things J.,
pp. 685–692, 2023. vol. 4, no. 6, pp. 1910–1923, Dec. 2017.
[189] S. Ksibi, F. Jaidi, and A. Bouhoula, ‘‘IoMT security model based on [210] S. A. Butt, J. L. Diaz-Martinez, T. Jamal, A. Ali, E. De-La-Hoz-Franco,
machine learning and risk assessment techniques,’’ in Proc. Int. Wireless and M. Shoaib, ‘‘IoT smart health security threats,’’ in Proc. 19th Int.
Commun. Mobile Comput. (IWCMC), Jun. 2023, pp. 614–619. Conf. Comput. Sci. Its Appl. (ICCSA), Jul. 2019, pp. 26–31.
[211] F. Zahra, N. Jhanjhi, S. N. Brohi, N. A. Khan, M. Masud, and [230] K. Kumar and B. P. Pande, ‘‘Applications of machine learning techniques
M. A. AlZain, ‘‘Rank and wormhole attack detection model for RPL- in the realm of cybersecurity,’’ in Cyber Security and Digital Forensics.
based Internet of Things using machine learning,’’ Sensors, vol. 22, Hoboken, NJ, USA: Wiley, 2022, pp. 295–315.
no. 18, p. 6765, Sep. 2022. [231] V. Ravi, T. D. Pham, and M. Alazab, ‘‘Attention-based multidimensional
[212] U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, ‘‘A critical deep learning approach for cross-architecture IoMT malware detection
cybersecurity analysis and future research directions for the Internet and classification in healthcare cyber-physical systems,’’ IEEE Trans.
of Things: A comprehensive review,’’ Sensors, vol. 23, no. 8, p. 4117, Computat. Social Syst., vol. 10, no. 4, pp. 1–10, Aug. 2022.
Apr. 2023. [232] A. Singla and E. Bertino, ‘‘How deep learning is making information
[213] A. Haghrah, M. P. Abdollahi, H. Azarhava, and J. M. Niya, ‘‘A survey security more intelligent,’’ IEEE Secur. Privacy, vol. 17, no. 3, pp. 56–65,
on the handover management in 5G-NR cellular networks: Aspects, May 2019.
approaches and challenges,’’ EURASIP J. Wireless Commun. Netw., [233] S. Roobini, M. Kavitha, M. Sujaritha, and D. R. Kumar, ‘‘Cyber-security
vol. 2023, no. 1, pp. 1–57, Jun. 2023. threats to IOMT-enabled healthcare systems,’’ in Cognitive Computing
[214] T. M. Ghazal, ‘‘Retracted article: Positioning of UAV base stations using for Internet of Medical Things. London, U.K.: Chapman & Hall, 2022,
5G and beyond networks for IoMT applications,’’ Arabian J. Sci. Eng., pp. 105–130.
vol. 48, no. 4, p. 5687, Apr. 2023. [234] Q. Qiao and A. Yunusa-Kaltungo, ‘‘A hybrid agent-based machine
learning method for human-centred energy consumption prediction,’’
[215] A. Peivandizadeh and B. Molavi, ‘‘Compatible authentication and key
Energy Buildings, vol. 283, Mar. 2023, Art. no. 112797.
agreement protocol for low power and lossy network in IoT environ-
[235] B. Sharma, L. Sharma, and C. Lal, ‘‘Feature selection and deep learning
ment,’’ Social Sci. Res. Netw. (SSRN), Amsterdam, The Netherlands,
technique for intrusion detection system in IoT,’’ in Proc. Int. Conf.
Tech. Rep. 4454407, 2023.
Comput. Intell. (ICCI). Singapore: Springer, 2022, pp. 253–261.
[216] Y. Rbah, M. Mahfoudi, Y. Balboul, M. Fattah, S. Mazer, M. Elbekkali, and
[236] P. R. S. Rohith and H. Rathore, ‘‘Sentiment analysis of IMDb movie
B. Bernoussi, ‘‘Machine learning and deep learning methods for intrusion
reviews: A comparative analysis of feature selection and feature
detection systems in IoMT: A survey,’’ in Proc. 2nd Int. Conf. Innov. Res.
extraction techniques,’’ in Proc. 21st Int. Conf. Hybrid Intell. Syst. (HIS),
Appl. Sci., Eng. Technol. (IRASET), Mar. 2022, pp. 1–9.
vol. 420. Cham, Switzerland: Springer, 2022, p. 283.
