Nothing Special   »   [go: up one dir, main page]

skip to main content
survey
Open access

A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare

Published: 28 March 2023 Publication History

Abstract

Currently, healthcare is critical environment in our society, which attracts attention to malicious activities and has caused an important number of damaging attacks. In parallel, the recent advancements in technologies, computing systems, and wireless communications are changing healthcare environment by adding different improvements and complexity to it. This article reviews the current state of the literature and provides a holistic view of cybersecurity in healthcare. With this purpose in mind, the article enumerates the main stakeholders and architecture implemented in the healthcare environment, as well as the main security issues (threats, attacks, etc.) produced in healthcare. In this context, this work maps the threats collected with a widely used knowledge-based framework, MITRE ATT&CK, building a contribution not seen so far. This article also enumerates the security mechanisms created to protect healthcare, identifying the principal research lines addressed in the literature, and listing the available public security-focused datasets used in machine-learning to provide security in the medical domain. To conclude, the research challenges that need to be addressed for future research works in this area are presented.

1 Introduction

Lately, the healthcare environment is experimenting an evolution with regard to new technologies and advances incorporated to this field, mainly with the adoption of Internet of Things (IoT) [115], Big data [135], and Blockchain [91] technologies. The implantation of these technologies is allowing healthcare to improve all processes by achieving new purposes not addressed so far, e.g., a new technology called “Tactile Internet” with 5G technology can enable surgeons to perform surgeries with patients in remote locations [47]. At once, different types of sensors and technologies are incorporated in this environment, such as implantable and wearable medical devices (IWMDs), Internet of Medical Things (IoMT), wireless medical sensor networks (WMSNs), and body area networks (BANs), among others. Its growing penetration has improved the functionality and the capacity of supervising the patient health, but at the same time, it has extensively expanded the complexity of this environment.
Thanks to this diversity, technological requirements acquire further complexity in this scenario, but more than ever two dimensions take major importance: security and privacy. The requirements of these dimensions are increasing complexity and hampering the management and control of new scenarios that are appearing in healthcare, due to the information and technologies coordinating these systems. This environment is one of the most affected sectors by security and privacy issues, with attacks like electromagnetic inferences to medical devices and sensor spoofing [108]. Indeed, new news are published every day about different cyber-attacks addressed to hospitals [43, 122], such as in [122] where in the Southern California Hospital, the hospital system functioning was interrupted for days or the attack focused on two French hospitals, where the “Ryuk” ransomware [110] forced the transfer of some patients to other facilities [43]. However, medical sector tends to be reticent when it comes in the reporting of the types attacks (and their details) suffered.
If we focus on medical devices, IoT is the technology more adopted in this field. However, IoT definition encompasses many families/types of devices, and it is not an appropriate term to identify the devices implemented in the healthcare environment. For this reason, IWMD and IoMT, deployed mainly in WMSN and BAN networks, are the subfamilies created to reference the devices belonging to the medical field. In general, the adoption of IoT in medical domain has produced new use cases, such as implanted glucose sensors with the automatic injection of insulin and patients with Parkinson where sensors control how their symptoms change through the day. Besides, IWMD/IoMT has incorporated new characteristics, such as remote monitoring and medical data accessibility. However, the use of IoT introduces some deficiencies in healthcare, such as integration issues with the ecosystem, risk of failure, and security/privacy issues [69]. This latter coincides with the characteristics commented above, the security and privacy in this scenario relies heavily on the technology used by complicating the relations between devices, data and operations. In privacy-specific domain, the United States and the European Union have proposed the regulations Healthcare Insurance Portability and Accountability Act (HIPAA) [55] and General Data Protection Regulation (GDPR) [37], respectively, to manage and store personal data with privacy-preserving methods.
On the other hand, healthcare contains another characteristic that contributes to further increase the difficulty to meet with current requirements of this scenario: the patient safety. This concern is gaining importance over the years due to certain attacks, such as the ones performed to IWMDs (infusion pumps, pacemakers, etc.), which have the potential to cause negative effects and adverse outcomes for patients [26]. In this sense, several official regulations by different countries and continents, such as Federal Drug Administration [150], Medical Device Directive [39], Medical Device Regulation [146], and European Medicines Agency [38], have created a legal framework to categorize medical devices and operations with a certain risk in levels, allowing the classification of themselves. Therefore, the need of protecting the healthcare environment is positioned as a top priority target. Concluding this introduction, the purpose, contributions and structure of this work are presented below.

1.1 Scope and Motivation

Our research work consists of complementing and improving the work already performed in healthcare (presented in many surveys below) paying special attention to security and privacy issues, with the intention of providing a comprehensive knowledge base of security and privacy on healthcare for the future researchers and professionals who are and will be working in this field.
Besides, there are some other motivations to perform this review. First, the healthcare environment, which is key for people’s well-being, is one of the most affected sectors by malicious attacks. Therefore, there is a need to address research efforts to improve and protect this critical scenario. Second, the existing literature mainly discusses the different threats and security mechanisms. However, the security and privacy requirements, together with the importance of patient safety, need to be enumerated and explained thoroughly. Third, there is a lack of research on the overall healthcare architecture, which identifies the main stakeholders and the main components/technologies implied in the scenario. Fourth, the datasets enumeration for artificial intelligence-based mechanisms is a task not incorporated properly in the literature. Therefore, we decided to address it in this survey. Fifth, some research works present threat taxonomies identified in the healthcare environment, but we identify a lack of discussing the formal alignment of such threats with a widely used threat framework, promoting compatibility and interoperability with other related projects.

1.2 Contributions

Our contribution aims to provide a comprehensive review of the state-of-the-art on security and privacy issues in healthcare, in terms of technologies and stakeholders collection, threats and attacks enumeration, and existing security mechanisms in this environment. To this end, we describe the overall healthcare architecture, its main stakeholders, its components and technologies involved. We show the security, privacy, and safety requirements to be included in the following steps of the research work, allowing the correct incorporation of them in future implementations in this scenario. We also identify the threats addressed to this field, and the possible security mechanisms that can be implemented on it. In this regard, we conduct the study of related work searching strengths and limitations of the existing research, the creation of a threat taxonomy aligned with a reference framework to provide scalability and compatibility with other related projects. Moreover, we discuss the existing security mechanisms focusing on possible artificial intelligence techniques with the enumeration and introduction of available datasets to work in this environment.

1.3 Methodology

To conduct this survey, a qualitative methodology is implemented to analyze and synthesize the existing reviews in the literature. We identified the main requirements, threats, attacks, objectives, challenges, and limitations belonging to the healthcare environment. The methodology followed was: first, to collect the different works, the main scientific databases and publishers (Web of Science, Google Scholar, Scopus, PubMed, Elsevier, IEEE, ACM, arXiv, and Springer) were inspected starting from 2010 (to get the latest information) and using different keywords relevant for healthcare in each database and publisher; to filter the interesting articles (works with relevant content, such as threats or security mechanisms on healthcare); to inspect and eliminate works with limited information; and to classify all articles in different thematics and sections included in this survey. The search is performed doing groups of keywords and creating combinations between them. The first group contains Threats, Security, IoT/IoMT/IWMD, Attacks, Privacy, Protection, and Safety. The second group has Healthcare, Medical and Health keywords, and the third group is composed of Domain/Field, Devices, Architecture, Survey, Mechanisms, and Environment. Each search is composed of one keyword of each group applying an OR function.

1.4 Organization and Reading Map

This article is organized as follows. Section 2 presents the healthcare ecosystem, stakeholders, and technologies used in this environment. Section 3 analyzes the related work. Section 4 shows the security, privacy, and safety requirements collected for medical domain. Section 5 includes the threat classification, mapping the threats identified with a widely accepted framework and attack enumeration. Section 6 covers the existing security mechanisms and datasets collection for artificial intelligence methods. Section 7 provides a discussion of the challenges and future work, and finally, we conclude in Section 8.

2 Healthcare Ecosystem and Main Stakeholders

In this section, we show the healthcare overall scenario providing a clear view of this environment. Due to the increase in cyber-attacks focused on healthcare environment, as well as the importance of this scenario in the society, we highlight the need of working to improve in security terms, technologies, communications, configurations, and so on, operating in such a scenario. Regarding this, Fig. 1 presents the overall architecture where appear the different elements, technologies and stakeholders that compose the healthcare ecosystem.
Fig. 1.
Fig. 1. Healthcare overall scenario.
Starting with stakeholders, Beinke et al. [15] proposed that the stakeholders in healthcare can be divided into three groups: Primary, Secondary, and Tertiary stakeholders. Such classification stems from the existing relation with the use and processing of Electronic Health Records (EHR), the patients’ complete treatment history that each stakeholder performs with them in healthcare. In the primary group, people, devices, and assets that are direct processors of EHRs are assigned, such as physicians, nurses, pharmacists, laboratories and patients. In the second group, indirect factors are taken into account, for instance, if EHRs are corrupted or lost, legal elements such as insurances have an important role. Here, stakeholders like insurances, families, and healthcare employers (cleaners, maintenance staff, etc.) appear. Finally, the third group includes organizations and people that may have an impact in the healthcare environment, such as research institutes, public authorities and healthcare industry.
All these stakeholders interact in healthcare ecosystem (Fig. 1) into different locations: patient body, IoMT edge network, and central healthcare infrastructure. Each location is defined by different characteristics, technologies and stakeholders implied. Next, we describe, for each stakeholder, its role in the ecosystem.

2.1 Patient Body

The patient body incorporates Implanted and Wearable Medical Devices (IWMD), i.e., the implanted and wearable devices used to track the physical wellness and monitor the patient health status. Here, the main stakeholder is the patient since it places all available sensors. These implanted and non-implanted devices have been classified by different official organizations, where we can find Federal Drug Administration (FDA) as the US representative and European Medicines Agency (EMA) as the EU one. FDA groups devices in each of 19 specified medical specialties (Haematology, Chemistry, Dental, Radiology, etc.), registered in the FDA’s database of Manufacturer and User Facility Device Experiences (MAUDE) [12]. By other hand, the EU classifies devices by several characteristics, such as duration of use, implanted use, and system where the device is installed. These characteristics are taken by Aronson et al. [12] to create a device classification with three main categories: Site of application, Time scale to use, and Power source, which are related to the risk of harms that devices can cause. In Fig. 1, we enumerate some of the existing medical devices implanted and non-implanted in human body, such as Blood Pressure sensor, Body Temperature sensor and Accelerometer [112]. These devices telemetrise the patient (monitor the patient health) by communicating with an external device, called “Programmer” or “Reader”. There are different standards that regulate telemetry for medical devices [8]:
Wireless Medical Telemetry Services (WMTS) specification: standard defined by the Federal Communications Commission (FCC) in US. This is a spectrum and it is only used in US territory.
Medical Implant Communication System (MICS) specification: standard created for radio communications between implanted devices and programmers. Devices using MICS have 2 meters as communication range and low bandwidth.
Medical Device Radiocommunications Service (MedRadio): standard approved by the FCC in 2009 and used for implanted and wearable devices. This specification can be used internationally and allow devices to transmit signals easily through human body.
By other hand, the communication between wearable and implanted medical devices and programmer/smartphone is performed with different technologies (wireless short-range and wired), which mainly are Zigbee, Bluetooth, Bluetooth Low Energy (BLE), IEEE 802.11, IEEE 802.11ah and IEEE 802.3 [157].

2.2 IoMT Edge Network

The IoMT edge network (Fig. 1) comprises the technologies and devices designated outside of patient body, in a near location. In this location, patient is the main stakeholder, but other primary stakeholders appear, such as nurses and doctors, who can monitor and access patient data remotely or on-site. At device level, we find devices with programmer or reader capabilities (smartphones, edge servers, and smart home devices). The communication IWMD/programmer is produced with the technologies/protocols already commented, and the main difference between human body and IoMT edge network location is the ability to collect and process patient information and end results achieved. Due to processing capability, different applications and functions can be created.
As an example for better understanding, let us suppose a cardio health monitoring application, where may be used an electro cardio graph sensor and a photo plethysmography sensor. This application needs real-time response because of an anomaly detected in the cardio graph can be fatal for the patient’s health. Therefore, the sensors must be connected to a gateway like a smartphone, where the data are interpreted, processed, and transmitted in real time to the entities responsible for acting accordingly with the information produced by sensors. Taking this example as a reference, data processing can follow two different approaches [127]:
Data fusion. Smart sensors read the raw sensory data and transmit this information to the gateway where the decision is taken. In this case, the sensors act as data transmitters without intelligence.
Decision fusion. Smart sensors obtain the raw sensory data (voltage, light absorption, etc.) and process locally this information according to a criterion, such as abnormal heartbeat rate and glucose level.

2.3 Central Healthcare Infrastructure (CHI)

After data processing, the information is shared with the another location identified above: the central healthcare infrastructure. This communication is performed through wireless or wired communication (LTE, Fibber Optic).
In this CHI, we identify stakeholders belonging to three groups, from primary to tertiary stakeholders. Primary stakeholders have complete access to the data obtained from lower locations, and much more information created in places like hospitals, the central facilities of healthcare ecosystem. By other hand, secondary and tertiary stakeholders produce changes direct and indirectly in stored data, processes and procedures inside of healthcare. With all data available in the central healthcare infrastructure, primary stakeholders are responsible for processing and acting consequently as a way of providing optimal treatment and monitoring for patients.
The central healthcare domain includes the different technologies, regulations, and characteristics shown at the top left of Fig. 1, such as EHR [32], Cloud Computing, Policies (HIPAA, MDR, etc.) [55, 157], Healthcare Applications, Machine-Learning, Software Defined Networks (SDN), Telemedicine [115], Big Data, and Blockchain. These technologies provide intelligence or new characteristics to healthcare scenario managing and processing all patient-related information.

