Submitted:
06 November 2024
Posted:
07 November 2024
Read the latest preprint version here
Abstract
Keywords:
1. Introduction
2. Overview of Health Security Systems
| Author(s) | Security System | Synopsis | Mitigated Attacks |
| [9] | WMSNs (Wireless Medical Sensor Networks) | It operates using three-factor authentication to securely verify remote users in WMSNs environments. Additionally, it has been validated using Burrows–Abadi–Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. | Unauthorized Access, Offline Password Guessing Attacks |
| [10] | IDS (Intrusion Detection System) | The proposed IDS is designed to detect network intrusions while minimizing the load on resource-constrained sensors, enhancing security without overburdening limited-capacity devices. | Man-in-the-Middle |
| [11] | Μodified deep learning approach based on Cyber Physical Systems (CPS) | The system uses deep learning and CPS for secure processing of IoT data, providing protection against DoS and DDoS attacks, with 98.2% accuracy and improved performance compared to existing models such as LSTM and CNN. | DoS (Denial of service), DDoS (Distributed Denial of Service) |
| [12] | BioCryptosystem | It enhances the security of biometric data by using FaceHashing with BioCrypto-Circuit and BioCrypto-Protection techniques, offering robust protection against external attacks and misuse. | Unauthorized Access |
| [13] | Energy-Efficient Routing Protocol (ECC-EERP) | This protocol enhances security and energy efficiency in Internet of Medical Things (IoMT) applications by employing elliptic curve cryptography for secure data transmission while minimizing energy consumption and communication overload. | - |
| [14] | N-IDS (Network- Intrusion Detection System) | This system detects intrusions and attacks in a smart healthcare system using a deep learning approach that combines CNN (Convolutional Neural Networks) and LSTM (Long Short-Term Memory) to extract optimal features from network data and detect attacks with high accuracy. | KISTI Network Payload Dataset, KDDCup-99, UNSW-NB15, CICIDS-2017, WSN-DS |
| [15,16,17,18,19,20,21,22,23,24,25,26] | Blockchain | Modern security systems enhance medical data privacy, integrity, and access control in healthcare, enabling secure management of patient records, IoT (Internet of Things) devices, and remote healthcare systems. | Man-in-the-Middle, DDoS (Distributed Denial of Service), Single Point of Failure, Data Tampering, Unauthorized Access, Tampering Attacks, Data Breach, Counterfeit Product Attacks |
| [1] | LRO-S encryption method | It combines lion and remora optimization with serpent encryption to secure medical data, offering enhanced protection against cyber-attacks and privacy breaches, with improved encryption/decryption time and performance compared to existing methods. | Privacy Breaches, Unauthorized Access |
| [27] | QP-CNN (Quantum Photonic Convolutional Neural Network) | The QP-CNN enhances the security of AI-based healthcare systems by utilizing quantum photonic computation for the encryption and protection of patient data during transmission and storage. The study demonstrates its effectiveness through simulations, achieving high accuracy and various performance metrics. | DoS (Denial of service), Stolen Device, Untraceability/ Anonymity, Replay, Man-in-the-Middle, Impersonation, Temporary Secret Leakage Attack |
| [28] | CMTL (Centralized Multi-Source Transfer Learning) | The "EoT-TL Healthcare" system combines edge computing, Internet of Things, blockchain, and cloud technologies for cyberattack detection and data security optimization in healthcare, with high performance evaluated using three datasets. | DoS (Denial of service), DDoS (Distributed De-nial of Service), Malware, Injection, Man-in-the-Middle |
| [29] | Cryptosystem with SHA-256 and Hyper Chaotic Multi Attractors Chen System | It uses DNA encoding, SHA-256, and HCMACS for secure medical image encryption, providing protection against statistical, differential, and brute-force attacks, while ensuring the confidentiality, integrity, and availability of data. | Statistical, Differential, Chosen-Plaintext |
| [30] | Encryption technique | It uses genetic encryption for secure transmission of health data via wireless sensors, while incorporating an authentication process for user verification and preventing malicious attacks. | Blackhole, Selective Forwarding, Sybil, Hello Flood |
| [31] | Zero-watermarking | Uses deep learning and specialized image processing techniques to secretly embed a distinguishing mark in medical images. This prevents unauthorized access or distribution, ensuring the protection and integrity of healthcare records. | Signal Interference, Spatial Manipulation, Communication Protocol Vulnerabilities |