[217] A. Anand, S. Rani, D. Anand, H. M. Aljahdali, and D. Kerr, ‘‘An efficient [237] A. Z. Ul-Saufie, N. H. Hamzan, Z. Zahari, W. N. Shaziayani, N. M. Noor,
CNN-based deep learning model to detect malware attacks (CNN-DMA) M. R. R. M. A. Zainol, A. V. Sandu, G. Deak, and P. Vizureanu,
in 5G-IoT healthcare applications,’’ Sensors, vol. 21, no. 19, p. 6346, ‘‘Improving air pollution prediction modelling using wrapper feature
Sep. 2021. selection,’’ Sustainability, vol. 14, no. 18, p. 11403, Sep. 2022.
[218] M. Ahsan, K. E. Nygard, R. Gomes, M. M. Chowdhury, N. Rifat, and [238] Doreswamy, M. K. Hooshmand, and I. Gad, ‘‘Feature selection approach
J. F. Connolly, ‘‘Cybersecurity threats and their mitigation approaches using ensemble learning for network anomaly detection,’’ CAAI Trans.
using machine learning—A review,’’ J. Cybersecurity Privacy, vol. 2, Intell. Technol., vol. 5, no. 4, pp. 283–293, Dec. 2020.
no. 3, pp. 527–555, Jul. 2022. [239] D. He, Q. Qiao, Y. Gao, J. Zheng, S. Chan, J. Li, and N. Guizani,
[219] P. N. Mahalle, G. R. Shinde, Y. S. Ingle, and N. N. Wasatkar, ‘‘Data- ‘‘Intrusion detection based on stacked autoencoder for connected
centric AI in information, communication and technology,’’ in Data healthcare systems,’’ IEEE Netw., vol. 33, no. 6, pp. 64–69, Nov. 2019.
Centric Artificial Intelligence: A Beginner’s Guide. Singapore: Springer, [240] A. Si-Ahmed, M. A. Al-Garadi, and N. Boustia, ‘‘Survey of machine
2023, pp. 109–124. learning based intrusion detection methods for Internet of Medical
[220] I. N. R. Hendrawan and I. G. N. W. Arsa, ‘‘Zolertia z1 energy usage Things,’’ Appl. Soft Comput., vol. 140, Jun. 2023, Art. no. 110227.
simulation with cooja simulator,’’ in Proc. 1st Int. Conf. Informat. [241] O. Taouali, S. Bacha, K. B. Abdellafou, A. Aljuhani, K. Zidi, R. Alanazi,
Comput. Sci. (ICICoS), Nov. 2017, pp. 147–152. and M. F. Harkat, ‘‘Intelligent intrusion detection system for the Internet
[221] E. Q. Shahra, T. R. Sheltami, and E. M. Shakshuki, ‘‘A comparative study of Medical Things based on data-driven techniques,’’ Comput. Syst. Sci.
of range-free and range-based localization protocols for wireless sensor Eng., vol. 47, no. 2, pp. 1593–1609, 2023.
network: Using COOJA simulator,’’ in Sensor Technology: Concepts, [242] G. Thamilarasu, A. Odesile, and A. Hoang, ‘‘An intrusion detec-
Methodologies, Tools, and Applications. Hershey, PA, USA: IGI Global, tion system for Internet of Medical Things,’’ IEEE Access, vol. 8,
2020, pp. 1522–1537. pp. 181560–181576, 2020.
[222] Q. Wang, Y. Ma, K. Zhao, and Y. Tian, ‘‘A comprehensive survey of loss [243] P. Kumar, G. P. Gupta, and R. Tripathi, ‘‘An ensemble learning and
functions in machine learning,’’ Ann. Data Sci., vol. 9, no. 2, pp. 187–212, fog-cloud architecture-driven cyber-attack detection framework for IoMT
Apr. 2022. networks,’’ Comput. Commun., vol. 166, pp. 110–124, Jan. 2021.