3 Related Work

The literature has covered the healthcare environment for years, specially in recent ones. Within this field, we analyse the main results and contributions of works covering security and privacy issues aiming at identifying the strengths of this research, and pointing out the limitations and the key aspects not contemplated so far.
In Table 1, we show these reviews and, for each work, we indicate: its publication year, the approach followed (MD-focused or Infrastructure-focused), if it covers different security key aspects in healthcare (requirements, architecture, attacks, and mechanisms), whether it presents a threat taxonomy or uses a threat modelling framework (STRIDE [98] or MITRE ATT&CK [147]), and if it deals with safety and privacy issues. We made this classification to provide, in the best possible way, the relevant aspects addressed for our survey. In Table 1, the symbol “\(\checkmark\)” denotes that the issues are covered and the “-” that the issue is not covered by the article.
Table 1.
Ref.YearApproachSecurityThreatsSafetyPrivacy
MDInfrastructureReq.Arch.Att.Mech.Tax.Align.
[111]2010\(\checkmark\)--\(\checkmark\)-\(\checkmark\)----
[10]2010-\(\checkmark\)--\(\checkmark\)\(\checkmark\)--\(\checkmark\)\(\checkmark\)
[2]2012\(\checkmark\)-\(\checkmark\)\(\checkmark\)\(\checkmark\)\(\checkmark\)---\(\checkmark\)
[35]2014\(\checkmark\)--\(\checkmark\)\(\checkmark\)\(\checkmark\)----
[124]2014\(\checkmark\)-\(\checkmark\)-\(\checkmark\)\(\checkmark\)\(\checkmark\)-\(\checkmark\)\(\checkmark\)
[159]2014\(\checkmark\)-\(\checkmark\)-\(\checkmark\)\(\checkmark\)\(\checkmark\)-\(\checkmark\)\(\checkmark\)
[19]2015\(\checkmark\)-\(\checkmark\)-\(\checkmark\)\(\checkmark\)-\(\checkmark\)-\(\checkmark\)
[73]2015\(\checkmark\)-\(\checkmark\)-\(\checkmark\)\(\checkmark\)\(\checkmark\)-\(\checkmark\)-
[129]2015\(\checkmark\)-\(\checkmark\)-----\(\checkmark\)-
[63]2015\(\checkmark\)-\(\checkmark\)\(\checkmark\)--\(\checkmark\)---
[8]2016\(\checkmark\)-\(\checkmark\)-\(\checkmark\)-\(\checkmark\)-\(\checkmark\)-
[29]2016-\(\checkmark\)---\(\checkmark\)----
[118]2017\(\checkmark\)-\(\checkmark\)-\(\checkmark\)\(\checkmark\)----
[76]2017\(\checkmark\)\(\checkmark\)--\(\checkmark\)-----
[28]2017\(\checkmark\)-\(\checkmark\)\(\checkmark\)\(\checkmark\)-\(\checkmark\)--\(\checkmark\)
[87]2017-\(\checkmark\)\(\checkmark\)\(\checkmark\)\(\checkmark\)\(\checkmark\)---\(\checkmark\)
[114]2018\(\checkmark\)---\(\checkmark\)\(\checkmark\)----
[40]2018-\(\checkmark\)--\(\checkmark\)\(\checkmark\)----
[22]2018\(\checkmark\)---\(\checkmark\)\(\checkmark\)--\(\checkmark\)\(\checkmark\)
[34]2018\(\checkmark\)---\(\checkmark\)-\(\checkmark\)---
[106]2019\(\checkmark\)---\(\checkmark\)\(\checkmark\)----
[48]2019\(\checkmark\)\(\checkmark\)\(\checkmark\)-\(\checkmark\)\(\checkmark\)---\(\checkmark\)
[119]2019-\(\checkmark\)\(\checkmark\)-\(\checkmark\)\(\checkmark\)\(\checkmark\)-\(\checkmark\)\(\checkmark\)
[157]2019\(\checkmark\)--\(\checkmark\)\(\checkmark\)\(\checkmark\)--\(\checkmark\)\(\checkmark\)
[3]2019-\(\checkmark\)\(\checkmark\)-\(\checkmark\)\(\checkmark\)---\(\checkmark\)
[9]2019\(\checkmark\)-\(\checkmark\)-\(\checkmark\)----\(\checkmark\)
[107]2019\(\checkmark\)-\(\checkmark\)-------
[17]2020-\(\checkmark\)--\(\checkmark\)\(\checkmark\)----
[158]2020\(\checkmark\)---\(\checkmark\)-----
[52]2020-\(\checkmark\)\(\checkmark\)\(\checkmark\)-\(\checkmark\)---\(\checkmark\)
[128]2020\(\checkmark\)-\(\checkmark\)\(\checkmark\)\(\checkmark\)\(\checkmark\)---\(\checkmark\)
[108]2021\(\checkmark\)\(\checkmark\)\(\checkmark\)-\(\checkmark\)\(\checkmark\)\(\checkmark\)-\(\checkmark\)\(\checkmark\)
[93]2021\(\checkmark\)---\(\checkmark\)-----
[139]2021-\(\checkmark\)---\(\checkmark\)---\(\checkmark\)
[84]2021-\(\checkmark\)---\(\checkmark\)---\(\checkmark\)
[112]2022\(\checkmark\)-\(\checkmark\)-\(\checkmark\)\(\checkmark\)\(\checkmark\)--\(\checkmark\)
[71]2022\(\checkmark\)-\(\checkmark\)--\(\checkmark\)--\(\checkmark\)\(\checkmark\)
[42]2022-\(\checkmark\)---\(\checkmark\)--\(\checkmark\)\(\checkmark\)
Total out of 38271421928281011222
Table 1. Features Compared with Different Reviews
Where MD = Medical Devices, Req. = Requirements, Arch. = Architecture, Att. = Attacks, Mech. = Mechanisms, Tax. = Taxonomy, and Align. = Alignment.
From data in Table 1, Fig. 2 shows that the number of surveys has grown in recent years, as healthcare awareness has increased. Besides, Fig. 2 depicts different lines for the privacy, threat taxonomy, and security mechanisms columns of Table 1. As shown, since 2010 the research has experimented a growth. This is due to the innovations and advances produced each year in healthcare which produce important changes in the ecosystem [115]. We can also observe that the majority of surveys are MD-focused, since the healthcare ecosystem relies heavily on the devices appearing on it. The last line presented in Table 1 includes the count of “\(\checkmark\)” appeared per column, showing graphically the issues (attacks, privacy, safety, etc.) most discussed in the literature so far.
Fig. 2.
Fig. 2. Number of publications focused on surveys, privacy, threat taxonomy, and security mechanisms by year.
First, we can conclude that the threats/attacks and protection mechanisms are the issues most addressed in the literature. On the other hand, we expect more effort in the creation of threat taxonomy (focused on healthcare) since only one review [19] performs this threat modeling. Besides, we identify a lack of research in the safety topic (see Section 4.3) and the healthcare architecture/ecosystem definition (see Section 2). Finally, we detect that no survey addresses with scientific rigour all columns indicated in Table 1, while our work develops all topics. Next, we present the main results allocated in the most interesting reviews, available in Table 1.

3.1 Literature Review

This revision of related works is mainly concentrated on detecting the security and privacy issues discovered in the literature and the most common security mechanisms chosen for protecting the healthcare domain. After analysing the literature, we classify the research works into two families: IMD/IWMD/IoMT-focused and infrastructure-focused, being most of the works classified in the first family.
To begin with, Nasiri et al. [107] studied the importance of cyber resilience concept, obtaining multiple security requirements (Reliability, Reparability, etc.) appeared thanks to the application of this property in IoMT. Besides, Sametinger et al. [129] classified medical devices into four security levels (Low, Medium, High, and Very high) in function of the risk associated to the sensitive information processed by device or the critical task performed by it. In privacy terms, Saleh et al.’s work [128] presents a complete view of the privacy for WMSN on healthcare, showing requirements, applications, privacy and security services implemented in WMSN (SATIRE [44], MeDiSN [74]), attacks, countermeasures, and so on. Regarding WMSNs, Al Ameen et al. [2] compared BANs and WMSNs and highlighted the security and privacy issues of these networks in healthcare.
With respect to security attacks, the majority of works [22, 34, 35, 106, 118, 124, 159] referred to attacks addressed to medical devices (IMD, IWMD, and IoMT), mainly classifying them in three types referring to the layer attacked: application layer (malware attack, software attacks), network layer (man-in-the-middle attack, eavesdropping, denial of service—DoS—attack, spoofing attack) and perception layer (physical attack, RFID sniffing/spoofing). Kumar [76] performed a review of cyber-attacks in the healthcare industry and emphasised the importance of protecting this environment indicating real examples of vulnerabilities found in medical devices.
Islam et al. [63] enumerated different IoT healthcare networks as well as a collaborative security model for IoT-based healthcare, which was composed of three security services: protection services, detection services, and reaction services. In this context, Altawy and Youssef [8] introduced the Cyber Physical Systems (physical systems where their operation requires advanced connectivity and computation) identifying threats, security properties and explaining IMDs as a use case in this scenario. Rathore et al. [118] proposed different security mechanisms to prevent and react against these attacks, divided them into categories, such as biometric-based approaches, distance-based approaches, key management protocols, audit mechanisms, anomaly detection, and external device methodologies. On the other hand, Nanayakkara et al. [106] performed a statistic study about the different security mechanisms named in the literature and obtained that identification, authentication and authorization mechanisms are the ones that appear the most in the works published.
Kagita et al. [71] and Flowerday and Christos [42] addressed recent studies focused on security and privacy problems, tendencies and mechanisms to protect medical devices and environment itself. Camara et al. [19] presented different operation modes, security properties, an adversarial approach, limitations, and security mechanisms for them. Furthermore, this work categorizes threats against the IMD using the STRIDE [98] methodology, comparing the six categories provided by STRIDE with the threats presented for IMD. Appari and Johnson [10] performed a complete review about security and privacy in healthcare, showing many different researches and tendencies in those years, which have been developed in future works to the present day. Otherwise, we can highlight Yaqoob et al. [157] and Papaioannou et al. [112]’s surveys. Yaqoob et al. [157] made a review of networked medical devices with regulations, attack vectors, protocols, classification, architecture, and so on. This work also offered safety and privacy knowledge and examples where the official regulations have not been enforced. Papaioannou et al. [112] created a complete threat taxonomy (due to the amount of threats presented) not seen so far, taking as main categories the security requirements extracted in this survey, and showing examples of attacks in the final parts of the taxonomy.
Manogaran et al. [87]’s work concentrated on Big Data for Smart Healthcare Industry, describing architecture, communications, security and privacy requirements, threats, challenges and open research issues. In this case, the authors also proposed an architecture to use Big Data in conjunction with Industry 4.0 characteristics to protect the healthcare environment. Fatima and Colomo-Palacios [40] studied the Healthcare Information System (HIS) making a complete research work in the literature and obtaining answers like the most cited guidelines/regulations for data security in HIS, and the most reported security incidents/threats/security measures. Razaque et al. [119] conducted their study taking as reference the flow information inside of medical domain, and extracted the main attacks (Password Intrusion, Denial of Service, Dropbear SSH Server, etc.) produced in healthcare with an excellent analysis of possible security mechanisms to be applied in order to protect from them, as well as the presentation of different security architectures addressed in the literature.
Bhuyan et al. [17] incorporated as new content not seen so far, the enumeration of main stakeholders involved in the cyber-attacks produced on healthcare: cyber-attackers, cyber-defenders, end users, and developers. Hathaliya and Tanwar [52] created an exhaustive survey on security and privacy issues in Healthcare 4.0, which is considered the new era of healthcare with the incorporation of technologies such as IoT and telehealthcare. This work covered several security and privacy requirements, a taxonomy with security and privacy solutions, and performed different state-of-the-art security schemes based on mechanisms such as processing-based, machine learning based, wearable devices, IoT and telehealthcare, policies and standards, authentication, and network or traffic. Singh et al. [139] conducted a survey about healthcare data, explaining firstly the Smart Healthcare with the main applications and characteristic listed. After this, the review was focused on issues and the existing security techniques for healthcare data, dividing them into cryptography-based, biometrics-based, and watermarking-based (offer copyright protection and content authentication) types.
To conclude, Newaz et al. [108] is one of the best research works performed in the literature about healthcare, due to the amount of information collected and the topics addressed. This article presented security and privacy requirements, an attack model with the attacker goals, attacker capabilities and attack types, and divides the main attacks focused on healthcare into five categories (Software, Hardware, System-level, Side-channel, and Communication channel). Thus, Newaz et al. evaluated the attacks with different vulnerability metrics (attack approach, attack complexity, privilege requirement, and user cooperation), and extracted the target medical devices (invasive devices, therapeutic devices, etc.) and specific components (sensor, device, data, healthcare provider, etc.). The authors deeply explain all attacks and provide an extensive review about the existing security and privacy solutions for healthcare devices and applications. Finally, Pantelopoulos and Bourbakis [111] presented a review of a wearable health-monitoring system that was used ten years later by Newaz et al. This relation highlights the importance of Pantelopoulos’ work conducted in 2010.

3.2 Limitations and Differences from Previous Surveys

The main surveys performed about the healthcare sector have been analysed. Thanks to this analysis, we have obtained a holistic view of the previous literature. Next, we present below the limitations observed and the main differences with our proposal to enhance the current situation of this scenario. First, we note that the overall vision of healthcare ecosystem with the main stakeholders has not been addressed, only special and concrete scenarios have been explained, such as the one explored in [17]. For this reason, we presented the holistic scenario in Section 2 where all stakeholders and technologies implied in the healthcare environment are presented.
Second, we detect a lack of using threat modelling [144], consisting of identifying threats in healthcare in a targeted manner, with frameworks or knowledge bases in terms of threats and attacks, such as STRIDE [98] or MITRE ATT&CK [147]. Camara et al.’s [19] work is the unique one that performs a threat modelling with the STRIDE methodology. In our work, we incorporate the threat modelling through MITRE ATT&CK, a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. We add this mechanism to healthcare in order to provide compatibility and a reference framework to compare different related works, as well as a possible automation in the threat modelling with the tools available in the framework.
Third, Newaz et al. [108] and Hathaliya and Tanwar [52] show the existing security mechanisms with considerable detail and enumerating different types of mechanisms, but we have detected an issue not yet covered: the search, enumeration and categorisation of existing datasets encompassed in the healthcare environment. Resolving this issue, new applications and solutions can be created with less effort since we will have a knowledge base about the existing tools to work with machine and deep learning on healthcare. For this reason, we address this issue in Section 6. Finally, our work provides the necessary knowledge base, in terms of security and privacy, to continue with the research in the medical environment.

4 Security, Privacy, and Safety On Healthcare Environment

The security, privacy, and safety properties in a healthcare context are changing and new requirements have appeared in recent years. These properties and requirements are analyzed into detail in Section 4.1. Next, we review the current privacy requirements discovered in terms of the data criticality in Section 4.2. Finally, we discuss about the safety topic in Section 4.3, since the security issues produced in this environment can directly affect to the people wellness.

4.1 Security Requirements on Healthcare

In the literature, the security requirements in healthcare have been extensively discussed. However, usually these requirements are the Confidentiality-Integrity-Availability (CIA) triad [28, 48, 63, 108, 112, 124, 159], a traditional approach that defines the basic principles of the information security. These principles can be described as follows, when the healthcare environment is concerned:
Confidentiality. In healthcare context, we can highlight the patient confidentiality, since the data managed and allocated are very sensitive and can directly affect to the patient security and health [14]. Apart from this, confidentiality should apply to all processes and systems in the healthcare environment. This requirement can be compromised with different attacks, such as eavesdropping and man-in-the-middle (shown in Section 5), which can intercept the medical device communications [108].
Integrity. This property takes a relevant importance in healthcare environment due to the criticality of the data managed. For instance, the medical record of a patient with information changed can suppose a major threat to human health, thus making the person to undergo an operation without the necessary problems. Two examples of threats that can affect to the integrity requirement are hardware trojans and impersonation, which can compromise medical devices [108].
Availability. In the healthcare environment, having access to the specific data or system can be a determining factor for the patient health at given times. Such a need arises, for example, when the patient must be immediately medicated with a specific treatment and the personal information or specific medical process (allergies, physical problems, etc.) is deemed for such task. In this sense, ransomware is a widely used attack to attempt against this requirement, which obliges a payment to recover the systems [108].
Apart from these, others can be identified in the literature. These requirements define the properties that medical devices and systems, defined by the type of devices and information processed, must meet to provide a correct behaviour and avoid misconduct or associated threats:
Identification. It defends the need of assigning a value in terms of identifying the entities that require the data [48, 107]. To implement this requirement, mechanisms like fingerprinting [99, 131] can be used to tackle the problem of identifying heterogeneous devices used in healthcare.
Authentication. This requirement related to identification verifies that entities with an identifier valid users inside of healthcare [63, 107, 108, 112]. In this sense, Newaz et al. [108] presented different considerations to address this requirement: environment considerations, single vs multi-factor authentication, continuous authentication, and emergency considerations. All of them aim at improving the authentication in this context, where the authentication schemes become more complex due to the increasing heterogeneity in devices, protocols and data [120, 155].
Authorization. When an authentication process is successful, each user receives different rights or permissions in terms of possibilities that such user can perform in the healthcare environment [48, 63, 107, 112]. For instance, a user can access to specific IoT device while the rest of users have their access denied.
Accountability. It is a strong requirement for medical devices [107, 118]. Its purpose consists of keeping devices answerable and responsible for their actions. They must store logs to track device activity and linking the data to the devices. This requirement also applies to the entire healthcare environment where it is important to have records of all activities performed by individual or organizational entities.
Non-repudiation. This security requirement prevents an entity from denying previous commitments or actions in an interaction [63, 107, 108, 112]. For instance, it allows us to demonstrate that such footprints have been performed by an attacker. This requirement is a consequent of applying correctly the accountability requirement, since the logs are managed in a secure and immutable way. To achieve this, different technologies like Blockchain can be used [81].
Reliability. It is defined in [159] as the medical device’s property of functions correctly ever under extreme environmental conditions. This requirement is deeply addressed in [73], which enumerates different reliability issues for medical devices, such as hardware failures, software reliability, radio frequency reliability, and human reliability.
Resiliency. Islam et al. [63] defined resiliency as “If some interconnected health devices are compromised, then a security scheme should still protect the network/device/information from any attack.” In a complex scenario as healthcare, the correct implementation of this requirement can determine the protection of the entire infrastructure against a critical failure.
Fault tolerance. In [63], it is defined as the offering of security services (provided by a security scheme) even in the presence of a fault. Resiliency and fault tolerance can be selected as important characteristics that a protection system in the medical domain should implement.
Robustness. It is a consequence of the three previous requirements. Robustness is defined in [118] as the property of handling different situations, such as emergency circumstances or other abnormal situations. In the literature, robustness is addressed, for instance, in [130], where a new biometrics-based key establishment protocol is created in Wireless Body Area Networks (WBAN) to improve robustness.

