73
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      Reliable and Secure e-Health Networks

      editorial

      Read this article at

      ScienceOpenPublisherPMC
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Electronic health (e-health) is becoming a norm in our society, particularly in the current COVID-19 pandemic. Consequently, the volume, variety, velocity and veracity of healthcare data are also increasing. Due to the nature of healthcare data (e.g., patient’s medical history and diagnosis), e-health network reliability and security are crucial. While e-health network reliability and security have been the focus of research in recent years, many open research issues remain, particularly as technologies advance. For example, traditional security strategies may not have kept pace with advances in e-health technologies and societal requirements (e.g., increasing privacy regulations). Thus, this special issue presents various state-of-the-art advances and research opportunities on the topics of e-health network reliability and security, covering both theoretical and practical aspects. Specifically, in this special issue twelve (12) research papers were accepted after several rounds of reviews, based on their originality, quality, and merit. The first paper by Pandey et al. [1] presents a solution to detect and thwart the circulation of counterfeit medicines in India through resilient electronic health networks using blockchain. To achieve this, the authors proposed recording the medicine logistics requirements from medicine manufacturing to the patient on the blockchain. The system is simulated using a decentralized network of eleven computer nodes and its performance is compared with other existing methods under different network configurations. The authors’ simulation results showed that the system offers a reliable solution to the menace of fake medicines. The second paper by Kumari et al. [2] proposes improvements to the scheme recently presented by Qiu et al. designed for telecare medical information systems (TMIS). The authors show that Qiu et al.’s protocol is vulnerable to offline password guessing, replay, and anonymity violation attacks. To avoid these weaknesses, the authors developed an improved biometric-based three-factor protocol with added security features. The authors claimed that the proposed protocol is more secure and efficient as compared with other authentication protocols for the healthcare environment. To validate this, they use Burrows–Abadi–Needham (BAN) logic. The third paper by Alzahrani et al. [3] proposes improvements to the new patient healthcare monitoring and authentication protocol presented by Xu et al., designed for WBAN environments. The authors showed that Xu et al.’s protocol is vulnerable to many attacks, including replay attacks and key compromise impersonation attacks, and that it suffers from privacy issues. To avoid these shortcomings, the authors proposed an improved scheme and formally analyzed its security features by implementing BAN logic and an automated simulation tool. The fourth paper by Xie et al. [4] presents a basic RFID authentication protocol for the healthcare environment, based on indistinguishability obfuscation, to prevent the leakage of sensitive data from the backend server. They claimed that their proposed protocol is the first applications of indistinguishability obfuscation in the field of RFID authentication system, as well as being scalable. The fifth paper by Chauhan et al. [5] presents an integrated framework of big data analytics with privacy and security concerns in context with healthcare databases for patients suffering from Human Immunodeficiency Virus (HIV) and Tuberculosis (TB). The proposed framework focuses on the detection of patterns from healthcare databases and generation of patterns for future clinical decision making. Finally, the authors proposed a framework using unsupervised learning techniques in STATA and MATLAB 7.1 to develop patterns for the knowledge discovery process. The authors emphasized that their study can potentially benefit end-users to predict future prognosis of the disease and combinatorial effects in determining varied policies that can assist patients with needs. The sixth paper by Memos et al. [6] proposes a cloud infrastructure for e-health data transmission. In this paper, the authors redesigned the cloud computing model to support better resource allocation, less analysis time of the users’ files and quicker response to the users’ requests to the cloud servers. They proposed a cloud model architecture comprising four layers: (a) the master cloud server, (b) the slave servers, (c) the virtual sub servers and (d) the users connected to the cloud. The authors’ experimental results showed that the proposed layered cloud architecture is more lightweight, efficient, and secure for e-health data transmission. The seventh paper by Goyal et al. [7] presents a posture aware dynamic data delivery (PA-DDD) protocol in WBAN to deal with shadow effect due to body movement and change in posture. To avoid this problem, the authors used an Improved Initial Centroid K-means (IIC K-means) clustering technique for classification of various human body postures followed by back propagation neural network as a classifier to recognize human body posture. The authors’ simulation results showed that the proposed protocol prolongs the network lifetime and is energy efficient. The eighth paper by Rachata et al. [8] proposes a mobile application to provide an efficient self-monitoring, which can encourage patients with type 2 diabetes mellitus and hypertension to improve their health status for preventing themselves from cardiovascular complication. To demonstrate the progression of the health status for the patients, the authors used the trend progression module, modelled with a fuzzy logic-based method. To verify an accuracy of the proposed mobile application, the authors tested one hundred twenty-one patients with type 2 diabetes mellitus and hypertension. Finally, the authors showed that the developed mobile application obtains 92% trend progression accuracy compared with decisions from eleven healthcare professionals and can encourage 85% of patients to improve their health status. The ninth paper by Boubiche et al. [9] reviews the most leading protocols and classify them based the addressed security issue in the wireless sensor networks (WSN). In this paper, the authors outlined the main security constraints and challenges and present the future research directions based on the emerged application fields. The tenth paper by Chaising et al. [10] proposes the personalized recommendation method using integrated objective distance for preventing Cardiovascular Disease (CVD) complication in the elderly. The authors’ experimental results showed that the proposed new measurement can efficiently compute the shortest objective distance between the current health status of elderly individuals and the expected objective level. To verify the proposed model’s accuracy, the authors compared the recommendations for 121 elderly persons with the high risk of developing this critical disease with expert recommendations. Finally, the authors showed that the proposed new approach has a high ability in providing personalized recommendation, which is nearly identical to the expert with 95% accuracy. The eleventh paper by Goyal et al. [11] presents a hybrid Genetic Algorithm (GA) with BAT and Transmission Rate Adaption Policy (TRAP) abbreviated GABAT-TRAP to maximize the energy efficiency of the Wireless Body Area Networks (WBAN) with consideration of both the limitations of Quality of Service (QoS) metrics and dynamic link properties. The authors’ simulation results showed that the proposed scheme improves the energy efficiency of WBAN without violating the QoS parameters such as packet delivery ratio, packet loss rate (PLR), and throughput as compared to other schemes such as TRAP, GA-TRAP, BAT-TRAP, UPA, TPC, and LSEPC. The twelfth paper by Soldatos et al. [12] proposes a platform called SecureIoT to provide security monitoring, security analysis and security automation functionalities on IoT applications that involve smart objects. The authors claimed that the proposed platform enables the collection and analysis of security information from all elements of an IoT systems, including field, edge, and cloud elements. In addition, it allows for the flexible integration of different machine learning and AI models based on the modular and powerful mechanism of IoT security templates. To validate the functionalities, the authors used an Ambient Assisted Living (AAL) system that comprises socially assistive robots. Now that we have summarized all accepted papers, we would like to thank the Editor-in-Chief (Professor Ramjee Prasad), Mr. Meertinus Faber (Project Coordinator) and Mr. Joseph Ian Reyes (Journal’s Editorial Office Assistant) for their support, assistance and for giving us the opportunity to realize this special issue. We also would like to sincerely thank all the authors for their contributions and the subject matter experts for their time and efforts in reviewing the submissions to this special issue. We hope you will enjoy reading this special issue.