[223] I. H. Sarker, ‘‘Machine learning: Algorithms, real-world applications and [244] A. A. Abdellatif, A. Mohamed, C. F. Chiasserini, M. Tlili, and
research directions,’’ Social Netw. Comput. Sci., vol. 2, no. 3, p. 160, A. Erbad, ‘‘Edge computing for smart health: Context-aware approaches,
May 2021. opportunities, and challenges,’’ IEEE Netw., vol. 33, no. 3, pp. 196–203,
May 2019.
[224] F. O. Olowononi, D. B. Rawat, and C. Liu, ‘‘Resilient machine learning
[245] M. A. Alsheikh, S. Lin, D. Niyato, and H.-P. Tan, ‘‘Machine learning in
for networked cyber physical systems: A survey for machine learning
wireless sensor networks: Algorithms, strategies, and applications,’’ IEEE
security to securing machine learning for CPS,’’ IEEE Commun. Surveys
Commun. Surveys Tuts., vol. 16, no. 4, pp. 1996–2018, 4th Quart., 2014.
Tuts., vol. 23, no. 1, pp. 524–552, 1st Quart., 2021.
[246] A. Ukil, S. Bandyoapdhyay, C. Puri, and A. Pal, ‘‘IoT healthcare
[225] S. Neupane, J. Ables, W. Anderson, S. Mittal, S. Rahimi, I. Banicescu, and analytics: The importance of anomaly detection,’’ in Proc. IEEE 30th Int.
M. Seale, ‘‘Explainable intrusion detection systems (X-IDS): A survey of Conf. Adv. Inf. Netw. Appl. (AINA), Mar. 2016, pp. 994–997.
current methods, challenges, and opportunities,’’ IEEE Access, vol. 10,
[247] I. Deliu, C. Leichter, and K. Franke, ‘‘Extracting cyber threat intelligence
pp. 112392–112415, 2022.
from hacker forums: Support vector machines versus convolutional neural
[226] T. Mazhar, D. B. Talpur, T. A. Shloul, Y. Y. Ghadi, I. Haq, I. Ullah, networks,’’ in Proc. IEEE Int. Conf. Big Data (Big Data), Dec. 2017,
K. Ouahada, and H. Hamam, ‘‘Analysis of IoT security challenges and its pp. 3648–3656.
solutions using artificial intelligence,’’ Brain Sci., vol. 13, no. 4, p. 683, [248] A. Mehra, M. Mandal, P. Narang, and V. Chamola, ‘‘Correction to
Apr. 2023. ‘reviewnet: A fast and resource optimized network for enabling safe
[227] I. H. Sarker, ‘‘Machine learning for intelligent data analysis and autonomous driving in hazy weather conditions,’’’ IEEE Trans. Intell.
automation in cybersecurity: Current and future prospects,’’ Ann. Data Transp. Syst., vol. 23, no. 3, p. 2888, Mar. 2022.
Sci., vol. 10, no. 6, pp. 1473–1498, Dec. 2023. [249] R. A. Mohammed and K. M. A. Alheeti, ‘‘Intrusion detection system for
[228] I. H. Sarker, ‘‘CyberLearning: Effectiveness analysis of machine learning healthcare based on convolutional neural networks,’’ in Proc. Iraqi Int.
security modeling to detect cyber-anomalies and multi-attacks,’’ Internet Conf. Commun. Inf. Technol. (IICCIT), Sep. 2022, pp. 216–221.
Things, vol. 14, Jun. 2021, Art. no. 100393. [250] D. Gil, M. Johnsson, H. Mora, and J. Szymański, ‘‘Review of the
[229] D. Alahakoon, R. Nawaratne, Y. Xu, D. De Silva, U. Sivarajah, and complexity of managing big data of the Internet of Things,’’ Complexity,
B. Gupta, ‘‘Self-building artificial intelligence and machine learning to vol. 2019, pp. 1–12, Feb. 2019.
empower big data analytics in smart cities,’’ Inf. Syst. Frontiers, vol. 25, [251] L. Datta, ‘‘A survey on activation functions and their relation with xavier
no. 1, pp. 221–240, Feb. 2023. and he normal initialization,’’ 2020, arXiv:2004.06632.
