Understanding Cyber Security In Health Sector

Main Article Content

Dr. Janardan Pawar
Dr. Dhanashri Kulkarni
Valmik Dhanwate

Abstract

Digital attacks include extorting money from users, altering, destroying, or gaining access to sensitive data, stopping regular business operations, and more. The medical and health sectors offer numerous potential for cyber security. Digital assaults can take many different forms, such as extorting money from users, destroying, altering, or accessing sensitive material in question areas, interfering with regular corporate operations, etc. Cybersecurity has various prospects in the health and medical sector. This research investigation's main goal is to concentrate safe practices in specific industries. It is very necessary starting with the second generation of computing and will continue to be so till there are computers and data in the digital realm.  The medical fields of today also use digital communication and documentation. Such documents must be protected at the highest possible priority. As healthcare systems have delicate information, it becomes essential to protect such sensitive information from cyber threats. In smart healthcare systems, the patient’s information is periodically collected and transmitted seamlessly to the decision-making system. However, protecting such sensitive data transmission from cyber threats becomes a challenging research problem at the edge layer. This paper addresses the challenges of cyber-attack and this study is greatly applicable for health sector.

Downloads

Download data is not yet available.

Article Details

How to Cite
Dr. Janardan Pawar, Dr. Dhanashri Kulkarni, & Valmik Dhanwate. (2024). Understanding Cyber Security In Health Sector. Journal of Advanced Zoology, 45(S4), 55–64. https://doi.org/10.53555/jaz.v45iS4.4149
Section
Articles
Author Biographies

Dr. Janardan Pawar

Indira College of Commerce and Science, Pune, Maharashtra.

Dr. Dhanashri Kulkarni

Indira College of Commerce and Science, Pune, Maharashtra.

Valmik Dhanwate

Indira College of Commerce and Science, Pune, Maharashtra.

References

Kore, A., Patil, S. IC-MADS: IoT Enabled Cross Layer Man-in-Middle Attack Detection System for Smart Healthcare Application. Wireless Pers Commun 113, 727–746 (2020). https://doi.org/10.1007/s11277-020-07250-0.

Gilbert, E. P. K., Baskaran, K., Rajsingh, E. B., Lydia, M., & Selvakumar, A. I. (2019). Trust aware nature inspired optimised routing in clustered wireless sensor networks. International Journal of Bio-Inspired Computation, 14(2), 103. doi:10.1504/ijbic.2019.101637.

Haseeb, K., Islam, N., Almogren, A., Din, I. U., Almajed, H. N., & Guizani, N. (2019). Secret Sharing-based Energy-aware and Multi-hop Routing Protocol for IoT based WSNs. IEEE Access, 1–1. doi:10.1109/access.2019.2922971.

Alghamdi, T. A. (2018). Secure and Energy Efficient Path Optimization Technique in Wireless Sensor Networks Using DH Method. IEEE Access, 1–1. doi:10.1109/access.2018.2865909.

Kanoosh, Huthaifa & Houssein, Essam & Selim, Mazen. (2019). Salp Swarm Algorithm for Node Localization in Wireless Sensor Networks. Journal of Computer Networks and Communications. 2019. 1-12. 10.1155/2019/1028723.

Sharma, R., Vashisht, V., & Singh, U. (2020). eeTMFO/GA: a secure and energy efficient cluster head selection in wireless sensor networks. Telecommunication Systems. doi:10.1007/s11235-020-00654-0.

Rodrigues, P., John, J. Joint trust: an approach for trust-aware routing in WSN. Wireless Netw (2020). https://doi.org/10.1007/s11276-020-02271-w.

Ramesh, S., & Yaashuwanth, C. (2019). Enhanced approach using trust based decision making for secured wireless streaming video sensor networks. Multimedia Tools and Applications. doi:10.1007/s11042-019-7585-5.

Mabodi, K., Yusefi, M., Zandiyan, S. et al. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J Supercomput 76, 7081–7106 (2020). https://doi.org/10.1007/s11227-019-03137-5.