4.2 Privacy Requirements on Healthcare

Personal data are created and managed all the time due to the use of Internet and the human interaction with smart devices. Therefore, it is key the correct treatment of this information to prevent a potential privacy issues against the individual who owns the information. Thus, data privacy protection should be considered as a measure to be applied by default (privacy by default) and from the design of the solutions (privacy by design). In data privacy term, personal data treatment takes relevant grade of importance in healthcare. This concern conducts the correct management of data allocated in this environment, since the medical records are understood as sensitive data (e.g., in GDPR European regulation explained above [140]). For this reason, different government/regulatory entities address data privacy with the creation of regulations with the aim of ensuring the secure use, control and management of personal data, and for protecting citizen’s rights. In the US context, HIPAA provides the regulation for the privacy and security of Protected Health Information (PHI) [55]. This compliance offers different rules, such as security rules, privacy rules, breach notification rules, omnibus rules, and enforcement rules to provide a complete view of the data privacy management with the medical information.
On the other hand, the GDPR, which is the European regulation for processing personal data [37], is composed of different articles that regulate management and storage of personal data. Seven principles are given in GDPR, but one of them takes importance in healthcare, the privacy by design [104]. This principle has been addressed in the literature in recent years, highlighting the research performed in [134]. This work analyses the current situation of privacy by design in the healthcare sector, and defines it as “a process based on proactively embedding good privacy practices into the design and operation of IT systems, physical infrastructure, and business practices.” This work presents the seven principles of privacy by design that are Proactive not Reactive, Preventive not Remedial; Privacy as the Default; Privacy Embedded into Design; Full Functionality - Positive-Sum not Zero-Sum; End to End Security—Lifecycle Protection; Visibility and Transparency; and Respect for User Privacy. These principles are defined by Semantha et al. [134] as assumptions, which need tools to apply the eight established strategies: minimise, hide, separate, aggregate, inform, control, enforce, and demonstrate. The correct incorporation of these principles allows IT systems to be privacy friendly, and at last instance, the deployment of a privacy impact assessment and security incident management produces a complete privacy by design implementation lifecycle.
Following the international regulations, as for privacy terms, there are two approaches to manage healthcare data: data-centric and user-centric. The data-centric approach usually selects service providers as stakeholders in charge of managing the data lifecycle, transmission, and so on, while the user-centric approach offers the right and ownership to the user who generated the data. This second approach allows users to manage access control to data by preventing unauthorised access [67], as well as to comply with the HIPAA and GDPR principles explained above in a more user-friendly way.
To conclude the privacy overview in healthcare, the privacy topic has been addressed in the literature [9, 28, 48, 52, 108, 124, 128, 159] for years and various privacy requirements have been identified inside of medical scope:
Device privacy. Rushanan et al. work was [124] one of the first research works (2014) where privacy requirements were addressed. Rushanan et al. [124] divided the requirements into device characteristics that should not be discovered and modified by attackers. They proposed the device-existence, type, ID, logs, bearer information, and tracking. This work supposes an advance in this field knowing the date of the research.
Anonymity. It can be defined as the property of masquerading the information to hide the identity of the author, owner or creator of the data, as well as the data belonging to certain user who could be tracked. Newaz et al. [108] explained the need of providing anonymity in data, communication, and devices.
Unlinkability. This requirement is also identified by Newaz et al. [108]. They defended that the unlinkability (hide sender and receiver of the message) between doctors and patients in healthcare supposes an essential requirement due to the sensitive information transmitted.
Untraceability. Hathaliya and Tanwar [52] defined this requirement as the ability to prevent the tracing of messages by an attacker to know user’s identity.
Pseudonymity. This property was identified by Saleh et al. [128], who defined it as the usage of a user’s pseudonym in an authentication process as well as in the location privacy to protect user’s identity.

4.3 Safety on Healthcare

The patient safety supposes a critical need thus making this scenario acquires a further level of complexity. As an introduction to this concept, a safety classification is presented in the literature [8, 73, 129, 157].
All research works show the classification created by the Federal Drug Administration (FDA) of US, which divides medical devices into three classes, Class I (Low to Medium Risk), Class II (Medium to High Risk), and Class III (High to Very High Risk). The classes are based on the level of control that is necessary to apply for assuring the safety and effectiveness of a device; the higher the risk, the higher the class [129]. In this sense, this latter work proposed four security levels taking into account the safety concern to classify the devices allocated in healthcare environment: low (e.g., administrative computer in hospital), medium (e.g., sensors measuring glucose levels), high (e.g., sensors controlling insulin pumps) and very high (e.g., implanted devices with medication).
There are international regulations created for preserving safety in the medical domain, Yaqoob et al. [157] enumerated the main regulations: the FDA regulation, the Medical Device Directive (MDD), and Conformite Europe (CE) redacted by the EU. The MDD shares with FDA the classification criteria by level but differs from the FDA in the number of levels, since MDD proposes four classes (Class I, IIa, IIb, III) in function of the risk level, while FDA provides three classes (Class 1, 2, 3). MDD divides class II of FDA into two classes to provide more granularity in the classification. On the other hand, the CE is a mark used for marketing in Europe in charge of ensuring that the devices fulfil the safety criteria determined. Yaqoob et al. also comment in [157] the new MDR (implemented in 2020), but with a special case, the vitro diagnostic devices where the MDR will be implanted in 2022. Finally, this work remarks different limitations that these regulations present, such as standard tools, minimum security control criteria, and medical device reporting.
After presenting main regulations, Kim et al. [73] shows various examples about the real problem of the incorrect safety protection in medical devices, such as a person died by a cardiac arrest due to a failure in his/her Implantable Cardioverter Defibrillator (ICD), or attacks produced to ICDs through their wireless interface. For further the research work, Altawy and Youssef covered in [8] the Cyber Physical Systems (CPS) and revealed with a case of study on implantable medical devices (IMDs), the real importance of the safety property and defended the protection of the individuals involved in its operations. Altawy and Youssef [8] highlighted the critical operation that IMDs perform in the patient health and the fatal consequences produced with the misbehaviour of these devices. Because of our literature review, we are able to conclude the importance of safety in healthcare, and the need of implementing secure mechanisms and safety-based concerned to protect the patient health.

5 A State-of-the-art-based Classification of Threats and Attacks in Healthcare

This section presents a classification of threats and attacks in healthcare, which is based on the analysis of healthcare environment, the related state-of-the-art with the most important reviews performed about medical domain, and the enumeration of security, privacy, and safety requirements in this topic. For that, we categorize these security issues aligned with a knowledge base standardized in this scope, the MITRE ATT&CK [147]. First, we present the threat taxonomy created with this work as well as the formal mapping with MITRE ATT&CK, explaining the categories identified affecting healthcare. Second, we present the attacks collected from the literature mapped to MITRE ATT&CK, creating a classification and risk evaluation for each one.

5.1 Threat Taxonomy with Framework Mapping

The reviews analyzed in Section 3 broadly covers the security topic, identifying different threats for medical devices and healthcare infrastructure. Our article aims to offer a complete threat taxonomy (unifying healthcare ecosystem) with all threats (IMD/IWMD/IoMT-focused and infrastructure-focused) found in the literature, enumerated and classified.
For classifying threats, we take the decision of aligning them with a globally accessible knowledge base like MITRE ATT&CK, because tools of this type are acquiring more importance in recent years for the works performed about threat modeling [56, 78]. This alignment may be useful in the compatibility of this work with other related projects, as well as the provision of a reference framework to compare this threat classification. Apart from MITRE ATT&CK, other alternatives can be deemed, such as Cyber Kill Chain [89] and Diamond Model [18]. However, MITRE ATT&CK is the most adopted by the industry and community because offers different advantages: it maps and covers everything regarding an intrusion from both the attack and defense sides, and provides examples and references including data on threat groups. This knowledge base is composed of 12 categories mapped to the steps executed in an attack: Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, and Impact. MITRE ATT&CK also has three different matrices for modelling different scenarios: Enterprise, which contains threats associated with Windows, Linux, Cloud, and so on; Mobile, which covers both Android and iOS threats; and Industrial Control Systems (ICS), focusing on industry-specific devices and operations.
To perform this alignment, we select the Enterprise and ICS matrices due to the majority of threats found in healthcare infrastructure are more related with the Enterprise matrix, and some of medical devices suffer from attacks similar to those found in the industry. In Fig. 3, we show the complete threat taxonomy aligned with MITRE ATT&CK. To better understanding, the threat taxonomy is divided into twelve categories, being nine of them shared between Enterprise and ICS matrices, two of them Enterprise-specific (Resource Development and Credential Access) and the last one ICS-specific (Impair Process Control).
Fig. 3.
Fig. 3. Threat taxonomy with MITRE ATT&CK alignment.
In terms of MITRE ATT&CK, more threats and techniques are included, but only the categories and threats related with the specific vulnerabilities and attacks presented in healthcare have been mapped. Starting with Resource Development, as shown in Fig. 3, this category covers the techniques used by adversaries with the purpose of introducing the needed mechanisms to allow the execution of future operations. In this category, we select from ATT&CK Develop, Obtain and Stage Capabilities, and Compromise Accounts and Infrastructure as the most important threats for healthcare. Regarding to Capabilities, firstly the adversary can develop or obtain the capabilities to later stage them in the target. On the other hand, Compromise Accounts and Infrastructure are other gateways that attackers can use for entering in the victim environment.
The second category presented, Initial Access, involves all techniques that gain access to the network thanks to entry points or vectors available on it. In this sense, we enumerated Rogue Master, Hardware Trojans and Phishing to allocate the attacks appeared in healthcare. Rogue Master is ICS-specific and consists of impersonating a master allowing attacker to disrupt the network communications by capturing and receiving traffic, to affect processes in unintended ways, to hide his/her attack in the organisation, and so on. Other way to enter in the network is with Hardware Trojans, introducing hardware components inside of environment and distributing the attack. Finally, Phishing is the technique used to mislead users with the intention of obtaining their user credentials, sensitive information, and so on.
The third category is Execution, including the techniques where the attacker compromises the local or remote system running malicious code. The threat highlighted in this category is Modify Controller Tasking, ICS-specific technique that alter the tasking of the controller to modify the operations and the behaviour of the device. Next, we present Persistence, incorporating techniques to keep access to the system after restarts, shutdowns, software modifications, etc. Here, we enumerate System Firmware, Valid Accounts and Server Software Component. Belonging to ICS group, System Firmware exploits the firmware update feature available in devices to incorporate malicious firmware that allows attacker to take device control. Valid Accounts is a result of a successful intrusion performed with other techniques belonging to other categories like Initial Access or Resource Development. At this point, the adversary acts as a valid account inside of environment. Server Software Component is another technique that exploits server development features to gain persistent access to the system. Then, we show Privilege Escalation as the group of techniques in charge of trying to get elevated permissions in the system or device. In this case, the main threat selected is Exploitation for Privilege Escalation, where vulnerabilities are used for producing the attack and elevating privileges.
Defense Evasion encompasses techniques that pretend to avoid the defenses included in the system to perform an attack. Here, we include Modify Cloud Computing Infrastructure and Weaken Encryption techniques. The former tries to leverage the different options that Cloud Computing offers for instances (create, remove or modify instances to avoid the defenses deployed in the system). Weaken Encryption exploits a problem in the encryption to intercept and capture communications. This technique can also attack to devices in charge of encrypting the messages for obtaining the information. The Credential Access category includes techniques to obtain the necessary information (generally users and passwords) to enter in the system as an authenticated user. For this group, we indicate Brute Force, Unsecured Credentials, Steal Authentication Token, and Man-in-the-Middle. Firstly, Brute Force is the common technique to obtain user passwords by inserting text strings until a valid result is obtained. Unsecured Credentials leverages weaken credentials policies or the use of default credentials for gaining the system access. Steal Authentication Token gets the access to the system through the action of a legitimate user that grants the access to the adversary. Finally, Man-in-the-Middle consists of intercepting the communication between two entities sniffing or modifying the communication.
The Discovery category enumerates techniques used for knowing and detect the victim’s environment. Here, we present Wireless Sniffing and Network Sniffing, where both techniques try to collect information of the organisation through include mechanisms to obtain the communications produced in it. Wireless Sniffing allocates the mechanisms in the wireless environment while Network Sniffing utilises the interface of a computer to gain knowledge about internal network. To continue, the Lateral Movement category comprises the mechanisms used for pivoting by the environment changing the system of the internal network. As technique for this category, we only highlight Valid Accounts, which is able to traverse the network thanks to valid user’s credentials obtained. The next category is Collection, where are allocated the techniques that allow attackers to gather data and knowledge for their purpose. Here, different mechanisms are listed: Wireless Sniffing, Data from Information Repositories, Monitor Process State, and Man-in-the-Middle. On one hand, Wireless Sniffing and Man-in-the-Middle have already explained because they can be found in other categories. On the other hand, Data from Information Repositories collect information by repositories installed in the organization, while Monitor Process State searches relevant information in the physical state, such as CPUs number, RAM inserted, and so forth.
The Impair Process Control category is ICS-specific and incorporates techniques with the purpose of seeking malicious effects in the physical control processes. Here, two important mechanisms appear, Modify Parameter and Spoof Reporting Message. Both cover all techniques able to change the packets and messages sent between devices and systems inside of network, as well as process configurations producing different behaviours in the organisation operations. Finally, the Impact category encompasses the techniques that affect to the functioning of the system, such as manipulation, disruption, damaging, and so on. Here, two different Denial of Service attacks appear, Network and Endpoint, and Data Encryption for Impact, traditionally known.