[252] V. Andrearczyk and P. F. Whelan, ‘‘Convolutional neural network on three [272] M. Adil, J. Ali, M. M. Jadoon, S. R. Alotaibi, N. Kumar, A. Farouk, and
orthogonal planes for dynamic texture classification,’’ Pattern Recognit., H. Song, ‘‘COVID-19: Secure healthcare Internet of Things networks,
vol. 76, pp. 36–49, Apr. 2018. current trends and challenges with future research directions,’’ ACM
[253] V. Sze, Y.-H. Chen, T.-J. Yang, and J. S. Emer, ‘‘Efficient processing Trans. Sensor Netw., vol. 19, no. 3, pp. 1–25, Aug. 2023.
of deep neural networks: A tutorial and survey,’’ Proc. IEEE, vol. 105, [273] S. Krishnamoorthy, A. Dua, and S. Gupta, ‘‘Role of emerging technolo-
no. 12, pp. 2295–2329, Dec. 2017. gies in future IoT-driven healthcare 4.0 technologies: A survey, current
[254] K. Khalil, O. Eldash, A. Kumar, and M. Bayoumi, ‘‘Designing challenges and future directions,’’ J. Ambient Intell. Humanized Comput.,
novel AAD pooling in hardware for a convolutional neural network vol. 14, no. 1, pp. 361–407, Jan. 2023.
accelerator,’’ IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 30, [274] F. Sallabi, F. Naeem, M. Awad, and K. Shuaib, ‘‘Managing IoT-based
no. 3, pp. 303–314, Mar. 2022. smart healthcare systems traffic with software defined networks,’’ in Proc.
[255] R. Nirthika, S. Manivannan, A. Ramanan, and R. Wang, ‘‘Pooling in Int. Symp. Netw., Comput. Commun. (ISNCC), Jun. 2018, pp. 1–6.
convolutional neural networks for medical image analysis: A survey and [275] J. H. Abawajy and M. M. Hassan, ‘‘Federated Internet of Things and
an empirical study,’’ Neural Comput. Appl., vol. 34, no. 7, pp. 5321–5347, cloud computing pervasive patient health monitoring system,’’ IEEE
Apr. 2022. Commun. Mag., vol. 55, no. 1, pp. 48–53, Jan. 2017.
[256] A. Sharma, S. Rani, S. H. Shah, R. Sharma, F. Yu, and M. M. Hassan, [276] R. Taheri, H. Ahmed, and E. Arslan, ‘‘Deep learning for the security of
‘‘An efficient hybrid deep learning model for denial of service detection software-defined networks: A review,’’ Cluster Comput., vol. 26, no. 5,
in cyber physical systems,’’ IEEE Trans. Netw. Sci. Eng., vol. 10, no. 5, pp. 3089–3112, Oct. 2023.
pp. 1–10, Sep./Oct. 2023. [277] H. Elubeyd and D. Yiltas-Kaplan, ‘‘Hybrid deep learning approach for
[257] N. Faruqui, M. A. Yousuf, M. Whaiduzzaman, A. Azad, S. A. Alyami, automatic DoS/DDoS attacks detection in software-defined networks,’’
P. Liò, M. A. Kabir, and M. A. Moni, ‘‘SafetyMed: A novel IoMT intru- Appl. Sci., vol. 13, no. 6, p. 3828, Mar. 2023.
sion detection system using CNN-LSTM hybridization,’’ Electronics, [278] M. Cicioglu and A. Çalhan, ‘‘A multiprotocol controller deployment in
vol. 12, no. 17, p. 3541, Aug. 2023. SDN-based IoMT architecture,’’ IEEE Internet Things J., vol. 9, no. 21,
[258] M. Hasan, M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, ‘‘Attack pp. 20833–20840, Nov. 2022.
and anomaly detection in IoT sensors in IoT sites using machine learning [279] V. Lakshminarayanan, A. Ravikumar, H. Sriraman, S. Alla, and
approaches,’’ Internet Things, vol. 7, Sep. 2019, Art. no. 100059. V. K. Chattu, ‘‘Health care equity through intelligent edge computing and
[259] R. Patgiri, H. Katari, R. Kumar, and D. Sharma, ‘‘Empirical study on augmented reality/virtual reality: A systematic review,’’ J. Multidisci-
malicious URL detection using machine learning,’’ in Proc. 15th Int. plinary Healthcare, vol. 16, pp. 2839–2859, Sep. 2023.
