Table of Content

Internet of Things in Healthcare and Health: Security and Privacy

Submission Deadline: 15 June 2022 (closed)

Guest Editors

Prof. Kuo-Hui Yeh, National Dong Hwa University, Taiwan.
Prof. Shi-Cho Cha, National Taiwan University of Science and Technology, Taiwan.
Prof. Yingjiu (Joe) Li, University of Oregon, United States.
Prof. Hu Xiong, University of Electronic Science and Technology of China, China.

Summary

A new paradigm, known as the Internet of Things (IoT), has been extensively focused and promptly deemed as an enabling technology for the next generation healthcare and health systems. At the same time, important security and privacy issues emerge. First, as the IoT technologies bring massive Machine Type Communication (mMTC) use cases, it is important to address the security and privacy issues of massive medical and healthcare equipment connecting to the infrastructure of IoT healthcare and health systems. In addition, innovative technologies, such as Blockchain and 5G, are considered as the underlying information communication technologies of IoT healthcare and health infrastructures. The data confidentiality, integrity and authenticity for these innovative IoT healthcare and health infrastructures become indispensable. Examples are such as supplementary devices or security chips to support the authenticity and integrity of data collected from healthcare and health equipment. Moreover, it is critical to develop security inspection technologies, e.g., analysis tools for vulnerabilities identification and management, for IoT medical and healthcare equipment.

 

Therefore, in this special issue, we aim to focus on the security and privacy for IoT in Healthcare and Health. The objective of this special issue is to attract high-quality research and survey articles that promote research and reflect the most recent advances in addressing the security and privacy issues for IoT in Healthcare and Health. We welcome researchers from both academia and industry to provide their state-of-the-art technologies and ideas covering all aspects of security and privacy solutions for IoT in Healthcare and Health. Topics of interest include but are not limited to the following:

 

• Secure and Privacy-aware Applications for IoT Healthcare and Health

• Secure and Privacy-aware Equipment for IoT Healthcare and Health

• Security and Privacy in Data Analytics for IoT Healthcare and Health

• Detection and Prevention of Malicious IoT Equipment in Healthcare and Health

• Vulnerability Management of IoT Equipment in Healthcare and Health

• Security and Privacy of Massive Medical and Healthcare Machine Type Communications

• Secure and Privacy-aware Framework for IoT Healthcare and Health

• Blockchain Technologies for IoT Healthcare and Health

• Data Confidentiality, Integrity and Authenticity for IoT Healthcare and Health



Published Papers


  • Open Access

    ARTICLE

    Health Data Availability Protection: Delta-XOR-Relay Data Update in Erasure-Coded Cloud Storage Systems

    Yifei Xiao, Shijie Zhou
    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 169-185, 2023, DOI:10.32604/cmes.2022.021795
    (This article belongs to this Special Issue: Internet of Things in Healthcare and Health: Security and Privacy)
    Abstract To achieve the high availability of health data in erasure-coded cloud storage systems, the data update performance in erasure coding should be continuously optimized. However, the data update performance is often bottlenecked by the constrained cross-rack bandwidth. Various techniques have been proposed in the literature to improve network bandwidth efficiency, including delta transmission, relay, and batch update. These techniques were largely proposed individually previously, and in this work, we seek to use them jointly. To mitigate the cross-rack update traffic, we propose DXR-DU which builds on four valuable techniques: (i) delta transmission, (ii) XOR-based data update, (iii) relay, and (iv)… More >

  • Open Access

    ARTICLE

    Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment

    Tsu-Yang Wu, Qian Meng, Lei Yang, Saru Kumari, Matin Pirouz
    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 317-341, 2023, DOI:10.32604/cmes.2022.019595
    (This article belongs to this Special Issue: Internet of Things in Healthcare and Health: Security and Privacy)
    Abstract The development of the Internet of Things has facilitated the rapid development of various industries. With the improvement in people’s living standards, people’s health requirements are steadily improving. However, owing to the scarcity of medical and health care resources in some areas, the demand for remote surgery has gradually increased. In this paper, we investigate remote surgery in the healthcare environment. Surgeons can operate robotic arms to perform remote surgery for patients, which substantially facilitates successful surgeries and saves lives. Recently, Kamil et al. proposed a secure protocol for surgery in the healthcare environment. However, after cryptanalyzing their protocol, we… More >