| [32] | PAAF-SHS (Physical Unclonable Authentication Function - Smart Healthcare Systems) | The PAAF-SHS provides secure encrypted communication between users and medical servers using mutual authentication and PUF technology. | Stolen Device, DoS (Denial of service), Replay Attack, Man-in-the-Middle, Phishing, Impersonation, Key Compromise, Insider Threats |
| [33] | Decentralized Adaptive Security Architecture | Dynamically adapts security solutions in real-time to address the constraints of Internet of Medical Things (IoMT) devices, ensuring the protection of data through the implementation of the edge-cloud continuum. | - |
| [34] | CLM-based ECG Encryption System | The system utilizes the Chaotic Logistic Map (CLM) and fingerprint data to encrypt ECG signals, thereby ensuring secure transmission over the internet. | Noise-based attacks, Hacking attacks |
| [35] | Encryption Framework for Secure Telehealth and Electronic Health Records (EHR) | The system utilizes ECG signals and a lightweight encryption algorithm to securely transmit electronic health records (EHR) in telehealth applications, ensuring enhanced data privacy, confidentiality, and access control. | - |
| [36] | IEDF (Intelligent Encryption and Decryption Framework) | It combines the AES, DES, RSA, and Modified Blowfish (MBF) algorithms for cloud data security, using Automatic Sequence Cryptography (ASC) for efficient and secure data block encryption. | Data Breaches |
| [37] | WSNs (Wireless Healthcare Sensor Networks) | This protocol enhances the security of wireless sensor networks used in healthcare by implementing a three-factor authentication strategy that incorporates user identity, password, and biometric data. It ensures robust mutual authentication and protects against various potential attacks. Formally verified using the ProVerif tool. | User Impersonation, Offline Password Guessing Attack, Insider Attack, Device Stolen, GWN Bypassing Attack, DoS (Denial of service), |
| [38] | Image Encryption Framework | The Deep Learning-Based Image Encryption Framework employs ResNet-50 to secure medical images through encryption and decryption, effectively addressing cyber threats and ensuring the confidentiality and integrity of sensitive patient data. | Unauthorized Access, Data Breaches, DoS (Denial of ser-vice), Impersonation Attacks, Replay Attacks |
| [39] | Chaos-Based Lightweight Encryption Scheme | Its 4-scroll chaotic attractor securely encrypts health data, particularly from wearable devices. It ensures confidentiality and integrity while maintaining real-time processing. The method has demonstrated strong resistance to known and chosen plaintext attacks, supported by a large key space and adequate throughput. | Unauthorized Access, Data Breaches, Known-Plaintext, Chosen-Plaintext Attacks |
| [40] | Standard-Based Approach | It utilizes standards such as COSMIC ISO/IEC 19761 to design a secure healthcare system architecture. This method combines system and software security requirements, employing features like access control, data encryption, and auditability to mitigate vulnerabilities and protect against unauthorized access. | Unauthorized Access, Data Breaches, Ransomware, Tampering, Data Corruption |
3. Materials and Methods

4. Results
4.1. Security Systems Based on Blockchain Approaches
4.2. Attack Types and Mitigation Strategies
- Man-in-the-middle (Middleman Attack): the attacker interferes with the communication between two parties, trying to obtain or alter information. The security of key agreement and authentication protocols is verified through the AVISPA tool [26].
- DoS (Denial of Service): Attackers flood the medical server with numerous requests, overwhelming its resources and substantially slowing down or crashing the system, which compromises the availability of medical services [32].
- Blackhole Attack: in this attack, a malicious node interferes with the flow of data by redirecting it to a blank spot and preventing proper transmission in the network [30].
- Selective Forwarding Attack: during this attack, selected data packets - often of a sensitive nature - are dropped by sensors, disrupting the information flow [30].
- Sybil Attack: a malicious node pretends to be multiple different nodes, illegally gaining access to the network and causing a security risk [30].
- Hello Flood Attack: this is an attack where a node sends fake Hello packets, disrupting the communication flow and causing confusion in data transmission [30].
- Privacy Leakage: It involves the loss of sensitive data, mainly due to inadequate protection measures [15].