5.2 Attack Classification

All categories and techniques presented above are used here to map and create the association between the attacks produced in healthcare and the categories enumerated. For evaluating the impact of vulnerabilities, different frameworks provide a scoring per vulnerability in function of different established metrics. In this sense, the most adopted framework is the Common Vulnerability Scoring System (CVSS) v3 [61]. The CVSS is composed of three metrics groups: base, temporal, and experimental metrics. These metrics give a specific vulnerability scoring.
Although CVSS is broadly extended, it is neither healthcare-focused nor designed for covering the security issues presented in the medical domain. Delving into the literature and official standardization organizations, we find other alternatives such as Risk Scoring System for Medical Devices (RSS-MD) [116] and the work performed by Carreon et al. [20], which try to incorporate health and privacy concerns of medical devices to the CVSS. This latter work adds two new metrics to CVSS, i.e., Health Impact and Sensitivity, and then compares the accuracy of RSS-MD, CVSS and their approach. This comparison states that Carreon et al.’s work shows better results. On the other hand, the Federal Risk and Authorization Management Program (FedRAMP) contracted to MITRE in 2020 to adapt the current CVSSv3 to medical devices and created the “Rubric for applying CVSS to medical devices” [23]. This rubric improves the initial CVSSv3 with the healthcare characteristics to be used in this environment. This framework is the final selected for our work due to the compatibility with CVSS and the adoption that CVSS has in the threat classification, as well as the entity behind of this work, creator also of MITRE ATT&CK.
The purpose with our work is to classify the threats collected on healthcare with a common adopted method, i.e., CVSS, incorporating this effort in the work already performed through this mechanism. In Tables 2 and 3, we present all attacks discovered on healthcare. By each attack, the tables present the target of the attack, being IWMD or Healthcare infrastructure the available options, the MITRE Category and its concrete technique as introduced in Fig. 3. In this sense, the attacks are sorted by the category they belong to. In the following column group, the CVSS is developed by each attack, presenting the metric vector and the resulting score. In this regard, the work at hand has been performed taking into account the review presented by Newaz et al. [108], where some metric of CVSSv3 are used for some of the attacks presented here; the NVD Database [62], searching vulnerabilities exploiting these attacks and checking the more repeated values; and the results achieved with the MITRE rubric to obtain the best score per attack. Finally, we show the works (their reference) where the attacks have been collected.
Table 2.
AttackTargetMITRECVSS for HealthcareReferences
CategoryTechniqueVectorScore
MalwareIWMD/ HealthcareResourceDevelopmentDe/Ob/StCaAV:N/AC:L/PR:N/UI:R/ S:U/C:N/I:L/A:L5.4[7, 73, 108, 112, 118]
Outdated OSsHealthcareResourceDevelopmentObCaAV:A/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H8[34, 108]
Dropbear SSH ServerHealthcareResourceDevelopmentCoInAV:N/AC:H/PR:N/UI:N/ S:U/C:H/I:H/A:H8.1[119]
Social EngineeringHealthcareResource DevelopmentCoAcAV:N/AC:L/PR:L/UI:R/ S:U/C:L/I:L/A:N4.6[3, 112]
SybilIWMDInitial AccessRoMaAV:N/AC:L/PR:N/UI:N/ S:U/C:N/I:N/A:H7.5[27, 112, 113]
Hardware TrojanIWMDInitial AccessHaTrAV:P/AC:H/PR:N/UI:N/ S:U/C:N/I:H/A:N4.2[73, 108]
PhishingHealthcareInitial AccessPhAV:N/AC:L/PR:N/UI:R/ S:U/C:H/I:L/A:N7.1[106]
Routing AttacksIWMDExecutionMoCoTaAV:N/AC:L/PR:H/UI:N/ S:U/C:H/I:H/A:H7.2[3, 113]
WormholeIWMDExecutionMoCoTaAV:L/AC:H/PR:L/UI:N/ S:U/C:H/I:H/A:H7[27, 113]
BlackholeIWMDExecutionMoCoTaAV:L/AC:H/PR:L/UI:N/ S:U/C:N/I:N/A:H4.7[3, 27, 113]
GrayholeIWMDExecutionMoCoTaAV:L/AC:H/PR:L/UI:N/ S:U/C:N/I:H/A:H6.3[3, 27, 113]
Firmware ModificationIWMD/ HealthcarePersistenceSyFiAV:N/AC:H/PR:N/UI:N/ S:U/C:H/I:H/A:H8.1[108, 157]
Compromised NodeIWMDPersistenceVaAcAV:A/AC:L/PR:N/UI:N/ S:U/C:N/I:N/A:H6.5[3]
SQL InjectionHealthcarePersistenceSeSoCoAV:N/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H8.8[34]
Priv. EscalationHealthcarePrivilege EscalationExPrEsAV:N/AC:L/PR:L/UI:R/ S:U/C:H/I:H/A:N7.3[108]
IaaS Cloud AttackHealthcareDefense EvasionMoCCInAV:N/AC:H/PR:L/UI:N/ S:U/C:N/I:H/A:H6.8[34]
Device CloningIWMDDefense EvasionWeEnAV:N/AC:H/PR:L/UI:N/ S:U/C:H/I:N/A:H6.8[112]
Password IntrusionIWMD/ HealthcareCredentialAccessBrFoAV:N/AC:H/PR:N/UI:N/ S:U/C:N/I:N/A:N2.3[119]
Weak Auth. SchemesExploitationIWMD/ HealthcareCredentialAccessUnCrAV:N/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:N8.1[108]
Unauthorised AccessIWMD/ HealthcareCredentialAccessUnCrAV:N/AC:H/PR:L/UI:N/ S:U/C:H/I:N/A:N5.3[3, 157]
ForgeryIWMD/ HealthcareCredentialAccessStAuToAV:N/AC:L/PR:N/UI:R/ S:U/C:H/I:H/A:N8.1[112]
Man-in-the-MiddleIWMDCredentialAccessMitMAV:N/AC:H/PR:N/UI:N/ S:U/C:H/I:L/A:L7[108, 112, 157]
EavesdroppingIWMDDiscoveryWiSnAV:N/AC:L/PR:H/UI:R/ S:C/C:H/I:H/A:L7.6[3, 7, 73, 108, 112, 118, 124, 157]
Traffic AnalysisIWMDDiscoveryNeSnAV:A/AC:H/PR:N/UI:N/ S:U/C:H/I:L/A:L6.4[112]
Table 2. Attacks on Healthcare with CVSS to Medical Devices (MITRE) Classification (1)
Table 3.
AttackTargetMITRECVSS for HealthcareReferences
CategoryTechniqueVectorScore
ImpersonationIWMDLateral MovementVaAcAV:L/AC:H/PR:N/UI:N/ S:C/C:H/I:H/A:L6.5[108, 112]
SniffingIWMDCollectionWiSnAV:A/AC:L/PR:N/UI:N/ S:U/C:H/I:N/A:N6.5[27, 157]
Data BreachHealthcareCollectionDaInReAV:N/AC:H/PR:N/UI:N/ S:C/C:H/I:N/A:N4.4[7]
Message DisclosureIWMD/ HealthcareCollectionDaInReAV:N/AC:L/PR:N/UI:N/ S:U/C:H/I:N/A:N7.5[3, 157]
Side ChannelIWMDCollectionMoPrStAV:L/AC:H/PR:N/UI:N/ S:U/C:N/I:L/A:L4[27, 73, 108, 124, 157]
SinkholeIWMDCollectionMitMAV:N/AC:H/PR:N/UI:N/ S:U/C:H/I:L/A:H7.7[27]
ARP Tab. PoisoningHealthcareCollectionMitMAV:A/AC:H/PR:L/UI:N/ S:U/C:N/I:H/A:H6.4[34]
TamperingIWMDImpair Proc.ControlMoPaAV:N/AC:H/PR:N/UI:N/ S:C/C:L/I:H/A:N7.5[7, 112, 157]
Sensor SpoofingIWMDImpair Proc.ControlMoPaAV:L/AC:H/PR:N/UI:N/ S:U/C:N/I:N/A:H5.1[7, 108, 157]
Replying AttackIWMD/ HealthcareImpair Proc.ControlMoPaAV:A/AC:L/PR:N/UI:N/ S:U/C:H/I:H/A:N8.1[3, 157]
Message Modif.IWMD/ HealthcareImpair Proc.ControlSpReMeAV:L/AC:L/PR:N/UI:N/ S:U/C:N/I:H/A:N6.2[3]
FloodingIWMDImpactNDoSAV:L/AC:L/PR:N/UI:N/ S:U/C:N/I:N/A:H6.2[3, 7, 27, 113]
Denial of ServiceIWMD/ HealthcareImpactNDoS/EDoSAV:N/AC:L/PR:N/UI:N/ S:U/C:N/I:N/A:H7.5[7, 27, 112, 113, 118, 119, 124, 157]
RansomwareHealthcareImpactDaEnImAV:N/AC:L/PR:N/UI:N/ S:U/C:N/I:H/A:N7.5[108, 157]
Battery DepletionIWMDImpactEDoSAV:L/AC:L/PR:N/UI:N/ S:U/C:N/I:N/A:H6.2[108, 124, 157]
MIMO AttackIWMDImpactNDoSAV:L/AC:L/PR:N/UI:N/ S:U/C:L/I:N/A:N4[108]
Bluetooth AttackIWMDImpact, Collection, Lateral movementEDoS, DaInRe, MitM, VaAcAV:L/AC:H/PR:N/UI:N/ S:U/C:H/I:H/A:H7.4[162]
Table 3. Attacks on Healthcare with CVSS to Medical Devices (MITRE) Classification (2)
Delving into metric vector, we highlight that the main difference between Rubric proposed by MITRE and CVSSv3 is the reformulation of questions and options to evaluate such metrics and incorporating the processes and data managed in healthcare. Although the available options to select in the metrics maintain the same values, the description of the value and the reason for selecting it is changed according to the environment, processes, information, and assets belonging to medical domain. For example, to evaluate the Confidentiality impact of an attack, the impact in Protected Health Information (PHI) and Personal Identifiable Information (PII) data must be checked. The different metrics analyzed, represented at the Vector column in Tables 2 and 3, are as follows:
Attack Vector (AV) represents the way used by the attacker to carry out the attack. In this sense, the CVSS proposes four ways: Network (N), Adjacent Network (A), Local (L), and Physical (P).
Attack Complexity (AC) does reference to effort performed by the attacker to give the successful in the attack. The metrics available for this property is Low (L) and High (H).
Privileges Required (PR) contains the credentials needed by the attacker to address the attack. In this case, None (N), Low (L), and High (H) options are found.
User Interaction (UI) indicates whether the attack needs the user cooperation to produce the attack correctly. For modelling this property, None (N) and Required (R) values are used.
Scope (S) defines whether the attack addressed to a device/system has an effect outside of security range. For this metric, Unchanged (U) and Changed (C) values are possible.
Confidentiality (C), Integrity (I), and Availability (A) Impact refer to the consequences produced by an attack in CIA properties. The consequences can be None (N), Low (L), and High (H).
After presenting Tables 2 and 3, we start with the attack explanation. Firstly, we enumerate Malware, Outdated Operating Systems (OSs), Dropbear SSH Server, and Social Engineering as healthcare threats allocated in the Resource Development (RD) category. Malware encompasses all code that is installed in healthcare assets with malicious intentions. Different reviews present this attack [7, 73, 108, 112, 118], and highlight the problem that this attack poses in healthcare. For example, Newaz et al. [108] presented different Malware, such as “Conflicker”, a malware that allowed attacker to execute arbitrary code on the vulnerable systems (X-ray machine, mammography, and a gamma camera), and “Kwampirs” malware, which provides attacker to trigger equipment malfunction or delay in accessing information. Outdated Operating Systems is is also a very common threat in healthcare devices allowing attackers to exploit bugs that have been fixed in newer versions of them. This attack is depicted in [34, 108], where Newaz et al. [108] affirmed that many devices are out of date in the medical environment. Dropbear SSH Server, analyzed in [119], is a small Linux distribution that allows some medical devices to have a SSH connection, and the incorrect protection of this server can suppose an entering point in the healthcare infrastructure. Social Engineering is a traditional technique trying to leverage the public information available of medical workers as well as other sources in order to compromise the accounts of them [3, 112].
Next, we found Sybil, Hardware Trojans, and Phishing as threats belonging to the Initial Access (IA) category. Sybil, enumerated in [27, 112, 113], is an IWMD specific threat and consists of creating non-real identities in internal environment (achieve the trust of the network) to perform other attacks, such as Denial of Service or Flooding attacks. Papaioannou et al. [112] explained that a Sybil attack can influence in legitimate entities to draw incorrect conclusions. Hardware Trojan is a technical threat presented in [73, 108], which has the objective of inserting a trojan in integrated circuits and hardware device. Newaz et al. [108] commented that FDA has released numerous reports with this type of threat. Phishing is a widely method used for entering to private environments with the interaction of a valid user leveraging the inattention or lack of knowledge [106].
The Execution (Ex) category covers Routing Attack, Wormhole, Blackhole, and Grayhole as healthcare threats. Routing Attack is the one performed for altering the route of packets to change the destination. This attack is presented in [3, 113]. Algarni [3] showed this attack into a medical device in Smart Healthcare Systems (Incorporate Smart technology to Healthcare) suffering a change in its routing table. Wormhole proceeds with the alteration of routing tables forwarding traffic to one adversary node. Blackhole and Grayhole are variations of Wormhole. The former consists of dropping the packet when is received by the adversary node, while the latter implements a dropping algorithm to complicate the detection attack. These attacks are presented in [3, 27, 113] and have the IWMD as main targets in healthcare.
The following attacks are Firmware Modification, Compromised Node, and SQL Injection which are encompassed in the Persistence (Pe) category. Firmware Modification is a very common attack completed in medical devices and means the modification of the firmware, transforming the device behaviour. Newaz et al. [108] highlighted the importance of this attack and explained some cases where this attack served as input point to healthcare system. Besides, Yaqoob et al. [157] enumerated different devices vulnerable to this attack with the followed attack methodology and the vulnerability exploited in each case. Compromised Node is the infection of valid node of the network. Algarni [3] showcased this attack by taking control of the node sensors providing false information. Finally, SQL Injection is an attack produced in a healthcare website injecting malicious code to exploit the SQL database [34].
The Privilege Escalation (PE) category is presented with only the Privilege Escalation attack. This attack is the common procedure used to obtain increased system permissions through exploits and vulnerabilities found. Next, the Defense Evasion (DE) category includes two attacks, IaaS Cloud Attack, and Device Cloning. Both attacks are collected by [34], and IaaS Cloud Attack is the alteration of cloud infrastructure, technology implemented in healthcare in the recent years to improve the processes and operations. Device Cloning is the impersonation of device to perform malicious activities in the environment.
The Credential Access (CA) category comprises Password Intrusion, Weak Authentication Schemes Exploitation, Unauthorised Access, Forgery, and Man-in-the-Middle attacks. Password Intrusion is an attack used to obtain the access to the system with user’s credentials, being brute force one of the most repeated techniques. Weak Authentication Schemes Exploitation is defined by Newaz et al. [108] as the lack of strength of the authentication mechanisms, mainly in medical devices. This attack can appear during the instant of reading and writing data from these devices where Newaz et al. commented different studies which obtain data from devices with a CD or USB portable medium. Unauthorized Access leverages the unsecured protection in order to enter in the system. Both [3] and [157] present this entry vector and Yaqoob et al. [157] enumerates multiple medical devices where this attack has been produced, such as Cardioverter Defibrillator and Insulin pump. Forgery is an attack only collected in [112], defined as the counterfeit construction of identity being authenticated to transmit fake data to other entities. Papaioannou et al. highlights in [112] the problem of this attack against the authentication requirement. Man-in-the-Middle is widely used in communications to access sensitive information. This attack is addressed in [108, 112, 157], highlighting different entry points presented by Newaz et al. [108], such as Bluetooth and reverse engineering. Yaqoob et al. [157] enumerated some vulnerable medical devices to this attack.
In Discovery (Di) category, two extensively used attacks are classified: Eavesdropping and Traffic Analysis. Eavesdropping is the most commented attack in the literature appearing in [3, 7, 73, 108, 112, 118, 124, 157]. This attack pretends to obtain sensitive information thanks to unsecured communication channels. Newaz et al. [108] commented that different medical and wearable devices such as Blood Pressure Monitors and smartwatches suffered vulnerabilities that allowed attackers to obtain sensitive information. On the other hand, Yaqoob et al. [157] enumerated different medical devices suffering this attack, such as Accelerometer and Cardiac Monitor, which was produced by a lack of encryption and protection in communication protocols. Finally, Traffic Analysis is listed in [112] and consists of passively observing the traffic transmitted inferring knowledge through characteristics of the data flow.
Lateral Movement (LM) contains only Impersonation attack. This threat has as purpose the hide yourself as a valid user in the network. Two works address it [108, 112]. In [108] researchers collected an example leveraging the lack of protection in the communication between glucose monitoring device and the insulin delivery system to obtain the PIN of authentication. With this PIN the attacker impersonated the patient.
Collection (Co) is the category with more attacks and has Sniffing, Data Breach, Message Disclosure, Side Channel, Sinkhole, and ARP Table Poisoning attacks. Sniffing is similar to eavesdropping, where hardware and software sniffer are used to collect traffic. This attack is presented in [27, 157] which comment the problem of medical devices to protect their communications and data. Data Breach is a generic threat that poses the loss of sensitive data with important impact in healthcare. Almohri et al. [7] joint this attack with confidentiality requirement due to this exposure of information. Message Disclosure can be understood as an example of Data Breach because unauthorised entities exposure information leveraging weaknesses in device or communication medium. This attack is analysed in [3, 157], especially for capturing patient logs files with sensitive information. Side Channel is a widely discussed attack in literature [27, 73, 108, 124, 157], and acts collecting physical parameters from medical devices, such as power consumption and Electromagnetic (EM) radiations resulting in sensitive information leakage. Newaz et al. [108] presents three types of Side Channel attacks taking into account the read parameters: electromagnetic interference, sensor spoofing and differential power analysis attacks on medical devices. Sinkhole is an attack only found in [27] and works obtaining all traffic due to malicious node is properly published in the network as the fastest path to the base station. Finally, ARP Table Poisoning is an implementation of Man-in-the-Middle attack presented before [34]. The attacker sends false ARP messages to nodes in the network alerting of the best route for reaching the base station, which coincide with his/her node.
The Impair Process Control (IPC) category contains Tampering, Sensor Spoofing, Replying Attack, and Message Modification. Firstly, Tampering and Message Modification are two variations of attacks with the purpose of altering messages between medical devices and healthcare provider. In this sense, different works [3, 7, 112, 157] comment these attacks, being Yaqoob et al. [157] who presented different targets where these attacks were produced, such as wearable devices (Fitbit) and medical devices (pacemaker or prosthetic limb). Sensor Spoofing has been presented above as a type of Side Channel attack. When the attack is successful, the attacker takes the control of sensor changing the medical device operation. Specifically, [7, 108, 157] present different techniques such as static and dynamic analysis, reverse engineering and communication channel exploitation to perform this attack [157]. Finally, Replying Attack is defined as the achievement of valid packets transmitted in order to corrupt or impersonate it [3, 157]. The attack vectors here are shared with the Sensor Spoofing threat.
To conclude, we present the Impact (Im) category with Flooding, Denial of Service, Ransomware, Battery Depletion, Multiple-Input-Multiple-Output (MIMO), and Bluetooth attacks. Flooding can be seen as a concrete type of Denial of Service attack, which impacts in the healthcare environment blocking and overloading the assets. Denial of Service is a widely discussed threat in literature [7, 27, 112, 113, 118, 119, 124, 157], providing different forms of performing it, such as battery drainage, botnets, and so on. Ransomware is a type of Malware separated by it due to the importance and impact that it has in healthcare. In Section 1, we presented some attacks to hospitals based on Ransomware. The works conducted in [108, 157] addressed this threat and commented different data in economic terms, such as $17000 paid by a hospital to recover its systems. Battery Depletion attack damages the charging of the device to render the device unavailable. Namely, this attack is covered in [108, 124, 157], highlighting the content presented by Newaz et al. [108] that commented the execution of this attack with a forced authentication attack, where the adversary performs multiple authentication processes to drainage the battery. MIMO Attack is presented in [108], which consists of collecting transmitted data in wireless environment to damage the confidentiality in healthcare. Finally, Bluetooth attacks are explained. These can be included in several MITRE categories because Bluetooth implements its own layer architecture. In [162], some attacks are commented, such as Blue smacking (DoS), Blue snarfing and Blue bugging (Data Breach), Bluejacking (Impersonation), Blue printing (Sniffing), and Mac spoofing.
Summarising the content presented in this section, we have performed a proper alignment of healthcare threats found in the literature with MITRE ATT&CK in order to achieve compatibility and provide a reference framework to compare different related works. Besides, we have classified all attacks with the “Rubric for applying CVSS to Medical Devices” [23] by MITRE to properly understand each threat’s scope and impact in the healthcare environment. Thus, we present in Fig. 4 several charts to highlight the results obtained with the rubric application for the attacks classified. Fig. 4 shows six different charts, where the first three ones illustrate the CIA impact, showing by each requirement the percentage of High, Low, or None impact. In the three cases, the High impact is the most appeared. Following the charts, the fourth includes the number of attacks, with respect of the total amount (41 attacks), the classification for Attack Complexity, User Interaction and Scope. In Attack Complexity, the attacks have been divided between the two possible values, Low and High. For User Interaction, the majority does not require None user action. Finally, Scope presents only three attacks that can act in a Changed environment. In Fig. 4, the total of attacks impacted by each CIA requirement is shown in the fifth chart, with a similar percentage for the three properties. Finally, the Privilege Required value is mostly covered by the None option, showing that many attacks can be executed without specific user privileges.
Fig. 4.
Fig. 4. Classifying attacks based on (1) Confidentiality impact, (2) Integrity impact, (3) Availability impact, (4) Attack complexity, User interaction and Scope, (5) Impact by CIA approach, and (6) Privilege required.