Conf. Distrib. Comput. Internet Technol. (ICDCIT), Bhubaneswar, India. [280] A. S. Ahmed and H. A. Salah, ‘‘Development a software defined network
Cham, Switzerland: Springer, Jan. 2019, pp. 380–388. (SDN) with Internet of Things (IoT) security for medical issues,’’ J. Al-
[260] J. Wang, H. Jin, J. Chen, J. Tan, and K. Zhong, ‘‘Anomaly detection in Qadisiyah Comput. Sci. Math., vol. 15, no. 3, p. 98, Sep. 2023.
Internet of Medical Things with blockchain from the perspective of deep
neural network,’’ Inf. Sci., vol. 617, pp. 133–149, Dec. 2022.
[261] S. Chaudhary, R. Kakkar, N. K. Jadav, A. Nair, R. Gupta, S. Tanwar,
S. Agrawal, M. D. Alshehri, R. Sharma, G. Sharma, and I. E. Davidson, MIRZA AKHI KHATUN (Member, IEEE)
‘‘A taxonomy on smart healthcare technologies: Security framework, case received the B.Sc. degree in computer science
study, and future directions,’’ J. Sensors, vol. 2022, pp. 1–30, Jul. 2022. and engineering and the M.Sc. degree in com-
[262] S. Rajendran, R. K. Panneerselvam, P. J. Kumar, V. A. Rajasekaran, puter science and engineering from Jagannath
P. Suganya, S. K. Mathivanan, and P. Jayagopal, ‘‘Prescreening and triage University, Bangladesh, focusing on Internet of
of COVID-19 patients through chest X-ray images using deep learning Things (IoT) security and machine learning,
model,’’ Big Data, vol. 11, no. 6, pp. 408–419, Dec. 2023. in 2019. She is currently pursuing the Ph.D. degree
[263] Z. Hau and E. C. Lupu, ‘‘Exploiting correlations to detect false data with the Department of Electronic and Computer
injections in low-density wireless sensor networks,’’ in Proc. 5th Cyber- Engineering, University of Limerick, Ireland. Her
Physical Syst. Secur. Workshop, Jul. 2019, pp. 1–12. ongoing research delves into the healthcare-IoT
[264] M. Begli, F. Derakhshan, and H. Karimipour, ‘‘A layered intrusion security and utilizing AI/ML innovations. She has an exemplary academic
detection system for critical infrastructure using machine learning,’’ in background, underscored by a scholarship from the Science Foundation
Proc. IEEE 7th Int. Conf. Smart Energy Grid Eng. (SEGE), Aug. 2019, Ireland Centre for Research Training in Foundations of Data Science
pp. 120–124. awarded, in 2022. During the master’s program, she secured the first position
[265] S. Sengan, O. I. Khalaf, V. P. Sagar, D. K. Sharma, A. L. J. Prabhu, and in her class. She has also published research papers at renowned IEEE
A. A. Hamad, ‘‘Secured and privacy-based IDS for healthcare systems on international conferences. Her research interests include the IoT, artificial
E-medical data using machine learning approach,’’ Int. J. Reliable Quality intelligence, machine learning, data analysis, network security, and systems
E-Healthcare, vol. 11, no. 3, pp. 1–11, Oct. 2021.
architecture. She is also reflecting her deep commitment to the professional
[266] Y. A. Qadri, A. Nauman, Y. B. Zikria, A. V. Vasilakos, and S. W. Kim,
community.
‘‘The future of healthcare Internet of Things: A survey of emerging tech-
nologies,’’ IEEE Commun. Surveys Tuts., vol. 22, no. 2, pp. 1121–1167,
2nd Quart., 2020.