  • Open Access

    ARTICLE

    B-PesNet: Smoothly Propagating Semantics for Robust and Reliable Multi-Scale Object Detection for Secure Systems

    Yunbo Rao, Hongyu Mu, Zeyu Yang, Weibin Zheng, Faxin Wang, Jiansu Pu, Shaoning Zeng
    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.3, pp. 1039-1054, 2022, DOI:10.32604/cmes.2022.020331
    (This article belongs to this Special Issue: Internet of Things in Healthcare and Health: Security and Privacy)
    Abstract Multi-scale object detection is a research hotspot, and it has critical applications in many secure systems. Although the object detection algorithms have constantly been progressing recently, how to perform highly accurate and reliable multi-class object detection is still a challenging task due to the influence of many factors, such as the deformation and occlusion of the object in the actual scene. The more interference factors, the more complicated the semantic information, so we need a deeper network to extract deep information. However, deep neural networks often suffer from network degradation. To prevent the occurrence of degradation on deep neural networks,… More >

  • Open Access

    ARTICLE

    Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System

    Yanan Chen, Ting Yao, Haiping Ren, Zehao Gan
    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1497-1513, 2022, DOI:10.32604/cmes.2022.019589
    (This article belongs to this Special Issue: Internet of Things in Healthcare and Health: Security and Privacy)
    Abstract The introduction of the electronic medical record (EHR) sharing system has made a great contribution to the management and sharing of healthcare data. Considering referral treatment for patients, the original signature needs to be converted into a re-signature that can be verified by the new organization. Proxy re-signature (PRS) can be applied to this scenario so that authenticity and nonrepudiation can still be insured for data. Unfortunately, the existing PRS schemes cannot realize forward and backward security. Therefore, this paper proposes the first PRS scheme that can provide key-insulated property, which can guarantee both the forward and backward security of… More >

  • Open Access

    ARTICLE

    A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare

    Chien-Ming Chen, Shuangshuang Liu, Shehzad Ashraf Chaudhry, Yeh-Cheng Chen, Muhammad Asghar khan
    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 307-329, 2022, DOI:10.32604/cmes.2022.018749
    (This article belongs to this Special Issue: Internet of Things in Healthcare and Health: Security and Privacy)
    Abstract With the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between patients and people, medical institutions, and medical equipment. However, with the openness of network transmission, the security and privacy of information transmission have become a major problem. Recently, Masud et al. proposed a lightweight anonymous user authentication protocol for IoT medical treatment, claiming that their method can resist various attacks. However, through analysis of the protocol, we observed that their protocol cannot effectively resist privileged internal attacks,… More >

  • Open Access

    ARTICLE

    MIA-UNet: Multi-Scale Iterative Aggregation U-Network for Retinal Vessel Segmentation

    Linfang Yu, Zhen Qin, Yi Ding, Zhiguang Qin
    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.2, pp. 805-828, 2021, DOI:10.32604/cmes.2021.017332
    (This article belongs to this Special Issue: Internet of Things in Healthcare and Health: Security and Privacy)
    Abstract As an important part of the new generation of information technology, the Internet of Things (IoT) has been widely concerned and regarded as an enabling technology of the next generation of health care system. The fundus photography equipment is connected to the cloud platform through the IoT, so as to realize the real-time uploading of fundus images and the rapid issuance of diagnostic suggestions by artificial intelligence. At the same time, important security and privacy issues have emerged. The data uploaded to the cloud platform involves more personal attributes, health status and medical application data of patients. Once leaked, abused… More >

Share Link

WeChat scan