- Tampering (Data Tampering): Malicious users tamper with medical records, affecting the reliability of the data [15].
- Forgery: Malicious attempts to create fake medical data or transactions for fraudulent purposes [15].
- Single Point of Failure: In traditional systems, there is a central point of vulnerability that can cause total system failure [15].
- Data tampering attacks: they focus on data tampering. The blockchain ensures integrity by preventing tampering [26].
- Forgery attacks: Attempts to create false data. ECC and mobile agents offer protection [26].
- Privacy violation attacks: Revealing personal data. Anonymous authentication protects the personal data of patients and professionals [26].
- Data breach: unauthorized individuals gain access to sensitive information through attacks such as hacking or phishing, causing damage to personal and financial data [36].
- DDoS (Distributed Denial of Service): Coordinated attacks by multiple compromised devices, or a botnet, flood a system with excessive traffic, rendering it inoperative and denying service to legitimate users. This widespread disruption critically affects the availability of medical services [41].
- Ransomware: A type of malware that encrypts a victim's files, demanding a ransom payment for the decryption key. This malware exploits the critical nature of personal and business data, forcing victims to pay to regain access. Ransomware attacks can severely disrupt operations and result in substantial financial and data losses, underlining the importance of robust cybersecurity measures to protect sensitive information [42].
4.3. Ransomware

5. Discussion and Conclusions
6. Future Work
References
- Almalawi, A.; Khan, A.I.; Alsolami, F.; Abushark, Y.B.; Alfakeeh, A.S. Managing Security of Healthcare Data for a Modern Healthcare System. Sensors 2023, 23, 3612. [CrossRef]
- Javaid, M.; Haleem, A.; Singh, R.P.; Suman, R. Towards Insighting Cybersecurity for Healthcare Domains: A Comprehensive Review of Recent Practices and Trends. Cyber Security and Applications 2023, 1, 100016. [CrossRef]
- Lee, I. Analyzing Web Descriptions of Cybersecurity Breaches in the Healthcare Provider Sector: A Content Analytics Research Method. Computers & Security 2023, 129, 103185. [CrossRef]
- Mariettou, S., Koutsojannis, C., Triantafillou V., (2023). Security Systems in Greek Health Care Institutions: a Scoping Review Towards an Effective Benchmarking Approach, International Conferences e-Society 2024 and Mobile Learning 2024, 2024, pp. 53–60.
- Coutinho, B.; Ferreira, J.; Yevseyeva, I.; Basto-Fernandes, V. Integrated Cybersecurity Methodology and Supporting Tools for Healthcare Operational Information Systems. Computers & Security 2023, 129, 103189. [CrossRef]
- Azzaoui, A.E.; Chen, H.; Kim, S.H.; Pan, Y.; Park, J.H. Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems. Sensors 2022, 22, 1371. [CrossRef]
- Andoni, M.; Robu, V.; Flynn, D.; Abram, S.; Geach, D.; Jenkins, D.; McCallum, P.; Peacock, A. Blockchain Technology in the Energy Sector: A Systematic Review of Challenges and Opportunities. Renewable and Sustainable Energy Reviews 2018, 100, 143–174. [CrossRef]
- Riplinger, L.; Piera-Jiménez, J.; Dooling, J.P. Patient Identification Techniques – Approaches, Implications, and Findings. Yearbook of Medical Informatics 2020, 29, 081–086. [CrossRef]
- Ali, R.; Pal, A.K.; Kumari, S.; Sangaiah, A.K.; Li, X.; Wu, F. An Enhanced Three Factor Based Authentication Protocol Using Wireless Medical Sensor Networks for Healthcare Monitoring. Journal of Ambient Intelligence and Humanized Computing 2018, 15, 1165–1186. [CrossRef]