Agarwal, M, Biswas, S & Nandi, S 2015, ‘Detection of De-Authentication DoS Attacks in Wi-Fi Networks: A Machine Learning Approach,’ in Proc. of IEEE International Conference on Systems, Man, and Cybernetics, pp. 246 – 251

Agarwal, M, Purwar, S, Biswa, S & Nandi, S 2017, ‘Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system,’ in IEEE/CAA Journal of Automatica Sinica, vol. 4, no. 4, pp. 792-808.

Alazab, A, Hobbs, M, Abawajy, J & Khraisat, A 2013, ‘Malware Detection and Prevention System Based on Multi-Stage Rules’, International Journal of Information Security and Privacy (IJISP), vol. 7, no. 2, pp. 29-43.

Alazab, M, & Batten, LM 2015, ‘Survey in Smartphone Malware Analysis Techniques. In M. Dawson, & M. Omar (Eds.)’, New Threats and Countermeasures in Digital Crime and Cyber Terrorism, Hershey, PA: IGI Global, pp. 105-130.

Aminanto, ME, Choi, R, Tanuwidjaja, HC, Yoo, PD & Kim, K 2018, ‘Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection,’ in IEEE Transactions on Information Forensics and Security, vol. 13, no. 3, pp. 621-636.

Banescu, S, Wuchner, T, Salem, A, Guggenmos, M, Ochoa, M & Pretschner, A 2015, ‘A framework for empirical evaluation of malware detection resilience against behavior obfuscation,’ 10thInternational Conference on Malicious and Unwanted Software (MALWARE), Fajardo, pp. 40-47.

Bernhard Seeger, ‘DYNAMIC Not Only has the Engine mattered! Complex Event Processing', Available online: https://db.in.tum.de/hosted/scalableanalytics/presentations/CEP_Dyna mic. pdf, as on 10.11.2017

Beuhring, A & Salous, K 2014, ‘Beyond Blacklisting: Cyberdefense in the Era of APTs,’ in IEEE Security & Privacy, vol. 12, no. 5, pp.90-93.

Beyah, R & Venkataraman, A 2011, ‘Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions,’ IEEE Security & Privacy Magazine, vol. 9, no. 5, pp. 56–61.

Boris Lau & Sophos Plc 2008, ‘Dealing with Virtualization packers -CARO Workshop 2008’, (n.d.). Available online : http://2008.caro.org/program/dealing-with-virtualization-packers.

Brookes, S, Osterloh, M, Denz, R & Taylor, S 2015, ‘The KPLT: The Kernel as a shared object,’ Military Communications Conference, MILCOM IEEE, Tampa, FL, pp. 954-959.

Buhov, D, Huber, M, Merzdovnik, D & Weippl, EV2016, ‘Pin it! Improving Android network security at runtime’, IFIP Networking Conference (IFIP Networking) and Workshops, Vienna, pp. 297-305.

Cabaj, K & Mazurczyk, W 2016, ‘Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall,’ in IEEE Network, vol. 30, no. 6, pp. 14-20

Chamotra, S, Bhatia, JS, Kamal, R & Ramani, AK 2011, ‘Deployment of a low interaction honeypot in an organizational private network,’ International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), Udaipur, pp. 130-135.

He, Tian, Sudha Krishnamurthy, John A. Stankovic, Tarek Abdelzaher, Liqian Luo, Radu Stoleru, Ting Yan, Lin Gu, Jonathan Hui, & Bruce Krogh. “Energy-efficient surveillance system using wireless sensor networks.” In Proceedings of the 2nd international conference on Mobile systems, applications, & services, pp. 270–283. ACM, 2004.

Akyildiz, Ian F., Weilian Su, Yogesh Sankarasubramaniam, & Erdal Cayirci. “Wireless sensor networks: a survey.” Computer networks 38, no. 4 (2002): 393–422.