          Related collections

          Most cited references12

          • Record: found
          • Abstract: not found
          • Article: not found

          Securing E-health Networks from Counterfeit Medicine Penetration Using Blockchain

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services

                Bookmark

                Author and article information

                Contributors
                htoral@uqroo.edu.mx
                hedebiao@whu.edu.cn
                amihovska@btech.au.dk
                raymond.choo@fulbrightmail.org
                mkhurram@ksu.edu.sa
                Journal
                Wirel Pers Commun
                Wirel Pers Commun
                Wireless Personal Communications
                Springer US (New York )
                0929-6212
                1572-834X
                3 February 2021
                : 1-6
                Affiliations
                [1 ]GRID grid.441185.d, ISNI 0000 0001 1014 9202, Department of Sciences and Engineering, , University of Quintana Roo, Boulevard Bahía s/n Esq. Ignacio Comonfort, ; Col. del Bosque, 77019 Chetumal, Quintana Roo México
                [2 ]GRID grid.49470.3e, ISNI 0000 0001 2331 6153, School of Cyber Science and Engineering, , Wuhan University, ; Wuchang, Wuhan, 430072 Hubei China
                [3 ]GRID grid.7048.b, ISNI 0000 0001 1956 2722, Department of Business Development and Technology, , Aarhus University, ; Birk Centerpark 15, Building 8001, Innovatorium, CGC, 7400 Herning, Denmark
                [4 ]GRID grid.215352.2, ISNI 0000000121845633, Department of Information Systems and Cyber Security, , University of Texas at San Antonio, ; 1 UTSA Cir, San Antonio, TX 78249 USA
                [5 ]GRID grid.56302.32, ISNI 0000 0004 1773 5396, Center of Excellence in Information Assurance, , King Saud University, ; Po Box 92144, Riyadh, 11653 Kingdom of Saudi Arabia
                Article
                8104
                10.1007/s11277-021-08104-z
                7857101
                33558792
                06d52966-04b3-4eee-b99c-08f1e8bd1a1e
                © The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021

                This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.

                History
                Categories
                Editorial

                Comments

                Comment on this article

                scite_
                9
                0
                0
                0
                Smart Citations
                9
                0
                0
                0
                Citing PublicationsSupportingMentioningContrasting
                View Citations

                See how this article has been cited at scite.ai

                scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

                Similar content15

                Cited by2

                Most referenced authors67