6 Security and Privacy Mechanisms and Attacks Detection in Healthcare

This section provides different contributions on the protection and detection of attacks in healthcare, dividing them into two major parts: the current research lines available in the literature, obtaining the different security mechanisms where the investigation is adding more efforts; and the collection and classification of the main public datasets in healthcare, work not seen previously and which may be of interest for future work in this area.
Before starting with research lines, thanks to the effort addressed in Section 5.1 categorising threats with the groups and techniques offered by MITRE ATT&CK, different countermeasures can be identified directly. For example, Password Intrusion attack, mapped to Brute Force technique belonging to Credential Access category, can be protected with some mitigation mechanisms collected by MITRE, which are Account Use Policies, Multi-factor Authentication, Password Policies and User Account Management. Due to this work performed to create the mapping between threats found in healthcare and categories/techniques listed in MITRE ATT&CK, we could deploy and implement the different mitigation mechanisms to protect the medical environment by default.

6.1 Research Lines for Security Mechanisms in Healthcare

Our work identifies the main categories of security mechanisms found in the healthcare literature. In this task, unlike we made with the threat collection where, we only used the reviews analysed in Section 3, in this case, we divide this work into two parts. First, we identify the main tendencies in the detection and protection of healthcare, thanks to the reviews listed in Section 3. Second, we perform another research in the literature to obtain more specific works that cover each research line identified. This is to provide detailed characteristics of each category, not seen in a review, as well as the possibility of finding public datasets or interesting information. In Table 4, the covered attacks, a summary description, the possible limitations and future work (mainly discussed in Section 7), and the works discovered per category are shown. As final indications, we present the most recently research works of each category, providing the current status of the scene with the most interesting ones.
Table 4.
MechanismsCovered AttacksDescriptionLimitations and Future WorkReferences
Key Management SchemesRouting Attack, Eavesdropping, Traffic Analysis, DoS, Sniffing, Unauthorised Access, ImpersonationUsed to protect the information exchanges produced in the healthcare environment\(\bullet\) Traditional approaches have high power consumption and complexity
\(\bullet\) Need of adapting to new emerged scenarios and technologies (5G, Smart Home)
[65, 79, 94, 141]
Physical Layer Security SchemesEavesdropping, Traffic Analysis, Sniffing, Data Breach, Compromised Node, Device CloningRelies on protecting edge network exploiting characteristics of the communication channels\(\bullet\) Improve security performance of IoMT systems
\(\bullet\) Incorporate intelligence reflective surfaces (IRS) schemes
[13, 80, 153]
Routing Mechanisms (SDN, congestion, etc.)Routing Attack, DoS, Battery Depletion, Flooding, Wormhole, GrayholeDeployment of secure gathering and routing strategies to incur the least communication overheads and transmission costs\(\bullet\) The application of these routing mechanisms to mobile healthcare scenarios
\(\bullet\) Improvement of energy efficiency and security
[95, 109, 121, 125]
Data AggregationEavesdropping, Message Disclosure, SniffingIntend to implement secure and privacy data aggregation from different distributed medical devices to protect the patient sensitive information\(\bullet\) Especially in Federated Learning, Data quality, Incentive mechanisms, Model precision, etc., are open questions that need further work inside of healthcare[24, 117, 142]
Proxy-basedEavesdropping, Tampering, Replying AttackMechanism (entity, layer, process) allocated above medical devices to secure data and devices\(\bullet\) The need of improving performance and reducing costs
\(\bullet\) Adding more mechanisms to provide more security and privacy
[50, 75, 90, 154]
Blockchain-basedData Breach, Sniffing, DoS, MitM, TamperingIncorporation of blockchain technology on healthcare, providing characteristics such as distributed recording and sharing with any third party\(\bullet\) Due to its innovative grade, Blockchain needs to be improved in some aspects, such as Storage, Data Sharing, Interoperability, Scalability, etc.[5, 25, 36, 59, 82, 143]
Anomaly DetectionMalware, Sensor Spoofing, Compromised Node, Ransomware, Sybil, MitMUse of different Machine Learning techniques such as Random Forest (RF) and Support Vector Machines (SVM) to detect anomalous behaviours\(\bullet\) Continuous improving and research of real-time and autonomic detection of anomalous activities in healthcare environment[21, 41, 49, 86, 133, 145]
Authentication Schemes (Biometric-based, Mutual authentication)MitM, Impersonation, Password Intrusion, Replying Attack, Weak Authentication Schemes Exploitation, Side ChannelThis technique has the purpose of authenticate patients and medical experts in a secured way\(\bullet\) Improve performance and costs as well as provide lightweight implementation
\(\bullet\) Adaptation to mobile healthcare environments
[6, 11, 30, 53, 136, 156]
Table 4. Research Lines for Security and Privacy Mechanisms in Healthcare
In Table 4, Key Management Schemes (KMS) research line is the unique where we enumerate work prior to 2017. The reason is that KMS have been used in healthcare for years. This solution is created for protecting the communications, encrypting the messages, and avoiding malicious interceptions. To achieve such purpose, the messages are protected with a key, which allows the packets to be encrypted. Two approaches are widespread in the key management, the symmetric and asymmetric keys. There are remarkable works in [65, 79, 94, 141], which provide interesting findings. Traditionally, the tendency in KMS was to design algorithms based on Elliptic Curve Cryptography (public key cryptography) [79] to evolve towards more disruptive methods, such as Merkle Hash Tree (trees based on a one-way hash function) [94], Chinese remainder theorem (central entity broadcasting messages to different patient groups) [141], and Group Key Management protocols [141]. By other hand, the WBANs are the main targets of the research works on KMS [65, 94, 141], due to their special characteristics, such as power and processing constraints. Finally, we list the work performed by Jabeen et al. [65], since they offer a recent systematic literature review that shows a complete view of this category so far. They present many different methods and protocols to implement KMS, such as AES symmetric key based-schemes, Hashing algorithm-based schemes, the Kerberos protocol, and other solutions.
The Physical Layer Security Schemes category covers the techniques used to incorporate security in the physical environment. Here, we present three works [13, 80, 153], which use physical layer methods to protect the healthcare environment against wireless attacks. Atat et al. [13] proposed a three-tier hierarchical m-Health system where the first tier is occupied by the medical sensors, the second tier by the smart devices (smartphones) and, the third tier by the central healthcare system. Atat et al.’s purpose was to develop a security scheme in the second tier based on Stochastic Geometry, which allowed creating an accurate model of participants’ spatial locations to protect the use case defined. Li et al. [80] implemented another scheme called Friendly-Jamming. Basically, this security model was based on adding friendly jammers to wireless network to confuse the eavesdropper and protect the legitimate network information. Finally, Wei and Liu [153] designed a model named Sparse Learning based Encryption and Recovery (SLER). This method improved the spectral efficiency and reduced the power consumption thanks to the theory of compressed sensing (CS), which leverages the Sparse Learning characteristics in the compression of IMD signal.
The Routing mechanisms category is created to protect the healthcare environment (mainly medical sensors and devices) of attacks like Wormhole, Routing Attacks, DoS, etc. Due to different constraints surged in WBANs, such as power consumption, low processing capabilities or lack of memory (storage), the transmission mechanisms must be optimised and security-focused for this environment. We can point out three different mechanisms to develop this research line in [95, 109, 125]. Namely, Mehta and Parmar [95] presented certain problems that the Routing Protocol for Low Power and Lossy Network (RPL), standardised for IoT networks, had in security terms. They proposed a Lightweight Trust mechanism to secure the RPL, where the nodes monitor their neighbours to check if they were complying the RPL. Nidhya et al. [109] implemented an Energy-Aware Routing Mechanism also based on Trust concept. In this case, they used Fog Computing to improve the quality of service, reduce the latency, etc., getting results where the latency was reduced by 19% and the communication overhead by 23%. Saba et al. [125] designed a secure and energy-efficient framework for IoMT, which was divided into the network structure of the medical sensors and sink node, the intelligence routing (modelling a graph with cost function), and the secure data transmission (using Cipher Block Chaining and Digital signature). To conclude, we can highlight SDN technology as the main alternative to implement a secure routing system as it offers characteristics such as high-level security, intelligent network management, and optimal resource scheduling [121].
Data Aggregation is very related to privacy on healthcare, since it is used for collecting data from different sources (medical sensors) and applying an aggregation technique to secure and privatise the information. To better understand the current status of this technique in healthcare, we have analysed the works in [24, 117, 142]. Tang et al. [142] created a secure data aggregation in the process of transmitting the information from medical centers to the cloud server. They applied different characteristics to implement the technique: differential privacy preservation, where each healthcare center incorporates noise in their aggregated data; obliviousness security, in which the aggregated data generated in one healthcare center do not be known by other center due to the use of distinct secret keys; fair incentives, where patients providing data are rewarded; and healthcare center fault tolerance, the cloud server can know the source of aggregated data thanks to the Sharmir’s Secret Sharing. Chen et al. [24] defended the use of the Federated Learning paradigm (global model trained with local models where the data are generated) to implement a secure data aggregation. Hence, Chen et al. joined Federated Learning with Transfer Learning to implement the data aggregation technique. Initially, they have a global model trained with public datasets, which is sent to users where they train the model with their local data, and finally, the local models are transmitted to the cloud center. Finally, Ranjani NY et al. [117] proposed a Cluster-based secure and private data aggregation model, using Glow swarm optimization algorithm for clustering process, the selection of a cluster head as the aggregator, and the cloud server for accessing/maintenance of aggregated data.
Proxy-based includes the mechanisms able to add intelligence between medical devices and healthcare platform. The proxy approach consists of adding an entity, layer or process to secure the data generated in medical devices. Different works address this topic [50, 75, 90, 154]. First, Wu et al. [154] created a proxy-based approach and adopted a ciphertext-policy attribute-based encryption (CP-ABE) to protect the communications and provide fine-grained access control in IMDs and WBAN environment. Kulac [75] created a jacket with multiple sensors. These sensors were implemented with the ability of communicating with the IMDs in the body patient. To implement security, the sensors were able to wireless transmit in different models, such as jamming and spoofing modes. Han et al. [50] detected that different medical devices running healthcare applications contain particular context. This fact produced a crosscut of application codes incrementing costs of development and maintenance, so that they designed an encapsulation mechanism-based context-orient programming paradigm (COP) in IoMT to solve this problem. To conclude, Marwan et al. [90] proposed a cloud framework destined to data sharing and processing and created with two cryptosystems (AES and Paillier cryptosystems) for data encryption and key management. They incorporated an entity as third party to enforce security called CloudSec.
The Blockchain-based mechanisms are based on a decentralised ledger that records data in a database made up of different users hosted in different locations. The information is stored in blocks which can not be modified or altered. The integration of Blockchain technology in healthcare has been addressed for years, and we can highlight the works published in [5, 25, 36, 59, 82, 143]. These works incorporate some reviews that offer us a complete view of the contributions achieved in the literature, and we select below the more interesting information. Firstly, Esposito et al. [36] analysed the current problems of healthcare (access control, cloud-based solutions, etc.) and highlighted Blockchain as a possible alternative to improve the actual context of healthcare, exploring also challenges belonging to Blockchain (storage, regulations compliance, etc.). Liu et al. [82] and Chukwu and Garg [25]’s works integrated Blockchain technology in EHR managing. Liu et al. explained the main principles/challenges of this technology, and selected Ethereum network and Interplanetary File System peer-to-peer protocol to solve the scalability issue that healthcare had in the processing and storing of EHR. Chukwu and Garg proposed a Blockchain and Distributed Ledger Based Improved Bio-Medical Security system, characterised by the creation of a Trust model based on Linear Decision Making, and tested with an adversary model where man-in-the-middle and data tampering attacks are executed. In security terms, Tariq et al. [143] analysed different issues addressed with Blockchain, such as privacy leakage, data integrity, and DoS attack, as well as the advantages provided by this technology, such as confidentiality, non-repudiation, and immutability. Finally, Hussein et al. [59] illustrated a holistic view of the Blockchain technology in healthcare, presenting the trends and opportunities mainly in Telecare Medical Information System, a technology that connects patients and physicians to send and receive healthcare services and records from remote sites.
The Anomaly Detection research line encompasses intrusion detection techniques for discovering attacks or malicious actions in the network or system. The literature has deeply addressed this topic and the works we selected are [21, 41, 49, 86, 133, 145]. For clinical scenarios, Fernández Maimó et al. [41] developed a ransomware detection and mitigation method, focused on the spreading phase (exploit vulnerability available in the network/system) of this attack. This work was designed taking into account a future hospital room with different sensors and medical equipment. They proposed a complete framework with different modules (Monitoring, Offline Model Generation, Analyser and Detection & Reaction Modules) implemented with Machine Learning technology. Turn into IoMT/IMD-related, Sehatbakhsh et al. [133], Manimurugan et al. [86], and Thamilarasu et al. [145] proposed different anomaly detection solutions. Sehatbakhsh et al. studied the involuntary electromagnetic emanations of embedded devices to detect possible anomalous actions through two phases: a training phase and a monitoring phase. Manimurugan et al. presented a method based on Deep Belief Neural Network (training achieved layer by layer using the previous one) to effectively attack detection. On the other hand, Thamilarasu et al. implemented a polynomial model (predict sensor data) for detecting device level anomalies using statistical regression (deviation). Showing healthcare-focused works, Carvalho et al. [21] and Hady et al. [49] developed two anomaly detection methods, the first one implementing a provider-consumer solution composed of hospitals (providers) and patients (consumers), and the last one addressing a man-in-the-middle attack with the creation of a machine learning algorithm with different techniques (Random Forest, Support Vector Machines, etc.).
Finally, Authentication Schemes research line includes the different techniques implemented to protect the authentication phase in healthcare. Some articles address this point in [6, 11, 30, 53, 136, 137, 156] and divided into two approaches: biometric-based and mutual authentication. In the former, we highlight the works by Hathaliya et al. [53], Shakil et al. [136], Weitao et al. [156], and Patricia et al. [11] works, who defined the biometric approach as the inherent factors that users have, such as fingerprint and retina/iris. Hathaliya et al. created a hybrid approach with four phases: sensor registration, patient device registration with biometric data collected, patient registration, and login/authentication phase. Shakil et al. proposed a cloud-based secure biometric authentication (BAMHealthCloud) composed of two components, health data store and security manager. Besides, they incorporated a priority-based parallel algorithm called ALGOHealthSecurityCheck for data access. They used elliptic curve scalar multiplication to perform this change. Weitao et al. implemented a mechanism to gait recognition thanks to the kinetic energy harvester (KEH) with great results. Finally, Patricia et al. proposed a novel authentication method through brainwaves, demonstrating the applicability of this biometric factor. In contrast to biometric approach, mutual-authentication was described by Deebak and Al-Turjman [30], and Alladi et al. [6] as the need to authenticate both sides of the communication. They presented a smart mutual authentication framework constituted by three stages: initialization by service-authority center, registration by a medical sensor, and smart authentication. Alladi et al. explained a Healthcare Authentication Protocol using Resource-constrained IoT devices (HARCI) with key establishment features.