[267] R. Sharma, ‘‘Software-defined networking for healthcare Internet of SANOBER FARHEEN MEMON (Member,
Things,’’ in Applications of Machine Learning in Big-Data Analytics IEEE) received the B.Eng. degree in electronic
and Cloud Computing. New York, NY, USA: River Publishers, 2022, engineering and the M.Eng. degree in electronic
pp. 231–247. systems engineering from the Mehran University
[268] P. Ajmani and P. Saigal, ‘‘5G and IoT for smart farming,’’ in Apply- of Engineering & Technology (MUET), Jamshoro,
ing Drone Technologies and Robotics for Agricultural Sustainability.
Pakistan, in 2010 and 2014, respectively, and
Hershey, PA, USA: IGI Global, 2023, pp. 124–139.
the Ph.D. degree in electronic and computer
[269] L. M. Broell, C. Hanshans, and D. Kimmerle, ‘‘IoT on an ESP32:
engineering from the University of Limerick,
Optimization methods regarding battery life and write speed to an SD-
card,’’ IntechOpen, Rijeka, Tech. Rep., 2023. Ireland, in 2023. She is currently a Researcher
[270] D. Gowda V, A. Sharma, B. K. Rao, R. Shankar, P. Sarma, A. Chaturvedi, on the OXI-SMART Project with the Optical
and N. Hussain, ‘‘Industrial quality healthcare services using Internet of Fibre Sensors Research Centre, Department of Electronic and Computer
Things and fog computing approach,’’ Measurement, Sensors, vol. 24, Engineering (ECE), UL. During the Ph.D. research, she developed
Dec. 2022, Art. no. 100517. plastic optical fiber sensors for in-situ and real-time ultra-low-level
[271] S. Sutradhar, S. Karforma, R. Bose, and S. Roy, ‘‘A dynamic step- ethanol concentration measurement in microalgal bioethanol production
wise tiny encryption algorithm with fruit fly optimization for quality of applications. She was with MUET, Pakistan, for more than three years as
service improvement in healthcare,’’ Healthcare Anal., vol. 3, Nov. 2023, a Faculty Member (a Lecturer and a Visiting Lecturer) and taught a variety
Art. no. 100177. of modules to the B.Eng. students. Her current research interests include
optical fiber sensors, medical sensors, photonics engineering, instrumenta- LUBNA LUXMI DHIRANI (Senior Member,
tion and measurement, and intelligent systems. She has received multiple IEEE) received the B.Eng. degree in computer
funding grants, including the European Union EM INTACT Doctorate systems, the M.Sc. degree in business informa-
Scholarship, UL Postgraduate Residential Scholarship, UL Funding & tion technology, and the Ph.D. degree in hybrid
ECE Departmental Funding, Merit Scholarship from MUET, and some cloud computing QoS and SLA-based issues in
international travel/conference participation grants. She is a member of heterogenous cloud environment. She is currently
IEEE WIE, IEEE Photonics Society, IEEE Instrumentation & Measurement an Assistant Professor with Department of Elec-
Society, and SPIE. tronic and Computer Engineering, University of
Limerick. She is also the Course Director of the
B.Sc. Cybersecurity Practitioner Apprenticeship
Program. She is also the first WIE Ambassador from Ireland in the IEEE
WIE (U.K.&I Section) and a member of the National Standards Authority of
CIARÁN EISING (Senior Member, IEEE) Ireland (NSAI). She has worked on interdisciplinary, industry-based projects
received the B.E. degree in electronic and securing machine-to-machine communications in industry 4.0, V2I safety
computer engineering and the Ph.D. degree from and security, and digital healthcare. Her publications are listed at: Google
NUI Galway, in 2003 and 2010, respectively. Scholar, she has delivered more than 35 technical workshops, tutorials,
From 2009 to 2020, he was a Computer Vision masterclasses, panel, and keynote speeches at international conferences
Architect Senior Expert with Valeo. In 2020, and platforms. Her research interests include cybersecurity, privacy, data
he joined the University of Limerick as an governance, risk, cyber law, regulations, the IIoT, IT/OT, and cloud and
Associate Professor in AI. security standards.