Nadeem, Adnan, Muhammad Azhar Hussain, Obaidullah Owais, Abdul Salam, Sarwat Iqbal, & Kamran Ahsan. “Application specific study, analysis & classification of body area wireless sensor network applications.” Computer Networks vol. 83, pp. 363–380.2015.

The Mobile Economy, GSMA, 2013.

Kirby, Karen K. “Hours per patient day: not the problem, nor the solution.”Nursing Economics 33, no. 1 (2015): 64.

Rachit, Bhatt, S. & Ragiri, P.R. Security trends in Internet of Things: a survey. SN Appl. Sci. 3, 121 (2021). https://doi.org/10.1007/s42452-021-04156-9.

Bhushan B., Sahoo G. (2020) Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective. In: Gupta B., Perez G., Agrawal D., Gupta D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_27.

Xiaoxia Huang, Hongqiang Zhai, and Yuguang Fang, “Robust Cooperative Routing Protocol in Mobile Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 7, No..12, 2008, pp. 5278-5285.

David Braginsky and Deborah Estrin, “Rumor Routing Algorthim For Sensor Networks.” in 1st ACM international workshop on Wireless sensor networks and applications,2002,pp. 22-31.

Elahmadi Cheikh, Chakkor Saad,Baghori Moustafa, Hajraoui Abderrahmane, “A New Approach to Improving Lifetime in Heterogeneous Wireless Sensor Networks Based on Clustering Energy Efficiency Algorithm”, Journal of Theoretical and Applied Information Technology, Vol. 61, No. 2, March 2014,pp. 405-412.

S. Lindsey and C. Raghavendra. “PEGASIS: Power-Efficient Gathering in Sensor Information Systems”. In IEEE Aerospace Conference 2002, Vol. 3, pp. 1125-1130.

A.V.Sutagundar and S. S. Manvi. “Location Aware Event Driven Multipath Routing in Wireless Sensor Networks: Agent Based Approach”, Egyptan Informatics Journal, Vol.14, No.1,2013, pp. 55-65.

Kee-Young Shin, Junkeun Song, JinWon Kim, Misun Yu, and Pyeong Soo Mah., “ REAR: Reliable Energy Aware Routing Protocol for Wireless Sensor Networks”, in 9th IEEE International Conference on Advanced Communication Technology, Vol. 1,2007, pp. 525-530.

Ghassan Beydoun, Graham Low, and Paul Bogg, “ Suitability Assessment Framework of Agent-Based Software Architectures”,Journal of Information and Software Technology, Elseiver,Vol.55, No.4, 2013, pp. 673-689.

Kim, M., S. Kim, J. Seo, K. Choi and S. Han (2014). CAPNet: An Enhanced Load Balancing Clustering Algorithm for Prolonging Network Lifetime in WSNs International Journal of Distributed Sensor Networks, Vol. 2014, Art. ID 234394, pp. 1-8.

Yu, T., S. Liu and Z. Zhang (2015). A Cluster-based Uneven Grid Data Aggregation in Wireless Sensor Networks, Journal of Computational Information Systems, Vol. 11, No. 19, pp. 7055-7062.

Nam, C.S., Y.S. Han and D.R. Shin (2013). The Cluster-Heads Selection Method considering Energy Balancing for Wireless Sensor Networks, International Journal of Distributed Sensor Networks, Vol. 2013, Article ID 269215, pp. 1-6.

Yuan, F., Y. Zhan and Y. Wang (2014). Data Density Correlation Degree Clustering Method for Data Aggregation in WSN, IEEE Sensors Journal, Vol. 14, No. 4, pp. 1089-1098.

Sabet, M. and H.R. Naji (2015). A decentralized energy efficient hierarchical cluster based routing algorithm for wireless sensor networks, International Journal of Electronics and Communications, Vol. 69, No. 5, pp. 790-799.