6.2 Main Datasets Implemented to Use in Healthcare

After showing the different research lines of security and privacy mechanisms extracted from the literature, we present the works and datasets developed in the healthcare environment. In two tables we show the healthcare security-focused datasets and the IoT security-focused datasets. The reason behind creating two different tables is the lack of public healthcare security-focused datasets, which has forced us to extract information in other areas that can also be used in the medical environment. One of the causes for the lack of public data can be the grade of sensitivity that healthcare information has (commented in Section 4.2). The methodology followed for finding the datasets has been the use of specific search engines, such as Google Dataset [46], IEEEDataPort [60], and Kaggle [70]. Besides, we have used advanced searches (such as discarding statistic datasets and focused on other environments, e.g., economic sectors) to obtain better results.
We have only found eigth security-focused datasets, highlighting that five of them have been created in 2021. In Table 5, we list these datasets about healthcare security-focused. As an initial detail, we can highlight the year of creation of these datasets. This aspect can draw in a tendency change, where all datasets were private time ago, creating public information of this environment, due to the prominence healthcare has taken. The data of these datasets encompasses different healthcare components, from IoMT devices to EEG brainwaves. First, IoT Healthcare Security Dataset [58] and ECU-IoHT [1], contain normal and malicious traffic collected from a simulated environment. In the case of IoT Healthcare Security Dataset, the data correspond to a hospital room, where sensors and control units was deployed. Bluetack [149] gathers Bluetooth traffic belonging to IoMT devices, where different attacks are applied, such as DoS and DDoS. Meanwhile, EEG Brainwave Dataset [4] was created for industrial insider threat detection. The dataset contains data from 17 volunteer subjects. Another interesting dataset that has not been collected from medical environment is SOREL-20M [51]. We list this dataset here because can be very useful to malware detection inside of healthcare since it contains twenty million of malware samples and can help to train a Machine-Learning solution. The Received Signal Strength Based Gait Authentication dataset [101] includes a different type of data. It collects the received signal strength indicator (RSSI) emitted by wireless devices in WBANs to authenticate the patient. The two last datasets contain patient information, Cyber Incident Detection for EMR [92] and MIMIC Dataset for Anomaly Detection [66] are created for incident detection in Electronic Medical Records (EMR) systems. In the case of MIMIC Dataset for Anomaly Detection, it extracts data from the MIMIC database [68] composed of public EMRs to create a database that serves for anomaly detection.
Table 5.
DatasetYearDevice TypeData SourceDataSizeDetails
Cyber Incident Detection for EMR [92]2017Patient informationElectronic Medical Records (EMR)105MBComplete framework created for detecting threats in EMRs
Received Signal Strength Based Gait Authentication [101]2018Waist device1/2 on-body radio channelRSSI signal4.46MB (Zip file)Study of RSSI signal to authenticate medical devices in WBANs
SOREL-20M [51]2020Network devicesMalware samplesMalware samples & processed features8TB20 million malware samples, which 10 million are disarmed malware samples
IoT Healthcare Security Dataset [58]2021Sensors, central unitNetworkPCAP captures and processed features15.46MBSimulation of healthcare scenario with two patient beds with sensors and one central unit
Bluetack [149]2021Medical devicesBluetoothMeta-information of traffic flow and processed features2.72MBCollected benign and malicious traffic for 52 hours. DDoS and Bluesmack on the L2CAP layer attacks performed
ECU-IoHT [1]2021HealthcareNetworkRaw captures5MBNetwork packets classified with the attack performed
EEG Brainwave Dataset [4]2021Emotiv InsightDevice channelsEEG traffic406KBEEG traffic collected to be used in insider threat detection
MIMIC Dataset for Anomaly Detection [66]2021Patient informationElectronic Medical Records (EMR)91.30kBDataset created to perform anomaly detection
Table 5. Healthcare Security-focused Datasets
Analysing other alternatives seeing the lack of datasets on healthcare security, we present several IoT security-focused datasets in Table 6. The IoT technology is widely used in the medical environment. We can leverage this adoption to complement the initial information that Machine Learning-based solutions need in the training phase to implement security and protection in the healthcare context. We have selected the most recent datasets available and the most significant and realistic projects in this process.
Table 6.
DatasetYearEnvironmentDataSizeDetails
CICIDS2017 [138]2017SimulatedPCAP captures and processed features884.65MBNetwork traffic collected for five days with benign and anomalous traffic
N-BaIoT Dataset [96]2018SimulatedPCAP captures and processed features8GBCollection of benign traffic as well as malicious traffic carried by 2 botnets
Kitsune Network Attack Dataset [100]2018SimulatedPCAP captures and processed features64.18GBCollection of benign traffic as well as malicious traffic of IoT network
IoT Security Dataset [16]2018SimulatedNetwork, resource usage132MBRaspberry Pi with three profiles of IoT devices
IoT Network Intrusion Dataset [72]2019SimulatedPCAP captures and processed features823.69MBSimulated network where attacks like scans, MitM and DoS are executed
Bot-IoT Dataset [102]2019SimulatedProcessed features259.72MBRealistic network where attacks like Data exfiltration and Keylogging are executed
IoT-23 Dataset [45]2020SimulatedPCAP captures and processed features21GBNetwork traffic with infected and non-infected devices in smart home scenario
IoT DoS and DDoS Attack Dataset [57]2020SimulatedPCAP captures and processed features487MB (Zip file)Transform network traffic into images with a CNN model to obtain better results
MQTT-IoT-IDS2020 Dataset [54]2020SimulatedPCAP captures and processed features1.65GB approx.Simulated MQTT network architecture where different attacks are executed
MQTTset [151]2021SimulatedPCAP captures and processed features10GBSimulated MQTT network architecture where different attacks are executed
IoT-BDA Botnet Analysis Dataset [148]2022RealPCAP captures and processed features10GBDataset with data collected from IoT botnets samples by honeypots
Table 6. IoT Security-focused Datasets
In this second category, we have only found eleven IoT security-focused datasets. IoT is a widely studied environment and the years in which these datasets have been released demonstrate this fact, being homogeneously distributed in the time. Firstly, CICIDS2017 [138] was performed with a project where a simulated network was deployed. The traffic was collected for five days and different attacks (i.e., brute force and web attack) were executed. Kitsune Network Attack Dataset [100] presented the larger amount of data related to IoT traffic, including malicious attacks in the collection. N-BaIoT Dataset [96], IoT Security Dataset, [16] and IoT-BDA Botnet Analysis Dataset [148] gave these data from attacks created with botnets. This last dataset [148] was created with real traffic collected by different honeypots. For N-BaIoT Dataset, the attacks were produced with two botnets (Mirai and BASHLITE) having nine IoT devices as main targets. In contrast, IoT Security Dataset simulated three IoT profiles (Multimedia Center, Surveillance Camera, and Surveillance Camera with Additional Traffic profiles) with a Raspberry Pi and executed the attacks on it. Then, IoT Network Intrusion Dataset [72] is a smart home-focused dataset, where IoT devices deployed in this scenario were targets of different attacks. IoT-23 Dataset [45] is a dataset provided of twenty malware captures and three benign captures. This dataset was created by Avast Software, creator of a well-known antivirus. To continue, IoT DoS and DDoS Attack Dataset [57] was produced to address the DoS and DDoS attacks. The work that encompassed this dataset implemented a Convolutional Neural Network (CNN) model to detect such attacks. Finally, two specific datasets are presented, MQTT-IoT-IDS2020 Dataset [54] and MQTTset [151]. The Message Queuing Telemetry Transport (MQTT) protocol is one of the most used in the industry and IoT Machine to Machine. Besides, this protocol is becoming to be used in healthcare environment [132]. For this reason, we present these two datasets simulating an MQTT network architecture, where different attacks are produced, such as brute force and scan attack.

7 Discussion and Challenges

In this survey, different contributions are shown. Namely, a healthcare ecosystem definition, the security, privacy and safety requirements, the threat modelling of attacks targeted to healthcare with MITRE ATT&CK, the research lines available in the literature regarding protection mechanisms, and the datasets created in this environment. The threat and protection mechanisms identification are already available in the literature [108, 119]. However, our survey offers a threat modelling with a widely used framework, providing interoperability, compatibility, a reference framework to compare different related works, and the definition of the main research lines that can suppose an starting point to classify the security mechanisms implemented in healthcare. Hereafter, we discuss the limitations and future work of the research lines presented in Section 6, as well as the challenges identified in cybersecurity terms in the healthcare environment. Different challenges or research areas are discussed below:
Security and privacy mechanisms. Several research lines have been discovered and some challenges or future work have been identified, as shown in Table 4. The blockchain technology offers diverse advantages to healthcare environment, but also different challenges to address, such as the scalability, the mining incentives, and the security [91]. Besides, authentication schemes take an important role in communications, which also needs more secured and advanced key management schemes to improve protection mechanisms [103]. The data aggregation technique can help to the privacy in healthcare, but some aspects of data aggregation have not been covered so far, such as the computation cost or standardization of interfaces or protocols for this field [77]. Finally, the anomaly detection mechanisms need the collection of the context (real-time information) to provide better results in the medical domain [41].
Communication protocols. In Section 2, different standards were presented for telemetry in medical devices. However, works identified a lack of standardization in this area, mainly security-focused [3, 108]. Algarni [3] indicated that there is a large the number of manufacturers and sensor types, functioning each one with a different protocol. On the other hand, Newaz et al. [108] presented different standards, such as IEC 82304-1:2016, ISO/IEC 8001, and IEC/TR 80002 (1-2009, 2-2017, 3-2014), which offer good practices to apply in medical devices. However, they highlighted that these standards do not cover the cybersecurity and privacy protection required for medical devices. In addition, Loncar-Turucalo et al. [83] commented the use of IEEE802.15.6 in WBAN scenarios to provide communication between medical sensors. Hence, different works provided improvements to this protocol in healthcare [33, 152]. As concepts not seen into this challenge, we detect a lack of mentioning (in the reviews analysed) the use of secure protocols, such as Transport Layer Security (TLS), Datagram TLS (DTLS), etc., to protect the communications between medical devices. However, these secure protocols protect the packet content, but personal data could be inferred from the packet headers, affecting the user privacy. Regarding this, privacy-focused protocols could be used (Tor, Virtual Private Network, etc.). Therefore, we conclude that specific work is required to create and propose standards which provides more security and privacy into the medical communications.
Computing paradigms. The healthcare environment comprises many different technologies and data collectors from multiple places. Securing the data sources to masquerade the information and avoid data leakages/breaches supposes a real need in this context. Cloud Computing is widely used in the medical domain to aggregate and publish the information collected from all entities. However, this paradigm presents some issues in mobility support and low latency terms [85]. Fog Computing (bringing processing closer to the source of information) is designed to cover these issues providing some advantages, such as distributed processing, privacy, security, scalability, and fault tolerance, which can be incorporated into the healthcare knowing the requirements of this environment (context awareness, real-time processing, etc.) [105]. However, this paradigm also presents challenges in healthcare in terms of shared resources [105].
Access control. In healthcare, access control is an essential aspect due to the heterogeneity characterising this field. Currently, different works have addressed fine-grained access control to provide security and privacy in this process [31, 123, 161]. Regarding technologies used, Blockchain (presented in Table 4) has also been used to improve the access control mechanism [160]. Furthermore, Sahi et al. [126] showed the importance of privacy-focused access control, which was patient-centric with a graduated access level to the EHRs. In addition, a standard policy creation in the access control could help to improve and manage this distributed scenario which is composed of many different users, sensors, devices, and servers [108].
Trust management. For WBANs and healthcare networks, trust between nodes and sensors should be established. In many cases, incorrect trust management generates different attacks, such as impersonation, sinkhole, device cloning, etc. To this end, Meng et al. [97] included trust as one of the primary mechanisms to prevent and detect intrusion attacks. They incorporated trust mechanisms to a healthcare SDN, but they explained different challenges such as the security policy enforcement and additional security mechanisms. A limited number of works addresses this issue. However, we can highlight Jabeen et al.’s work [64] because they provide a complete view of trust in healthcare systems. They divide trust into hard (created with technical solutions) and soft (non-cryptographic) relations. Finally, Jabeen et al. listed different areas needing more effort with trust mechanisms, such as WBANs (ensuring the trustworthiness between stakeholders), ubiquitous healthcare systems (more research to provide interoperability and portability), and healthcare services availability (cloud reputation evaluation model for healthcare).
Telehealthcare. This approach is created to cover the new needs that healthcare has regarding remote monitoring and diseases management. Telehealthcare consists of uploading the information collected by the sensors in WBANs to the centralised platform available for doctors and healthcare practitioners [52]. However, this technology presents different issues/limitations that should be improved, such as the high availability on telehealth services, since many attacks attempt against this requirement, which is critical for patient safety [88]. Besides, the number of connected devices is also a challenge to properly manage and process the information provided and assure the security and privacy of devices and data.
Open data sources (datasets). In Section 6.2, the lack of public security-focused datasets was identified. This fact is detrimental to creating security mechanisms based on artificial intelligence techniques. For this reason, we point out the need to create simulated scenarios where data can be collected, and datasets may be designed. Furthermore, our work selects this challenge as one of the most interesting ones to continue with because we understand the lack of public datasets as an opportunity to produce important contributions to healthcare. In our mind, an interesting scenario could be composed by a patient with different sensors connected to an application (smartphone) and sent to a central management software able to process and store the information. Moreover, specific attacks (presented in this work) could be executed targeting the sensors/application/central software to create a real use case scenario. This could be beneficial in the research of new approaches and mechanisms to protect healthcare.

8 Conclusion

In this work, a complete holistic view of cybersecurity in healthcare has been presented. We have analysed the architecture and the main stakeholders allocated in this scenario, as well as the obtaining of security, privacy, and safety requirements affecting the medical domain. As a more significant contribution, we have listed the primary threats identified in the literature, formalising them with a widely used framework, MITRE ATT&CK, to provide interoperability, compatibility, and a reference framework to compare different related works. This effort has also provided us the possibility of identifying direct countermeasures defined by each technique classified in the framework. Moreover, we showed the main research lines that appear in the literature regarding security mechanisms on healthcare, as well as the enumeration of the public security-focused datasets available to be used in this field. In addition, different challenges fostered the need of continuing with the efforts in this area, such as security mechanisms, access control, trust management, and telehealthcare, among other. Finally, we point out that this review provides helpful information about cybersecurity healthcare that can be used in future works centered in this field.

