IoT Health Data in Electronic Health Records (EHR): Security and Privacy Issues in Era of 6G
Keywords:wearable sensors; eHealth; healthcare; 6G; nternet of Things; Internet of Medical Things; Electronic Health Record; EHR
Millions of wearable devices with embedded sensors (e.g., fitness trackers) are present in daily lives of its users, with the number growing continuously, especially with the approaching 6G communication technology. These devices are helping their users in monitoring daily activities and promoting positive health habits. Potential integration of such collected data into central medical system would lead to more personalized healthcare and an improved patient-physician experience. However, this process is met with several challenges, as medical data is of a highly sensitive nature. This paper focuses on the security and privacy issues for such a process. After providing a comprehensive list of security and privacy threats relevant to data collection and its handling within a Central Health Information system, the paper addresses the challenges of designing a secure system and offeres recommendations, solutions and guidelines for identified pre-6G and 6G security and privacy issues.
S. S. Kumar, “Emerging Technologies and Sensors That Can Be Used During the COVID-19 Pandemic,” 2020 International Conference on UK-China Emerging Technologies (UCET), 2020, pp. 1–4, doi: 10.1109/UCET51115.2020.9205424.
Fitness Tracker Market Size, Share & COVID-19 Impact Analysis (2020–2027), Fortune Business Insights, Oct 2020.
P. Huang, C. Lin, Y. Wang and H. Hsieh, “Development of Health Care System Based on Wearable Devices,” 2019 Prognostics and System Health Management Conference (PHM-Paris), 2019, pp. 249–252, doi: 10.1109/PHM-Paris.2019.00049.
R. Qian, “Healthcare on Consumer-grade Wearable Devices,” 2020 IEEE 3rd International Conference of Safe Production and Informatization (IICSPI), 2020, pp. 298–303, doi: 10.1109/IICSPI51290.2020.9332400.
G. Assenza, C. Fioravanti, S. Guarino and V. Petrassi, “New Perspectives on Wearable Devices and Electronic Health Record Systems,” 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020, pp. 740–745, doi: 10.1109/MetroInd4.0IoT48571.2020.9138170.
X. Ding et al., “Wearable Sensing and Telehealth Technology with Potential Applications in the Coronavirus Pandemic,” in IEEE Reviews in Biomedical Engineering, vol. 14, pp. 48–70, 2021, doi: 10.1109/RBME.2020.2992838.
K. Ueafuea et al., “Potential Applications of Mobile and Wearable Devices for Psychological Support During the COVID-19 Pandemic: A Review,” in IEEE Sensors Journal, vol. 21, no. 6, pp. 7162–7178, 15 March 15, 2021, doi: 10.1109/JSEN.2020.3046259.
F. A. A. Naqiyuddin, W. Mansor, N. M. Sallehuddin, M. N. S. Mohd Johari, M. A. S. Shazlan and A. N. Bakar, “Wearable Social Distancing Detection System,” 2020 IEEE International RF and Microwave Conference (RFM), 2020, pp. 1–4, doi: 10.1109/RFM50841.2020.9344786.
K. Grifantini, “Tracking Sleep to Optimize Health,” in IEEE Pulse, vol. 11, no. 5, pp. 12–16, Sept.–Oct. 2020, doi: 10.1109/MPULS.2020.3022142.
N. Khiadani, “Vision, Requirements and Challenges of Sixth Generation (6G) Networks,” 2020 6th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS), 2020, pp. 1–4, doi: 10.1109/ICSPIS51611.2020.9349580.
C. Yizhan, W. Zhong, H. Da and L. Ruosen, “6G Is Coming : Discussion on Key Candidate Technologies and Application Scenarios,” 2020 International Conference on Computer Communication and Network Security (CCNS), 2020, pp. 59–62, doi: 10.1109/CCNS50731.2020.00022.
F. Guo, F. R. Yu, H. Zhang, X. Li, H. Ji and V. C. M. Leung, “Enabling Massive IoT Toward 6G: A Comprehensive Survey,” in IEEE Internet of Things Journal, vol. 8, no. 15, pp. 11891–11915, 1 Aug.1, 2021, doi: 10.1109/JIOT.2021.3063686.
