1
|
Junaid SB, Imam AA, Balogun AO, De Silva LC, Surakat YA, Kumar G, Abdulkarim M, Shuaibu AN, Garba A, Sahalu Y, Mohammed A, Mohammed TY, Abdulkadir BA, Abba AA, Kakumi NAI, Mahamad S. Recent Advancements in Emerging Technologies for Healthcare Management Systems: A Survey. Healthcare (Basel) 2022; 10:1940. [PMID: 36292387 PMCID: PMC9601636 DOI: 10.3390/healthcare10101940] [Citation(s) in RCA: 8] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/01/2022] [Revised: 09/26/2022] [Accepted: 09/28/2022] [Indexed: 11/16/2022] Open
Abstract
In recent times, the growth of the Internet of Things (IoT), artificial intelligence (AI), and Blockchain technologies have quickly gained pace as a new study niche in numerous collegiate and industrial sectors, notably in the healthcare sector. Recent advancements in healthcare delivery have given many patients access to advanced personalized healthcare, which has improved their well-being. The subsequent phase in healthcare is to seamlessly consolidate these emerging technologies such as IoT-assisted wearable sensor devices, AI, and Blockchain collectively. Surprisingly, owing to the rapid use of smart wearable sensors, IoT and AI-enabled technology are shifting healthcare from a conventional hub-based system to a more personalized healthcare management system (HMS). However, implementing smart sensors, advanced IoT, AI, and Blockchain technologies synchronously in HMS remains a significant challenge. Prominent and reoccurring issues such as scarcity of cost-effective and accurate smart medical sensors, unstandardized IoT system architectures, heterogeneity of connected wearable devices, the multidimensionality of data generated, and high demand for interoperability are vivid problems affecting the advancement of HMS. Hence, this survey paper presents a detailed evaluation of the application of these emerging technologies (Smart Sensor, IoT, AI, Blockchain) in HMS to better understand the progress thus far. Specifically, current studies and findings on the deployment of these emerging technologies in healthcare are investigated, as well as key enabling factors, noteworthy use cases, and successful deployments. This survey also examined essential issues that are frequently encountered by IoT-assisted wearable sensor systems, AI, and Blockchain, as well as the critical concerns that must be addressed to enhance the application of these emerging technologies in the HMS.
Collapse
Affiliation(s)
| | - Abdullahi Abubakar Imam
- School of Digital Science, Universiti Brunei Darussalam, Brunei Darussalam, Jalan Tungku Link, Gadong BE1410, Brunei
| | - Abdullateef Oluwagbemiga Balogun
- Department of Computer Science, University of Ilorin, Ilorin 1515, Nigeria
- Department of Computer and Information Science, Universiti Teknologi PETRONAS, Sri Iskandar 32610, Malaysia
| | | | | | - Ganesh Kumar
- Department of Computer and Information Science, Universiti Teknologi PETRONAS, Sri Iskandar 32610, Malaysia
| | - Muhammad Abdulkarim
- Department of Computer Science, Ahmadu Bello University, Zaria 810211, Nigeria
| | - Aliyu Nuhu Shuaibu
- Department of Electrical Engineering, University of Jos, Bauchi Road, Jos 930105, Nigeria
| | - Aliyu Garba
- Department of Computer Science, Ahmadu Bello University, Zaria 810211, Nigeria
| | - Yusra Sahalu
- SEHA Abu Dhabi Health Services Co., Abu Dhabi 109090, United Arab Emirates
| | - Abdullahi Mohammed
- Department of Computer Science, Ahmadu Bello University, Zaria 810211, Nigeria
| | | | | | | | - Nana Aliyu Iliyasu Kakumi
- Patient Care Department, General Ward, Saudi German Hospital Cairo, Taha Hussein Rd, Huckstep, El Nozha, Cairo Governorate 4473303, Egypt
| | - Saipunidzam Mahamad
- Department of Computer and Information Science, Universiti Teknologi PETRONAS, Sri Iskandar 32610, Malaysia
| |
Collapse
|
2
|
A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats. Symmetry (Basel) 2022. [DOI: 10.3390/sym14030549] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/25/2023] Open
Abstract
Information security is one of the most important attributes of distributed systems that often operate on unreliable networks. Enabling security features during the development of a distributed system requires the careful analysis of potential attacks or threats in different contexts, a process often referred to as «threat modeling». Information protection should be comprehensive, but it is also necessary to take into account the possibility of the emergence of threats specific to a certain information system. Many public and private organizations are still trying to implement system models and the threats directed at them on their own. The main reason for this is the lack of useful and high-quality methodologies that can help developers design system models. This review explores a variety of the literature on confidentiality- and integrity-aware system design methodologies, as well as threat classification methods, and identifies key issues that may be referenced by organizations to make design system processes easier. In particular, this article takes a look at the extent to which existing methodologies cover objects of protection and methods of classifying threats, as well as whether there are such models of systems in which the object itself and the threats directed at it are described. This includes whether the compiled models exhibit symmetry or asymmetry. This literature research shows that methodologies appear to be heterogeneous and versatile, since existing methodologies often only focus on one object of protection (a system). Based on the given analysis, it can be concluded that the existing methodologies only relate superficially to the description of system models and threats, and it is necessary to develop a more complete abstract model of the protected object and threats aimed at it in order to make this model suitable for any organization and protect it against most threats.
Collapse
|
3
|
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques. ELECTRONICS 2021. [DOI: 10.3390/electronics10212647] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.
Collapse
|