References

[1]
Mohiuddin Ahmed, Surender Byreddy, Anush Nutakki, Leslie F. Sikos, and Paul Haskell-Dowland. 2021. ECU-IoHT: A dataset for analyzing cyberattacks in internet of health things. Ad Hoc Network 122, (2021), 9 pages.
[2]
Moshaddique Al Ameen, Jingwei Liu, and Kyungsup Kwak. 2012. Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems 36, 1 (2012), 93–101.
[3]
Abdullah Algarni. 2019. A survey and classification of security and privacy research in smart healthcare systems. IEEE Access 7 (2019), 101879–101894.
[4]
Ahmed Alhammadi et al.2021. EEG Brainwave Dataset. (2021). DOI:DOI:
[5]
Aitizaz Ali et al.2021. Security, privacy, and reliability in digital healthcare systems using blockchain. Electronics 10, 16 (2021), 27 pages.
[6]
Tejasvi Alladi, Vinay Chamola, and Naren. 2021. HARCI: A two-way authentication protocol for three entity healthcare IoT networks. IEEE Journal on Selected Areas in Communications 39, 2 (2021), 361–369.
[7]
Hussain Almohri, Long Cheng, Danfeng Yao, and Homa Alemzadeh. 2017. On threat modeling and mitigation of medical cyber-physical systems. In Proceedings of the 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems, and Engineering Technologies.IEEE, 114–119.
[8]
Riham Altawy and Amr M. Youssef. 2016. Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices. IEEE Access 4 (2016), 959–979.
[9]
Suvini P. Amaraweera and Malka N. Halgamuge. 2019. Internet of things in the healthcare sector: Overview of security and privacy issues. Security, Privacy, and Trust in the IoT Environment. 153–179.
[10]
Ajit Appari and M. Eric Johnson. 2010. Information security and privacy in healthcare: Current state of research. International Journal of Internet and Enterprise Management 6, 4 (2010), 279–314.
[11]
Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, and Thorsten Strufe. 2021. Inexpensive brainwave authentication: New techniques and insights on user acceptance. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21).USENIX Association, 55–72.
[12]
Jeffrey K. Aronson, Carl Heneghan, and Robin E. Ferner. 2020. Medical devices: Definition, classification, and regulatory implications. Drug Safety 43 (2020), 83–93.
[13]
Rachad Atat et al.2018. A physical layer security scheme for mobile health cyber-physical systems. IEEE Internet of Things Journal 5, 1 (2018), 295–309.
[14]
Bachelor’s in Healthcare Practice Management. 2022. Patient Confidentiality in Healthcare. (2022). Retrieved from https://online.maryville.edu/blog/patient-confidentiality.
[15]
Jan H. Beinke, Christian Fitte, and Frank Teuteberg. 2019. Towards a stakeholder-oriented blockchain-based architecture for electronic health records: Design science research study. Journal of Medical Internet Research 21, 10 (2019), 14 pages.
[16]
Vitor H. Bezerra et al.2018. Providing IoT host-based datasets for intrusion detection research. In Proceedings of the 18th Brazilian Symposium on Information and System Security.SBC, 15–28.
[17]
Soumitra S. Bhuyan et al.2020. Transforming healthcare cybersecurity from reactive to proactive: Current status and future recommendations. Journal of Medical Systems 44, (2020), 9 pages.
[18]
Sergio Caltagirone, Andrew Pendergast, and Christopher Betz. 2013. The Diamond Model of Intrusion Analysis. (2013). Retrieved from https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf.
[19]
Carmen Camara, Pedro Peris-Lopez, and Juan E. Tapiador. 2015. Security and privacy issues in implantable medical devices: A comprehensive survey. Journal of Biomedical Informatics 55 (2015), 272–289.
[20]
Nadir A. Carreón, Christa Sonderer, Aakarsh Rao, and Roman Lysecky. 2021. A medical vulnerability scoring system incorporating health and data sensitivity metrics. International Journal of Computer and Information Technology 15, 8 (2021), 458–466.
[21]
Luiz F. M. Carvalho et al.2017. Provider-consumer anomaly detection for healthcare systems. In Proceedings of the 2017 IEEE International Conference on Healthcare Informatics.IEEE, 229–238.
[22]
Anil Chacko and Thaier Hayajneh. 2018. Security and privacy issues with IoT in healthcare. EAI Endorsed Transactions on Pervasive Health and Technology 4, 14 (2018), 7 pages.
[23]
Melissa Chase and Steven C. Coley. 2020. Rubric for Applying CVSS to Medical Devices. (2020). Retrieved from https://www.mitre.org/publications/technical-papers/rubric-for-applying-cvss-to-medical-devices.
[24]
Yiqiang Chen, Xin Qin, Jindong Wang, Chaohui Yu, and Wen Gao. 2020. FedHealth: A federated transfer learning framework for wearable healthcare. IEEE Intelligent Systems 35, 4 (2020), 83–93.
[25]
Emeka Chukwu and Lalit Garg. 2020. A systematic review of blockchain in healthcare: Frameworks, prototypes, and implementations. IEEE Access 8 (2020), 21196–21214.
[26]
Lisa Croke. 2020. Cyberattacks in health care can threaten patient safety. AORN Journal 112, 4 (2020), P5–P5.
[27]
L. Minh Dang, Md. Jalil Piran, Dongil Han, Kyungbok Min, and Hyeonjoon Moon. 2019. A survey on internet of things and cloud computing for healthcare. Electron 8, 7 (2019), 49 pages.
[28]
Salaheddin Darwish, Ilia Nouretdinov, and Stephen D. Wolthusen. 2017. Towards composable threat assessment for medical IoT (MIoT). InProcedia Computer Science, Vol. 113. Elsevier B.V., 627–632.
[29]
D. Stalin David and A. Jeyachandran. 2016. A comprehensive survey of security mechanisms in healthcare applications. In Proceedings of the 2016 International Conference on Communication and Electronics Systems (ICCES).IEEE, 1–6.
[30]
B. D. Deebak and Fadi Al-Turjman. 2021. Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things. IEEE Journal on Selected Areas in Communications 39, 2 (2021), 346–360.
[31]
Steven A. Demurjian, Eugene Sanzi, Thomas P. Agresta, and William A. Yasnoff. 2018. Multi-level security in healthcare using a lattice-based access control model. International Journal of Privacy and Health Information Management 7, 1 (2018), 80–102.
[32]
Pradeep Deshmukh. 2017. Design of cloud security in the EHR for Indian healthcare services. Journal of King Saud University - Computer and Information Sciences 29, 3 (2017), 281–287.
[33]
S. Dharshini and M. Monica Subashini. 2020. DMASK-BAN: Improving the security of body area networks. Computer Fraud & Security 2020, 5 (2020), 13–19.
[34]
Amir Djenna and Diamel E. Saïdouni. 2018. Cyber attacks classification in IoT-based-healthcare infrastructure. In Proceedings of the 2ndCyber Security in Networking Conference (CSNet).IEEE, 1–4.
[35]
Nourhene Ellouze, Mohamed Allouche, Habib B. Ahmed, Slim Rekhis, and Noureddine Boudriga. 2014. Security of implantable medical devices: Limits, requirements, and proposals. Security and Communication Networks 7, 12 (2014), 2475–2491.
[36]
Christian Esposito, Alfredo De Santis, Genny Tortora, Henry Chang, and Kim-Kwang Raymond Choo. 2018. Blockchain: A panacea for healthcare cloud-based data security and privacy?IEEE Cloud Computing 5, 1 (2018), 31–37.
[37]
EU GDPR. 2016. Regulation (EU) 2016/679 (General Data Protection Regulation). (2016). Retrieved from http://data.europa.eu/eli/reg/2016/679/2016-05-04.
[38]
European Medicines Agency. 2022. Science Medicines Health. (2022). Retrieved from https://www.ema.europa.eu.
[39]
European Parliament. 2017. Regulation (EU) 2017/745 on Medical Devices. (2017). Retrieved from https://ec.europa.eu/growth/single-market/european-standards/harmonised-standards/medical-devices_en.
[40]
Aqsa Fatima and Ricardo Colomo-Palacios. 2018. Security aspects in healthcare information systems: A systematic mapping. Procedia Computer Science. 138, 12–19.
[41]
Lorenzo Fernández Maimó et al.2019. Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments. Sensors 19, 5 (2019), 1114.
[42]
Stephen Flowerday and Christos Xenakis. 2022. Security and privacy in distributed healthcare environments. Methods of Information in Medicine. (2022).
[43]
France 24. 2021. Cyber Attacks Hit Two French Hospitals in One Week. (2021). Retrieved from https://www.france24.com/en/europe/20210216-cyber-attacks-hit-two-french-hospitals-in-one-week.
[44]
Raghu K. Ganti, Praveen Jayachandran, Tarek F. Abdelzaher, and John A. Stankovic. 2006. SATIRE: A software architecture for Smart AtTIRE. In Proceedings of the 4th International Conference on Mobile Systems, Applications and Services.ACM, 110–123.
[45]
Sebastian Garcia, Agustin Parmisano, Maria J. Erquiaga, Veronica Valeros, and Maria Rigaki. 2020. IoT-23: A Labeled Dataset with Malicious and Benign IoT Network Traffic. (2020). DOI:
[46]
Google. 2022. Dataset Search. (2022). Retrieved from https://datasetsearch.research.google.com.
[47]
Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, and Neeraj Kumar. 2019. Tactile-internet-based telesurgery system for Healthcare 4.0: An architecture, research challenges, and future directions. IEEE Network 33, 6 (2019), 22–29.
[48]
Hadi Habibzadeh and Tolga Soyata. 2019. Connected Health in Smart Cities. Springer, Cham, Chapter Toward uniform smart healthcare ecosystems: A survey on prospects, security, and privacy considerations, 75–112.
[49]
Anar A. Hady, Ali Ghubaish, Tara Salman, Devrim Unal, and Raj Jain. 2020. Intrusion detection system for healthcare systems using medical and network data: A comparison study. IEEE Access 8 (2020), 106576–106584.
[50]
Bo Han, Zhao Yin-Liang, and Zhu Chang-Peng. 2019. An object proxy-based dynamic layer replacement to protect IoMT applications. Security and Communication Networks 2019, Article 2798571 (2019), 9 pages.
[51]
Richard Harang and Ethan M. Rudd. 2020. SOREL-20M: A large scale benchmark dataset for malicious PE detection. arXiv:2012.07634. Retrieved from https://arxiv.org/abs/2012.07634.
[52]
Jigna J. Hathaliya and Sudeep Tanwar. 2020. An exhaustive survey on security and privacy issues in Healthcare 4.0. Computer Communications 153 (2020), 311–335.
[53]
Jigna J. Hathaliya, Sudeep Tanwar, Sudhanshu Tyagi, and Neeraj Kumar. 2019. Securing electronics healthcare records in Healthcare 4.0: A biometric-based approach. Computers & Electrical Engineering 76 (2019), 398–410.
[54]
Hanan Hindy, Christos Tachtatzis, Robert Atkinson, Ethan Bayne, and Xavier Bellekens. 2020. MQTT-IoT-IDS2020: MQTT Internet of Things Intrusion Detection Dataset. (2020). DOI:
[55]
HIPAA Journal. 2022. HIPAA Compliance Checklist 2022. (2022). https://www.hipaajournal.com/hipaa-compliance-checklist.
[56]
Suyoun Hong, Kwangsoo Kim, and Taekyu Kim. 2019. The design and implementation of simulated threat generator based on MITRE ATT&CK for cyber warfare training. Journal of the Korea Institute of Military Science and Technology 22, 6 (2019), 797–805.
[57]
Faisal Hussain et al.2021. IoT DoS and DDoS Attack Dataset. DOI:
[58]
Faisal Hussain et al.2021. IoT Healthcare Security Dataset. DOI:
[59]
Hassan M. Hussien, Sharifah Md Yasin, Nur I. Udzir, Mohd I. H. Ninggal, and Sadeq Salman. 2021. Blockchain technology in the healthcare industry: Trends and opportunities. Journal of Industrial Information Integration 22, (2021), 100217.
[60]
IEEE. 2022. IEEEDataPort. Retrieved from https://ieee-dataport.org.
[61]
Information Technology Laboratory. 2019. Common Vulnerability Scoring System (CVSS) v3. https://nvd.nist.gov/vuln-metrics/cvss.
[62]
Information Technology Laboratory. 2022. National Vulnerability Database. Retrieved from https://nvd.nist.gov.
[63]
S. M. Riazul Islam, Daehan Kwak, MD. Humaun Kabir, Mahmud Hossain, and Kyung-Sup Kwak. 2015. The internet of things for health care: A comprehensive survey. IEEE Access 3 (2015), 678–708.
[64]
Farhana Jabeen, Zara Hamid, Adnan Akhunzada, Wadood Abdul, and Sanaa Ghouzali. 2018. Trust and reputation management in healthcare systems: Taxonomy, requirements and open issues. IEEE Access 6 (2018), 17246–17263.
[65]
Tallat Jabeen, Humaira Ashraf, and Ata Ullah. 2021. A survey on healthcare data security in wireless body area networks. Journal of Ambient Intelligence and Humanized Computing 12 (2021), 9841–9854.
[66]
Seemandhar Jain. 2021. MIMIC Dataset for Anomaly Detection. DOI:
[67]
Khlood Jastaniah, Ning Zhang, and Mustafa A. Mustafa. 2022. Efficient privacy-friendly and flexible IoT data aggregation with user-centric access control. arXiv:2203.00465. Retrieved from https://arxiv.org/abs/2203.00465.
[68]
Alistair E. W. Johnson et al.2016. MIMIC-III, a freely accessible critical care database. Scientific Data 3, Article 160035 (2016), 9 pages.
[69]
Gulraiz J. Joyia, Rao M. Liaqat, Aftab Farooq, and Saad Rehman. 2017. Internet of medical things (IoMT): Applications, benefits and future challenges in healthcare domain. Journal of Communications 12, 4 (2017), 240–247.
[70]
Kaggle Inc.2022. Kaggle. https://www.kaggle.com.
[71]
Mohan K. Kagita, Navod Thilakarathne, Thippa R. Gadekallu, and Praveen K. R. Maddikunta. 2022. Intelligent Internet of Things for Healthcare and Industry. Springer, Cham, Chapter A review on security and privacy of internet of medical things, 171–187.
[72]
Hyunjae Kang et al.2019. IoT Network Intrusion Dataset. DOI:
[73]
Younghyun Kim et al.2015. Implantable Biomedical Microsystems: Design Principles and Applications. William Andrew Publishing, Oxford, Chapter Reliability and security of implantable and wearable medical devices, 167–199.
[74]
Jeonggil Ko et al.2010. MEDiSN: Medical emergency detection in sensor networks. ACM Transactions on Embedded Computing Systems 10, 1, Article 11 (2010), 29 pages.
[75]
S. Kulaç. 2019. A new externally worn proxy-based protector for non-secure wireless implantable medical devices: Security jacket. IEEE Access 7 (2019), 55358–55366.
[76]
Caleb Kumar. 2017. New dangers in the new world: Cyber attacks in the healthcare industry. Int. J. Sci. Technol. Soc 10, 3 (2017), 1–15.
[77]
Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, and Neeraj Kumar. 2018. Fog computing for Healthcare 4.0 environment: Opportunities and challenges. Computers & Electrical Engineering 72 (2018), 1–13.
[78]
Roger Kwon, Travis Ashley, Jerry Castleberry, Penny Mckenzie, and Sri Nikhil G. Gourisetti. 2020. Cyber threat dictionary using MITRE ATT&CK matrix and NIST cybersecurity framework mapping. In Proceedings of the 2020 Resilience Week (RWS). IEEE, 106–112.
[79]
Young S. Lee, Esko Alasaarela, and HoonJae Lee. 2014. Secure key management scheme based on ECC algorithm for patient’s medical information in healthcare system. In Proceedings of the International Conference on Information Networking.IEEE, 453–457.
[80]
Xuran Li et al.2020. Securing internet of medical things with friendly-jamming schemes. Computer Communications 160 (2020), 431–442.
[81]
Xueping Liang et al.2017. Towards decentralized accountability and self-sovereignty in healthcare systems. In Proceedings of the 19th International Conference on Information and Communications Security.Springer, Cham, 387–398.
[82]
Haibing Liu, Rubén González Crespo, and Oscar Sanjuán Martínez. 2020. Enhancing privacy and data security across healthcare applications using blockchain and distributed ledger concepts. Healthcare 8, 3, Article 243 (2020), 17 pages.
[83]
Tatjana Loncar-Turukalo et al.2019. Literature on wearable technology for connected health: Scoping review of research trends, advances, and barriers. Journal of Medical Internet Research 21, 9, Article e14017 (2019), 23 pages.
[84]
Sabina Magalini et al.2021. Cyberthreats to hospitals: Panacea, a toolkit for people-centric cybersecurity. Journal of Strategic Innovation and Sustainability. 16, 3 (2021), 185–191.
[85]
Mukhtar M. E. Mahmoud et al.2018. Enabling technologies on cloud of things for smart healthcare. IEEE Access 6 (2018), 31950–31967.
[86]
S. Manimurugan et al.2020. Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 8 (2020), 77396–77404.
[87]
Gunasekaran Manogaran, Chandu Thota, Daphne Lopez, and Revathi Sundarasekar. 2017. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Springer, Cham, Chapter Big data security intelligence for healthcare Industry 4.0, 103–126.
[88]
Gastón Márquez, Hernán Astudillo, and Carla Taramasco. 2019. Exploring security issues in telehealth systems. In Proceedings of the IEEE/ACM 1st International Workshop on Software Engineering for Healthcare (SEH).IEEE, 65–72.
[89]
Lockheed Martin. 2011. The Cyber Kill Chain. (2011). Retrieved from https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html.
[90]
Mbarek Marwan, Ali Karti, and Hassan Ouahmane. 2021. Proposal for a secure data sharing and processing in cloud applications for healthcare domain. International Journal of Information Technology and Applied Sciences 3, 1 (2021), 10–17.
[91]
Thomas McGhin, Kim-Kwang R. Choo, Charles Z. Liu, and Debiao He. 2019. Blockchain in healthcare applications: Research challenges and opportunities. Journal of Network and Computer Applications 135 (2019), 62–75.
[92]
David McGlade and Sandra Scott-Hayward. 2019. ML-based cyber incident detection for electronic medical record (EMR) systems. Smart Health 12 (2019), 3–23.
[93]
Aleise Mcgowan, Scott Sittig, and Todd Andel. 2021. Medical internet of things: A survey of the current threat and vulnerability landscape. In Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS).ScholarSpace, 3850–3858.
[94]
Pallavi Meharia and Dharma P. Agrawal. 2016. A hybrid key management scheme for healthcare sensor networks. In Proceedings of the 2016 IEEE International Conference on Communications (ICC).IEEE, 1–6.
[95]
Ruchi Mehta and M. M. Parmar. 2018. Trust based mechanism for securing IoT routing protocol RPL against wormhole&grayhole attacks. In Proceedings of the 3rd International Conference for Convergence of Technology (I2CT).IEEE, 1–6.
[96]
Yair Meidan et al.2018. N-BaIoT–Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Computing 17, 3 (2018), 12–22.
[97]
Weizhi Meng, Kim-Kwang R. Choo, Steven Furnell, Athanasios V. Vasilakos, and Christian W. Probst. 2018. Towards bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Transactions on Network and Service Management 15, 2 (2018), 761–773.
[98]
Microsoft Corporation. 2009. The STRIDE Threat Model. (2009). Retrieved from https://msdn.microsoft.com/library/ee823878.
[99]
Markus Miettinen et al.2017. IoT SENTINEL: Automated device-type identification for security enforcement in IoT. In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems.IEEE, 2177–2184.
[100]
Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: An ensemble of autoencoders for online network intrusion detection. arXiv:1802.09089. Retrieved from https://arxiv.org/abs/1802.09089.
[101]
Marshed Mohamed and Michael Cheffena. 2018. Received signal strength based gait authentication. IIEEE Sensors Journal 18, 16 (2018), 6727–6734.
[102]
Nour Moustafa. 2019. The Bot-IoT Dataset. DOI:
[103]
Lorenzo Mucchi, Sara Jayousi, Alessio Martinelli, Stefano Caputo, and Patrizio Marcocci. 2019. An overview of security threats, solutions and challenges in WBANs for healthcare. In Proceedings of the 13th International Symposium on Medical Information and Communication Technology (ISMICT).IEEE, 1–6.
[104]
Uzma Mustafa, Eckhard Pflugel, and Nada Philip. 2019. A novel privacy framework for secure m-health applications: The case of the GDPR. In Proceedings of the IEEE 12th IInternational Conference on Global Security, Safety and Sustainability (ICGS3).IEEE, 1–9.
[105]
Ammar A. Mutlag, Mohd K. A. Ghani, N. Arunkumar, Mazin A. Mohammed, and Othman Mohd. 2019. Enabling technologies for fog computing in healthcare IoT systems. Future Generation Computer Systems 90 (2019), 62–78.
[106]
Nipuni Nanayakkara, Malka Halgamuge, and Ali Syed. 2019. Security and privacy of internet of medical things (IoMT) based healthcare applications: A review. In Proc. 262nd IIER Int. Conf.Institute for Technology and Research, 1–18.
[107]
Somayeh Nasiri, Farahnaz Sadoughi, Mohammad H. Tadayon, and Afsaneh Dehnad. 2019. Security requirements of internet of things-based healthcare system: A survey study. Acta Informatica Medica 27, 4 (2019), 253–258.
[108]
Akm I. Newaz, Amit K. Sikder, Mohammad A. Rahman, and A. Selcuk Uluagac. 2021. A survey on security and privacy issues in modern healthcare systems: Attacks and defenses. ACM Transactions on Computing for Healthcare 2, 3, Article 27 (2021), 44 pages.
[109]
R. Nidhya, S. Karthik, and G. Smilarubavathy. 2018. An end-to-end secure and energy-aware routing mechanism for IoT-based modern health care system. In Proceedings of the 2018 International Conference on Soft Computing and Signal Processing.Springer, Singapore, 379–388.
[110]
Harun Oz, Ahmet Aris, Albert Levi, and A. Selcuk Uluagac. 2022. A survey on ransomware: Evolution, taxonomy, and defense solutions. ACM Computing Surveys (2022), 36. Just Accepted.
[111]
Alexandros Pantelopoulos and Nikolaos G. Bourbakis. 2010. A survey on wearable sensor-based systems for health monitoring and prognosis. IIEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, 1 (2010), 1–12.
[112]
Maria Papaioannou et al.2022. A survey on security threats and countermeasures in internet of medical things (IoMT). Transactions on Emerging Telecommunications Technologies 33, 6, Article e4049 (2022), 15 pages.
[113]
Juha Partala et al.2013. Security threats against the transmission chain of a medical health monitoring system. In Proceedings of the 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013).IEEE, 243–248.
[114]
Laurie Pycroft and Tipu Z. Aziz. 2018. Security of implantable medical devices with wireless connections: The dangers of cyber-attacks. Expert. Rev. Med. Devices 15, 6 (2018), 403–406.
[115]
Yazdan A. Qadri, Ali Nauman, Yousaf B. Zikria, Athanasios V. Vasilakos, and Sung W. Kim. 2020. The future of healthcare internet of things: A survey of emerging technologies. IEEE Communications Surveys & Tutorials 22, 2 (2020), 1121–1167.
[116]
QED Secure Solutions. 2018. Risk Scoring System for Medical Devices. (2018). Retrieved from https://www.riskscoringsystem.com/medical.
[117]
Sree Ranjani NY, A. G. Ananth, and L. Sudershan Reddy. 2021. Optimal cluster-based data aggregation in WSN for healthcare application. Advances in Dynamical Systems and Applications (ADSA) 16, 2 (2021), 683–701.
[118]
Heena Rathore, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, and Mohsen Guizani. 2017. A review of security challenges, attacks and resolutions for wireless medical devices. In 13th International Wireless Communications and Mobile Computing Conference.IEEE, 1495–1501.
[119]
Abdul Razaque et al.2019. Survey: Cybersecurity vulnerabilities, attacks and solutions in the medical domain. IEEE Access 7 (2019), 168774–168797.
[120]
Zia ur Rehman, Saud Altaf, and Saleem Iqbal. 2019. Survey of authentication schemes for health monitoring: A subset of cyber physical system. In Proceedings of the International Bhurban Conference on Applied Sciences and Technology.IEEE, 653–660.
[121]
Junyu Ren, Jinze Li, Huaxing Liu, and Tuanfa Qin. 2022. Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT. Tsinghua Sci. Technol 27, 4 (2022), 760–776.
[122]
Meghan Roos. 2021. Cyberattack Throws Southern California Hospital System Offline for Days. (2021). Retrieved from https://www.newsweek.com/cyberattack-throws-southern-california-hospital-system-offline-days-1588355.
[123]
Sandip Roy et al.2019. Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. EEE Transactions on Industrial Informatics 15, 1 (2019), 457–468.
[124]
Michael Rushanan, Aviel D. Rubin, Denis F. Kune, and Colleen M. Swanson. 2014. SoK: Security and privacy in implantable medical devices and body area networks. In Proceedings of the IEEE Symposium on Security and Privacy.IEEE, 524–539.
[125]
Tanzila Saba, Khalid Haseeb, Imran Ahmed, and Amjad Rehman. 2020. Secure and energy-efficient framework using internet of medical things for e-healthcare. Journal of Infection and Public Health 13, 10 (2020), 1567–1575.
[126]
Muneeb A. Sahi et al.2018. Privacy preservation in e-healthcare environments: State of the art and future directions. IEEE Access 6 (2018), 464–478.
[127]
Mohammad A. Salahuddin, Ala Al-Fuqaha, Mohsen Guizani, Khaled Shuaib, and Farag Sallabi. 2017. Softwarization of internet of things infrastructure for secure and smart healthcare. IEEE Computer 50, 7 (2017), 74–79.
[128]
Yasmine N. M. Saleh, Claude C. Chibelushi, Ayman A. Abdel-Hamid, and Abdel-Hamid Soliman. 2020. Privacy preservation for wireless sensor networks in healthcare: State of the art, and open research challenges. arXiv:2012.12958. Retrieved from https://arxiv.org/abs/2012.12958.
[129]
Johannes Sametinger, Jerzy Rozenblit, Roman Lysecky, and Peter Ott. 2015. Security challenges for medical devices. Communications of the ACM 58, 4 (2015), 74–82.
[130]
Amal Sammoud, Mohamed Chalouf, Omessaad Hamdi, Nicolas Montavont, and Ammar Bouallegue. 2020. A new biometrics-based key establishment protocol in WBAN: Energy efficiency & security robustness analysis. Computers & Security 96, Article 101838 (2020), 15 pages.
[131]
Pedro M. Sánchez Sánchez et al.2021. A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets. IEEE Communications Surveys & Tutorials 23, 2 (2021), 1048–1077.
[132]
Borade S. Sarierao and Amara Prakasarao. 2018. Smart healthcare monitoring system using MQTT protocol. In Proceedings of the 2018 3rd International Conference for Convergence in Technology.IEEE, 1–5.
[133]
Nader Sehatbakhsh, Monjur Alam, Alireza Nazari, Alenka Zajic, and Milos Prvulovic. 2018. Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust. IEEE, 1–8.
[134]
Farida H. Semantha, Sami Azam, Kheng C. Yeo, and Bharanidharan Shanmugam. 2020. A systematic literature review on privacy by design in the healthcare sector. Electron 9, 3, Article 452 (2020), 29 pages.
[135]
S. A. Senthilkumar, Bharatendara K. Rai, Amruta A. Meshram, Angappa Gunasekaran, and S. Chandrakumarmangalam. 2018. Big data in healthcare management: A review of literature. American Journal of Theoretical and Applied Business 4, 2 (2018), 57–69.
[136]
Kashish A. Shakil, Farhana J. Zareen, Mansaf Alam, and Suraiya Jabin. 2020. BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud. Journal of King Saud University-Computer and Information Sciences 32, 1 (2020), 57–64.
[137]
Salman Shamshad et al.2022. An enhanced scheme for mutual authentication for healthcare services. Digital Communications and Networks 8, 2 (2022), 150–161.
[138]
Iman Sharafaldin, Arash H. Lashkari, and Ali A. Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of the International Conference on Information Systems Security and Privacy.Springer Cham, 108–116.
[139]
A. K. Singh, A. Anand, Z. Lv, H. Ko, and A. Mohan. 2021. A survey on healthcare data: A security perspective. ACM Transactions on Multimidia Computing Communications and Applications 17, 2s, Article 59 (2021), 26 pages.
[140]
Harman Singh. 2021. The GDPR: Sensitive Personal Data, Differences, Examples and Data Protection. (2021). Retrieved from https://thecyphere.com/blog/sensitive-data.
[141]
Haowen Tan and Ilyong Chung. 2018. A secure and efficient group key management protocol with cooperative sensor association in WBANs. Sens 18, 11, Article 3930 (2018), 25 pages.
[142]
Wenjuan Tang, Ju Ren, Kun Deng, and Yaoxue Zhang. 2019. Secure data aggregation of lightweight e-healthcare IoT devices with fair incentives. IEEE Internet of Things Journal 6, 5 (2019), 8714–8726.
[143]
Noshina Tariq, Ayesha Qamar, Muhammad Asim, and Farrukh A. Khan. 2020. Blockchain and smart healthcare security: A survey. Procedia Computer Science 175 (2020), 615–620.
[144]
Matt Tatam, Bharanidharan Shanmugam, Sami Azam, and Krishnan Kannoorpatti. 2021. A review of threat modelling approaches for APT-style attacks. Heliyon 7, 1, Article e05969 (2021), 19 pages.
[145]
Geethapriya Thamilarasu, Adedayo Odesile, and Andrew Hoang. 2020. An intrusion detection system for internet of medical things. IEEE Access 8 (2020), 181560–181576.
[146]
The EU MDR. 2021. Medical Device Regulation (EU) 2017/745 (EU MDR). Retrieved from https://eumdr.com.
[147]
The MITRE Corporation. 2021. MITRE ATT&CK v9.0. https://attack.mitre.org/versions/v9.
[148]
Tolijan Trajanovski and Ning Zhang. 2022. IoT-BDA Botnet Analysis Dataset. DOI:
[149]
Devrim Unal. 2021. BlueTack. DOI:
[150]
U.S. Food & Drug Administration. 2022. Medical Device Safety. Retrieved from https://www.fda.gov/medical-devices/medical-device-safety.
[151]
Ivan Vaccari, Giovanni Chiola, Maurizio Aiello, Maurizio Mongelli, and Enrico Cambiaso. 2020. MQTTset, a new dataset for machine learning techniques on MQTT. Sens 20, 22, Article 6578 (2020), 17 pages.
[152]
Junchao Wang et al.2018. An ASIC implementation of security scheme for body area networks. In Proceedings of the 2018 IEEE international symposium on circuits and systems.IEEE, 1–5.
[153]
Tiankuo Wei and Sicong Liu. 2021. Sparse learning based implantable medical device transmission against eavesdropping. In Proceedings of the 2021 15th International Symposium on Medical Information and Communication Technology (ISMICT).IEEE, 70–75.
[154]
Longfei Wu, Haotian Chi, and Xiaojiang Du. 2018. A secure proxy-based access control scheme for implantable medical devices. arXiv:1803.07751. Retrieved from https://arxiv.org/abs/1803.07751.
[155]
Fan Wu et al.2018. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems 82 (2018), 727–737.
[156]
Weitao Xu et al.2017. KEH-Gait: Towards a mobile healthcare user authentication system by kinetic energy harvesting. In Proc. 2017 Netw. Dist. Syst. Sec. Symp.Internet Society, 1–15.
[157]
Tahreem Yaqoob, Haider Abbas, and Mohammed Atiquzzaman. 2019. Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices–A review. IEEE Communications Surveys and Tutorials 21, 4 (2019), 3723–3768.
[158]
David Zaldivar, Lo’ai A. Tawalbeh, and Fadi Muheidat. 2020. Investigating the security threats on networked medical devices. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference.IEEE, 0488–0493.
[159]
Meng Zhang, Anand Raghunathan, and Niraj K. Jha. 2014. Trustworthiness of medical devices and body area networks. Proceedings of the IEEE 102, 8 (2014), 1174–1188.
[160]
Xiaoshuai Zhang and Stefan Poslad. 2018. Blockchain support for flexible queries with granular access control to electronic medical records (EMR). In Proceedings of the 2018 IEEE International Conference on Communications.IEEE, 1–6.
[161]
Yinghui Zhang, Dong Zheng, and Robert H. Deng. 2018. Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal 5, 3 (2018), 2130–2145.
[162]
Mohammed Zubair, Devrim Unal, Abdulla Al-Ali, and Abdullatif Shikfa. 2019. Exploiting bluetooth vulnerabilities in e-health IoT devices. In Proc. 3rd Int. Conf. Future Netw. Dist. Syst.ACM, Article 10, 7 pages.