Shankar, T. and S. Shanmugavel (2014). Energy Optimization in Cluster Based Wireless Sensor Networks, Journal of Engineering Science and Technology, Vol. 9, No. 2, pp. 246-260.

Tang, C., S.K. Shokla, G. Modhawar and Q. Wang (2016). An Effective Collaborative Mobile Weighted Clustering Schemes for Energy Balancing in Wireless Sensor Networks, Sensors, Vol. 16, No. 2, pp. 1-19.

A. J. Joseph and U. Hari, “Hexagonally sectored routing protocol for wireless sensor networks,” Int. J. Eng., vol. 2, no. 5, pp. 1249–1252, May 2013.

Qi-Ye Zhang, Ze-Ming Sun, Feng Zhang, "A Clustering Routing Protocol for Wireless Sensor Networks Based on Type-2 Fuzzy Logic and ACO", 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) July 6-11, 2014, Beijing, China

Muhammad Amjad ; Muhammad Khalil Afzal ; Tariq Umer ; Byung-Seo Kim, “QoS-Aware and Heterogeneously Clustered Routing Protocol for Wireless Sensor Networks”, IEEE Access ( Volume: 5 ), 2017

Peyman Neamatollahi, Mahmoud Naghibzadeh, Saeid Abrishami, Mohammad-Hossein Yaghmaee,"Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy", IEEE TRANSACTIONS ON MOBILE COMPUTING, TMC-2016-02-0080, 2017

Han, G., Zhou, L., Wang, H., Zhang, W. and Chan, S. (2017), ‘A source location protec- tion protocol based on dynamic routing in wsns for the social internet of things’, Future Generation Computer Systems 82(1), 689–697.

Lee, I.-G. and Kim, M. (2016), ‘Interference-aware self-optimizing wi-fi for high effi- ciency internet of things in dense networks’, Computer Communications 89(1), 60–74.

Mahajan, S., Malhotra, J. and Sharma, S. (2014), ‘An energy balanced qos based cluster head selection strategy for wsn’, Egyptian Informatics Journal 15(3), 189–199.

Khan, B. M., Bilal, R. and Young, R. (2017), ‘Fuzzy-topsis based cluster head selection in mobile wireless sensor networks’, Journal of Electrical Systems and Information Technology 4(3), 89–101.

Wang, W., Hu, L. and Li, Y. (2010), ‘Security analysis of a dynamic program update protocol for wireless sensor networks’, IEEE Communications Letters 14(8), 782–784.

Ke, W., Yangrui, O., Hong, J., Heli, Z. and Xi, L. (2016), ‘Energy aware hierarchical cluster-based routing protocol for wsns’, The Journal of China Universities of Posts and Telecommunications 23(4), 46–52.

Kannan, G. and Raja, T. S. R. (2015), ‘Energy efficient distributed cluster head schedul- ing scheme for two tiered wireless sensor network’, Egyptian Informatics Journal 16(2), 167–174.

Shankar, T., Shanmugavel, S. and Rajesh, A. (2016), ‘Hybrid hsa and pso algorithm for energy efficient cluster head selection in wireless sensor networks’, Swarm and Evolutionary Computation 30(1), 1–10.

Song, L., Chai, K. K., Chen, Y., Schormans, J., Loo, J. and Vinel, A. (2017), ‘Qos- aware energy-efficient cooperative scheme for cluster-based iot systems’, IEEE Systems Journal 11(3), 1447–1455.

Sirdeshpande, N. and Udupi, V. (2017), ‘Fractional lion optimization for cluster head- based routing protocol in wireless sensor network’, Journal of the Franklin Institute 354(11), 4457–4480.

Sharma, R., Vashisht, V., & Singh, U. (2019). Nature Inspired Algorithms for Energy Efficient Clustering in Wireless Sensor Networks. 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). doi:10.1109/confluence.2019.8776618.

Sharma, R., Vashisht, V., & Singh, U. (2019). EEFCM-DE: Energy Efficient Clustering Based on Fuzzy C Means and Differential Evolution Algorithm in Wireless Sensor Networks. IET Communications. doi:10.1049/iet-com.2018.5546.

