Electronic health (e-health) is becoming a norm in our society, particularly in the
current COVID-19 pandemic. Consequently, the volume, variety, velocity and veracity
of healthcare data are also increasing. Due to the nature of healthcare data (e.g.,
patient’s medical history and diagnosis), e-health network reliability and security
are crucial. While e-health network reliability and security have been the focus of
research in recent years, many open research issues remain, particularly as technologies
advance. For example, traditional security strategies may not have kept pace with
advances in e-health technologies and societal requirements (e.g., increasing privacy
regulations). Thus, this special issue presents various state-of-the-art advances
and research opportunities on the topics of e-health network reliability and security,
covering both theoretical and practical aspects.
Specifically, in this special issue twelve (12) research papers were accepted after
several rounds of reviews, based on their originality, quality, and merit.
The first paper by Pandey et al. [1] presents a solution to detect and thwart the
circulation of counterfeit medicines in India through resilient electronic health
networks using blockchain. To achieve this, the authors proposed recording the medicine
logistics requirements from medicine manufacturing to the patient on the blockchain.
The system is simulated using a decentralized network of eleven computer nodes and
its performance is compared with other existing methods under different network configurations.
The authors’ simulation results showed that the system offers a reliable solution
to the menace of fake medicines.
The second paper by Kumari et al. [2] proposes improvements to the scheme recently
presented by Qiu et al. designed for telecare medical information systems (TMIS).
The authors show that Qiu et al.’s protocol is vulnerable to offline password guessing,
replay, and anonymity violation attacks. To avoid these weaknesses, the authors developed
an improved biometric-based three-factor protocol with added security features. The
authors claimed that the proposed protocol is more secure and efficient as compared
with other authentication protocols for the healthcare environment. To validate this,
they use Burrows–Abadi–Needham (BAN) logic.
The third paper by Alzahrani et al. [3] proposes improvements to the new patient healthcare
monitoring and authentication protocol presented by Xu et al., designed for WBAN environments.
The authors showed that Xu et al.’s protocol is vulnerable to many attacks, including
replay attacks and key compromise impersonation attacks, and that it suffers from
privacy issues. To avoid these shortcomings, the authors proposed an improved scheme
and formally analyzed its security features by implementing BAN logic and an automated
simulation tool.
The fourth paper by Xie et al. [4] presents a basic RFID authentication protocol for
the healthcare environment, based on indistinguishability obfuscation, to prevent
the leakage of sensitive data from the backend server. They claimed that their proposed
protocol is the first applications of indistinguishability obfuscation in the field
of RFID authentication system, as well as being scalable.
The fifth paper by Chauhan et al. [5] presents an integrated framework of big data
analytics with privacy and security concerns in context with healthcare databases
for patients suffering from Human Immunodeficiency Virus (HIV) and Tuberculosis (TB).
The proposed framework focuses on the detection of patterns from healthcare databases
and generation of patterns for future clinical decision making. Finally, the authors
proposed a framework using unsupervised learning techniques in STATA and MATLAB 7.1
to develop patterns for the knowledge discovery process. The authors emphasized that
their study can potentially benefit end-users to predict future prognosis of the disease
and combinatorial effects in determining varied policies that can assist patients
with needs.
The sixth paper by Memos et al. [6] proposes a cloud infrastructure for e-health data
transmission. In this paper, the authors redesigned the cloud computing model to support
better resource allocation, less analysis time of the users’ files and quicker response
to the users’ requests to the cloud servers. They proposed a cloud model architecture
comprising four layers: (a) the master cloud server, (b) the slave servers, (c) the
virtual sub servers and (d) the users connected to the cloud. The authors’ experimental
results showed that the proposed layered cloud architecture is more lightweight, efficient,
and secure for e-health data transmission.
The seventh paper by Goyal et al. [7] presents a posture aware dynamic data delivery
(PA-DDD) protocol in WBAN to deal with shadow effect due to body movement and change
in posture. To avoid this problem, the authors used an Improved Initial Centroid K-means
(IIC K-means) clustering technique for classification of various human body postures
followed by back propagation neural network as a classifier to recognize human body
posture. The authors’ simulation results showed that the proposed protocol prolongs
the network lifetime and is energy efficient.
The eighth paper by Rachata et al. [8] proposes a mobile application to provide an
efficient self-monitoring, which can encourage patients with type 2 diabetes mellitus
and hypertension to improve their health status for preventing themselves from cardiovascular
complication. To demonstrate the progression of the health status for the patients,
the authors used the trend progression module, modelled with a fuzzy logic-based method.
To verify an accuracy of the proposed mobile application, the authors tested one hundred
twenty-one patients with type 2 diabetes mellitus and hypertension. Finally, the authors
showed that the developed mobile application obtains 92% trend progression accuracy
compared with decisions from eleven healthcare professionals and can encourage 85%
of patients to improve their health status.
The ninth paper by Boubiche et al. [9] reviews the most leading protocols and classify
them based the addressed security issue in the wireless sensor networks (WSN). In
this paper, the authors outlined the main security constraints and challenges and
present the future research directions based on the emerged application fields.
The tenth paper by Chaising et al. [10] proposes the personalized recommendation method
using integrated objective distance for preventing Cardiovascular Disease (CVD) complication
in the elderly. The authors’ experimental results showed that the proposed new measurement
can efficiently compute the shortest objective distance between the current health
status of elderly individuals and the expected objective level. To verify the proposed
model’s accuracy, the authors compared the recommendations for 121 elderly persons
with the high risk of developing this critical disease with expert recommendations.
Finally, the authors showed that the proposed new approach has a high ability in providing
personalized recommendation, which is nearly identical to the expert with 95% accuracy.
The eleventh paper by Goyal et al. [11] presents a hybrid Genetic Algorithm (GA) with
BAT and Transmission Rate Adaption Policy (TRAP) abbreviated GABAT-TRAP to maximize
the energy efficiency of the Wireless Body Area Networks (WBAN) with consideration
of both the limitations of Quality of Service (QoS) metrics and dynamic link properties.
The authors’ simulation results showed that the proposed scheme improves the energy
efficiency of WBAN without violating the QoS parameters such as packet delivery ratio,
packet loss rate (PLR), and throughput as compared to other schemes such as TRAP,
GA-TRAP, BAT-TRAP, UPA, TPC, and LSEPC.
The twelfth paper by Soldatos et al. [12] proposes a platform called SecureIoT to
provide security monitoring, security analysis and security automation functionalities
on IoT applications that involve smart objects. The authors claimed that the proposed
platform enables the collection and analysis of security information from all elements
of an IoT systems, including field, edge, and cloud elements. In addition, it allows
for the flexible integration of different machine learning and AI models based on
the modular and powerful mechanism of IoT security templates. To validate the functionalities,
the authors used an Ambient Assisted Living (AAL) system that comprises socially assistive
robots.
Now that we have summarized all accepted papers, we would like to thank the Editor-in-Chief
(Professor Ramjee Prasad), Mr. Meertinus Faber (Project Coordinator) and Mr. Joseph
Ian Reyes (Journal’s Editorial Office Assistant) for their support, assistance and
for giving us the opportunity to realize this special issue. We also would like to
sincerely thank all the authors for their contributions and the subject matter experts
for their time and efforts in reviewing the submissions to this special issue. We
hope you will enjoy reading this special issue.