D. C. Nguyen et al., “6G Internet of Things: A Comprehensive Survey,” in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3103320.
Evenson KR, Goto MM, Furberg RD. Systematic review of the validity and reliability of consumer-wearable activity trackers. Int J Behav Nutr Phys Act. Dec 2015. doi: 10.1186/s12966-015-0314-1.
Feehan LM, Geldman J, Sayre EC, Park C, Ezzat AM, Yoo JY, Hamilton CB, Li LC. “Accuracy of Fitbit Devices: Systematic Review and Narrative Syntheses of Quantitative Data. JMIR Mhealth Uhealth”, Aug 2018. doi: 10.2196/10527.
M. G. Rahman, M. Z. Islam, T. Bossomaier and Junbin Gao, “CAIRAD: A co-appearance-based analysis for Incorrect Records and Attribute-values Detection,” The 2012 International Joint Conference on Neural Networks (IJCNN), Brisbane, QLD, 2012, pp. 1–10.
M. G. Rahman, M. Z. Islam, “FIMUS: A decision tree-based missing value imputation technique for data pre-processing,” Volume 56 Issue C, January 2014, pp. 311–327.
O. Salem, A. Guerassimov, A. Mehaoua, A. Marcus and B. Furht, “Sensor fault and patient anomaly detection and clas-sification in medical wireless sensor networks,” 2013 IEEE International Conference on Communications (ICC), Budapest, 2013, pp. 4373–4378.
D. Yang et al., “A Novel Adaptive Spectrum Noise Cancellation Approach for Enhancing Heartbeat Rate Monitoring in a Wearable Device,” in IEEE Access, vol. 6, pp. 8364–8375, 2018.
Koren, A., Jurèević, M. & Prasad, R. “Comparison of Data-Driven Models for Cleaning eHealth Sensor Data: Use Case on ECG Signal”. Wireless Personal Communications 114, 1501–1517 (2020). doi.org/10.1007/s11277-020-07435-7.
A. Koren, M. Jurèević, R. Prasad, “Semantic Constraints Specification and Schematron-based Validation for Internet of Medical Things’ Data”
H. Fereidooni, T. Frassetto, M. Miettinen, A. Sadeghi and M. Conti, “Fitness Trackers: Fit for Health but Unfit for Security and Privacy,” 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017, pp. 19–24, doi: 10.1109/CHASE.2017.54.
K. Lotfy and M. L. Hale, “Assessing Pairing and Data Exchange Mechanism Security in the Wearable Internet of Things,” 2016 IEEE International Conference on Mobile Services (MS), 2016, pp. 25–32, doi: 10.1109/MobServ.2016.15.
M. L. Hale, D. Ellis, R. Gamble, C. Waler and J. Lin, “Secu Wear: An Open Source, Multi-component Hardware/Software Platform for Exploring Wearable Security,” 2015 IEEE International Conference on Mobile Services, 2015, pp. 97–104, doi: 10.1109/MobServ.2015.23.
S. Anwar, D. Anwar and S. Abdulla, “Security Evaluation of Android Mobile Healthcare and Fitness Applications,” 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), 2020, pp. 1–6, doi: 10.1109/ICECCE49384.2020.9179431.
R. Saha, S. Sarkar and S. K. Datta, “Balancing security & sharing of fitness trackers’ data,” 2017 1st International Conference on Electronics, Materials Engineering and Nanotechnology (IEMENTech), 2017, pp. 1–6, doi: 10.1109/IEMENTECH.2017.8076942.
M. Rahman, B. Carbunar and U. Topkara, “SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers,” 2014 IEEE 22nd International Conference on Network Protocols, Raleigh, NC, 2014, pp. 191–196.
A. R. Shekar, “Preventing Data Manipulation and Enhancing the Security of data in Fitness Mobile Application,” 2019 International Conference on Smart Systems and Inventive Technology (ICSSIT), 2019, pp. 740–745, doi: 10.1109/ICSSIT46314.2019.8987892.
A. Kazlouski, T. Marchioro, H. Manifavas and E. Markatos, “Do partner apps offer the same level of privacy protection? The case of wearable applications,” 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2021, pp. 648–653, doi: 10.1109/PerComWorkshops51409.2021.9431018.