Pavani, M., & Trinatha Rao, P. (2019). Adaptive PSO with Optimized Firefly Algorithms for Secure Cluster Based Routing in Wireless Sensor Networks. IET Wireless Sensor Systems. doi:10.1049/iet-wss.2018.5227.

Gilbert, E. P. K., Baskaran, K., Rajsingh, E. B., Lydia, M., & Selvakumar, A. I. (2019). Trust aware nature inspired optimised routing in clustered wireless sensor networks. International Journal of Bio-Inspired Computation, 14(2), 103. doi:10.1504/ijbic.2019.101637.

Ramesh, S., & Yaashuwanth, C. (2019). Enhanced approach using trust based decision making for secured wireless streaming video sensor networks. Multimedia Tools and Applications. doi:10.1007/s11042-019-7585-5.

Sharma, R., Vashisht, V., & Singh, U. (2020). eeTMFO/GA: a secure and energy efficient cluster head selection in wireless sensor networks. Telecommunication Systems. doi:10.1007/s11235-020-00654-0.

Mahajan, H.B., Badarla, A. Cross-Layer Protocol for WSN-Assisted IoT Smart Farming Applications Using Nature Inspired Algorithm. Wireless Pers Commun (2021). https://doi.org/10.1007/s11277-021-08866-6.

Shao, N.; Zhou, Z.; Sun, Z. A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks. In Proceedings of the International Conference on Cloud Computing and Security, Nanjing, China, 13–15 August 2015; pp. 157–168.

Luo, W.; Ma, W.; Gao, Q. A dynamic trust management system for wireless sensor networks. Sec. Commun. Netw. 2016, 9, 613–621.

Hu, Zhi & Bie, Yuxia & Zhao, Hong. (2015). Trusted Tree-Based Trust Management Scheme for Secure Routing in Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2015. 1-13. 10.1155/2015/385849.

Li, X.; Zhou, F.; Du, J. A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2013, 8, 924–935.

Jiang, J.; Han, G.; Wang, F.; Shu, L.; Guizani, M. An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1228–1237.

M. M. Ozcelik, E. Irmak and S. Ozdemir, "A hybrid trust based intrusion detection system for wireless sensor networks," 2017 International Symposium on Networks, Computers and Communications (ISNCC), 2017, pp. 1-6, doi: 10.1109/ISNCC.2017.8071998.

Wang, N., Wang, J., & Chen, X. (2019). A Trust-Based Formal Model for Fault Detection in Wireless Sensor Networks. Sensors (Basel, Switzerland), 19(8), 1916. https://doi.org/10.3390/s19081916.

Zhang, T.; Yan, L.; Yang, Y. Trust evaluation method for clustered wireless sensor networks based on cloud model. Wirel. Netw. 2016.

P. T. Sharavanan & D. Sridharan, & R. Kumar, “A Privacy Preservation Secure Cross Layer Protocol Design for IoT Based Wireless Body Area Networks Using ECDSA Framework,” Journal of Medical Systems (2018) 42:196.

Rajeswari, S. R., & Seenivasagam, V. (2016). Comparative Study on Various Authentication Protocols in Wireless Sensor Networks. The Scientific World Journal, 2016, 1–16. doi:10.1155/2016/6854303.

Alhayani, B., Abbas, S.T., Mohammed, H.J., & Mahajan, H. B. Intelligent Secured Two-Way Image Transmission Using Corvus Corone Module over WSN. Wireless Pers Commun (2021). https://doi.org/10.1007/s11277-021-08484-2.

Wang Wei-hong, Lin Yu-bing& Chen Tie-ming 2008, ‘The Study andApplication of Elliptic Curve Cryptography Library on WirelessSensor Network’, 11th IEEE Conference on Communication Technology Proceedings. Hangzhou, pp. 785-788.

Most read articles by the same author(s)