Cited By

View all
  • (2025)Empowering Diabetes Management Through Blockchain and Edge Computing: A Systematic Review of Healthcare Innovations and ChallengesIEEE Access10.1109/ACCESS.2025.353135013(14426-14443)Online publication date: 2025
  • (2025)An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare securityScientific Reports10.1038/s41598-024-84691-815:1Online publication date: 8-Jan-2025
  • (2025)Dynamic risk assessment approach for analysing cyber security events in medical IoT networksInternet of Things10.1016/j.iot.2024.10143729(101437)Online publication date: Jan-2025
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 55, Issue 12
December 2023
825 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3582891
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 March 2023
Online AM: 18 November 2022
Accepted: 08 November 2022
Revised: 30 September 2022
Received: 23 December 2021
Published in CSUR Volume 55, Issue 12

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Healthcare datasets
  2. threat taxonomy
  3. safety
  4. framework alignment
  5. review

Qualifiers

  • Survey

Funding Sources

  • European Commission Horizon 2020 Programme

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5,063
  • Downloads (Last 6 weeks)512
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Empowering Diabetes Management Through Blockchain and Edge Computing: A Systematic Review of Healthcare Innovations and ChallengesIEEE Access10.1109/ACCESS.2025.353135013(14426-14443)Online publication date: 2025
  • (2025)An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare securityScientific Reports10.1038/s41598-024-84691-815:1Online publication date: 8-Jan-2025
  • (2025)Dynamic risk assessment approach for analysing cyber security events in medical IoT networksInternet of Things10.1016/j.iot.2024.10143729(101437)Online publication date: Jan-2025
  • (2025)Pseudonym revocation system for IoT-based medical applicationsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110983257:COnline publication date: 1-Feb-2025
  • (2025)Vertical federated learning based on data subset representation for healthcare applicationComputer Methods and Programs in Biomedicine10.1016/j.cmpb.2025.108623263(108623)Online publication date: May-2025
  • (2025)A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunitiesArtificial Intelligence Review10.1007/s10462-024-11101-w58:4Online publication date: 30-Jan-2025
  • (2025)Cybersecurity Risks and Threats in HealthcareArtificial Intelligence-Enabled Security for Healthcare Systems10.1007/978-3-031-82810-2_3(39-64)Online publication date: 1-Mar-2025
  • (2024)SecuTwin for All: Enhancing Disability-focused Healthcare Through Secure Digital Twin Technology and Connected Health MonitoringJournal of Disability Research10.57197/JDR-2024-00933:8Online publication date: 2024
  • (2024)Secure EHR access in the cloud: an alloy-based formalization of ABAC in ‎‎collaborative and non-collaborative models‎STUDIES IN ENGINEERING AND EXACT SCIENCES10.54021/seesv5n2-5905:2(e11282)Online publication date: 29-Nov-2024
  • (2024)Ensuring Sustenance of InnovationAdvances in Enterprise Technology Risk Assessment10.4018/979-8-3693-4211-4.ch006(137-164)Online publication date: 18-Oct-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media