- Hady, A. A., Ghubaish, A., Salman, T., Unal, D., & Jain, R. (2020). Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study. IEEE Access, 8(1), 106576–106584. [CrossRef]
- Kanagala, P. Effective Cyber Security System to Secure Optical Data Based on Deep Learning Approach for Healthcare Application. Optik 2022, 272, 170315. [CrossRef]
- Sardar, A.; Umer, S.; Rout, R.Kr.; Wang, S.-H.; Tanveer, M. A Secure Face Recognition for IoT-Enabled Healthcare System. ACM Transactions on Sensor Networks 2022, 19, 1–23. [CrossRef]
- Natarajan, R.; Lokesh, G.H.; Flammini, F.; Premkumar, A.; Venkatesan, V.K.; Gupta, S.K. A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0. Infrastructures 2023, 8, 22. [CrossRef]
- Ravi, V. Deep Learning-Based Network Intrusion Detection in Smart Healthcare Enterprise Systems. Multimedia Tools and Applications 2023. [CrossRef]
- Tariq, N.; Qamar, A.; Asim, M.; Khan, F.A. Blockchain and Smart Healthcare Security: A Survey. Procedia Computer Science 2020, 175, 615–620. [CrossRef]
- Puri, V.; Kataria, A.; Sharma, V. Artificial Intelligence-powered Decentralized Framework for Internet of Things in Healthcare 4.0. Transactions on Emerging Telecommunications Technologies 2021. [CrossRef]
- Abid, A.; Cheikhrouhou, S.; Kallel, S.; Tari, Z.; Jmaiel, M. A Smart Contract-Based Access Control Framework for Smart Healthcare Systems. The Computer Journal 2022, 67, 407–422. [CrossRef]
- Sharma, P.; Namasudra, S.; Crespo, R.G.; Parra-Fuente, J.; Trivedi, M.C. EHDHE: Enhancing Security of Healthcare Documents in IoT-Enabled Digital Healthcare Ecosystems Using Blockchain. Information Sciences 2023, 629, 703–718. [CrossRef]
- Selvarajan, S.; Mouratidis, H. A Quantum Trust and Consultative Transaction-Based Blockchain Cybersecurity Model for Healthcare Systems. Scientific Reports 2023, 13. [CrossRef]
- Rani, S.; Chauhan, M.; Kataria, A.; Khang, A. IoT Equipped Intelligent Distributed Framework for Smart Healthcare Systems. In Studies in big data; 2023; pp. 97–114.
- Akinola, O.; Akinola, A.; Oyekan, B.; Oyerinde, O.; Adebiyi, H.F.; Sulaimon, B. Blockchain-Enabled Security Solutions for Medical Device Integrity and Provenance in Cloud Environments. International Journal of Scientific Research and Modern Technology 2024, 1–13. [CrossRef]
- Mohammed, M.A.; Lakhan, A.; Zebari, D.A.; Ghani, M.K.A.; Marhoon, H.A.; Abdulkareem, K.H.; Nedoma, J.; Martinek, R. Securing Healthcare Data in Industrial Cyber-Physical Systems Using Combining Deep Learning and Blockchain Technology. Engineering Applications of Artificial Intelligence 2023, 129, 107612. [CrossRef]
- Liu, Y., Wang, X., Zheng, G., Wan, X., & Ning, Z. (2024). An AOI-Aware data transmission algorithm in Blockchain-Based intelligent healthcare systems. IEEE Transactions on Consumer Electronics, 1. [CrossRef]
- Wu, C.; Tang, Y.M.; Kuo, W.T.; Yip, H.T.; Chau, K.Y. Healthcare 5.0: A Secure and Distributed Network for System Informatics in Medical Surgery. International Journal of Medical Informatics 2024, 186, 105415. [CrossRef]
- Mallick, S.R.; Lenka, R.K.; Tripathy, P.K.; Rao, D.C.; Sharma, S.; Ray, N.K. A Lightweight, Secure, and Scalable Blockchain-Fog-IoMT Healthcare Framework with IPFS Data Storage for Healthcare 4.0. SN Computer Science 2024, 5. [CrossRef]
- Idrissi, H.; Palmieri, P. Agent-Based Blockchain Model for Robust Authentication and Authorization in IoT-Based Healthcare Systems. The Journal of Supercomputing 2023, 80, 6622–6660. [CrossRef]
- Kumari, K.S.; Shivaprakash, G.; Arslan, F.; Alsafarini, M.Y.; Ziyadullayevich, A.A.; Haleem, S.L.A.; Arumugam, M. Research on the Quantum Photonic Convolutional Neural Network for Artificial Intelligence-Based Healthcare System Security. Optical and Quantum Electronics 2023, 56. [CrossRef]