E. Schomakers, C. Lidynia and M. Ziefle, “Listen to My Heart? How Privacy Concerns Shape Users’ Acceptance of e-Health Technologies,” 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, pp. 306–311, doi: 10.1109/WiMOB.2019.8923448.
M. S. Rahman, “Does Privacy Matters When We are Sick? An Extended Privacy Calculus Model for Healthcare Technology Adoption Behavior,” 2019 10th International Conference on Information and Communication Systems (ICICS), 2019, pp. 41–46, doi: 10.1109/IACS.2019.8809175.
Y. Siriwardhana, P. Porambage, M. Liyanage and M. Ylianttila, “AI and 6G Security: Opportunities and Challenges,” 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2021, pp. 616–621, doi: 10.1109/EuCNC/6GSummit51104.2021.9482503.
M. Zuhair, F. Patel, D. Navapara, P. Bhattacharya and D. Saraswat, “BloCoV6: A blockchain-based 6G-assisted UAV contact tracing scheme for COVID-19 pandemic,” 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 2021, pp. 271–276, doi: 10.1109/ICIEM51511.2021.9445332.
Rodrigues, J. J., De la Torre, I., Fernández, G., and López-Coronado M., (2013), “Analysis of the security and privacy requirements of cloud-based Electronic Health Records Systems,” Journal of Medical Internet Research, vol. 15, no. 8, 2013.
J. Mnjama, G. Foster and B. Irwin, “A privacy and security threat assessment framework for consumer health wearables,” 2017 Information Security for South Africa (ISSA), 2017, pp. 66–73, doi: 10.1109/ISSA.2017.8251776.
I. L. Pribadi and M. Suryanegara, “Regulatory recommendations for IoT smart-health care services by using privacy impact assessment (PIA),” 2017 15th International Conference on Quality in Research (QiR), International Symposium on Electrical and Computer Engineering, 2017, pp. 491–496, doi: 10.1109/QIR.2017.8168535.
N. Wang, P. Wang, A. Alipour-Fanid, L. Jiao, and K. Zeng, “PhysicalLayer Security of 5G Wireless Networks for IoT: Challenges and Opportunities,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8169–8181, 2019.
Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A Survey on Security and Privacy Issues in Internet-of-Things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017.
I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, and A. Gurtov, “Overview of 5G Security Challenges and Solutions,” IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 36–43, 2018.
R. Khan, P. Kumar, D. N. K. Jayakody, and M. Liyanage, “A survey on security and privacy of 5g technologies: Potential solutions, recent advancements, and future directions,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 196–248, 2019.
P. Ranaweera, A. D. Jurcut, and M. Liyanage, “Survey on Multi-Access Edge Computing Security and Privacy,” IEEE Communications Surveys Tutorials, pp. 1–1, 2021.
S. Wijethilaka and M. Liyanage, “Survey on network slicing for internet of things realization in 5g networks,” IEEE Communications Surveys & Tutorials, 2021.
K. M. S. Huq, J. Rodriguez and I. E. Otung, “3D Network Modeling for THz-Enabled Ultra-Fast Dense Networks: A 6G Perspective,” in IEEE Communications Standards Magazine, vol. 5, no. 2, pp. 84–90, June 2021, doi: 10.1109/MCOMSTD.001.2000048.
C. Benzaid and T. Taleb, “AI for Beyond 5G Networks: A CyberSecurity Defense or Offense Enabler?” IEEE Network, vol. 34, no. 6, pp. 140–147, 2020.
I. H. Abdulqadder, S. Zhou, D. Zou, I. T. Aziz, and S. M. A. Akber, “Multi-layered Intrusion Detection and Prevention in the SDN/NFV enabled Cloud of 5G Networks using AI-based Defense Mechanisms,” Computer Networks, vol. 179, p. 107364, 2020.
J.-H. Cho, D. P. Sharma, H. Alavizadeh, S. Yoon, N. Ben-Asher, T. J. Moore, D. S. Kim, H. Lim, and F. F. Nelson, “Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 709–745, 2020.
J. Biamonte, P. Wittek, N. Pancotti, P. Rebentrost, N. Wiebe, and S. Lloyd, “Quantum Machine Learning,” Nature, vol. 549, no. 7671, pp. 195–202, 2017.