- Chakraborty, C.; Nagarajan, S.M.; Devarajan, G.G.; Ramana, T.V.; Mohanty, R. Intelligent AI-Based Healthcare Cyber Security System Using Multi-Source Transfer Learning Method. ACM Transactions on Sensor Networks 2023. [CrossRef]
- Banu, S.A.; Al-Alawi, A.I.; Padmaa, M.; Priya, P.S.; Thanikaiselvan, V.; Amirtharajan, R. Healthcare with Datacare—a Triangular DNA Security. Multimedia Tools and Applications 2023. [CrossRef]
- Jabeen, T.; Jabeen, I.; Ashraf, H.; Jhanjhi, N.Z.; Yassine, A.; Hossain, M.S. An Intelligent Healthcare System Using IoT in Wireless Sensor Network. Sensors 2023, 23, 5055. [CrossRef]
- Anand, A.; Bedi, J.; Aggarwal, A.; Khan, M.A.; Rida, I. Authenticating and Securing Healthcare Records: A Deep Learning-Based Zero Watermarking Approach. Image and Vision Computing 2024, 104975. [CrossRef]
- Aldosary, A.; Tanveer, M. PAAF-SHS: PUF and Authenticated Encryption Based Authentication Framework for the IoT-Enabled Smart Healthcare System. Internet of Things 2024, 101159. [CrossRef]
- Ahmad, I.; Ahmad, I.; Harjula, E. Adaptive Security in 6G for Sustainable Healthcare. In Communications in computer and information science; 2024; pp. 38–47.
- Gopalakrishnan, N.R.; Kumar, N.R.M.S. Cloud Security System for ECG Transmission and Monitoring Based on Chaotic Logistic Maps. Journal of Advanced Research in Applied Sciences and Engineering Technology 2024, 39, 1–18. [CrossRef]
- Wenhua, Z.; Hasan, M.K.; Jailani, N.B.; Islam, S.; Safie, N.; Albarakati, H.M.; Aljohani, A.; Khan, M.A. A Lightweight Security Model for Ensuring Patient Privacy and Confidentiality in Telehealth Applications. Computers in Human Behavior 2024, 153, 108134. [CrossRef]
- Pichandi, K.V.; Janarthanan, V.; Annamalai, T.; Arumugam, M. Enhancing Healthcare in the Digital Era: A Secure e-Health System for Heart Disease Prediction and Cloud Security. Expert Systems With Applications 2024, 255, 124479. [CrossRef]
- Saini, K.K.; Kaur, D.; Kumar, D.; Kumar, B. An Efficient Three-Factor Authentication Protocol for Wireless Healthcare Sensor Networks. Multimedia Tools and Applications 2024. [CrossRef]
- Nadhan, A.S.; Jacob, I.J. Enhancing Healthcare Security in the Digital Era: Safeguarding Medical Images with Lightweight Cryptographic Techniques in IoT Healthcare Applications. Biomedical Signal Processing and Control 2024, 88, 105511. [CrossRef]
- Clemente-Lopez, D.; De Jesus Rangel-Magdaleno, J.; Muñoz-Pacheco, J.M. A Lightweight Chaos-Based Encryption Scheme for IoT Healthcare Systems. Internet of Things 2023, 25, 101032. [CrossRef]
- Abuasal, S.; Alsarayra, K.; Alyabroodie, Z. Designing a Standard-Based Approach for Security of Healthcare Systems. Journal of Statistics Applications & Probability 2024, 13, 419–434. [CrossRef]
- Snehi, M.; Bhandari, A. Vulnerability Retrospection of Security Solutions for Software-Defined Cyber–Physical System against DDoS and IoT-DDoS Attacks. Computer Science Review 2021, 40, 100371. [CrossRef]
- Ali, A. Ransomware: A Research and a Personal Case Study of Dealing with This Nasty Malware Available online: https://www.informingscience.org/Publications/3707.
- Patyal, M.; Sampalli, S.; Qiang, Y.; Rahman, M. Multi-Layered Defense Architecture against Ransomware. International Journal of Business and Cyber Security (IJBCS), 2017, 1, 2.
- Qartah, A.A. Evolving Ransomware Attacks on Healthcare Providers. Utica College 2020. [CrossRef]
- Treadwell, G.W. Preventing Employee Frauds in Small Businesses with Low-Cost Methods. Journal of Business & Accounting 2021, 14, 3.

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
