Abstract
Abstract6G will fulfill the requirements of future digital healthcare systems through emerging decentralized computing and secure communications technologies. Digital healthcare solutions employ numerous low-power and resource-constrained connected things, such as the Internet of Medical Things (IoMT). However, the current digital healthcare solutions will face two major challenges. First, the proposed solutions are based on the traditional IoT-Cloud model that will experience latency and reliability challenges to meet the expectations and requirements of digital healthcare, while potentially inflicting heavy network load. Second, the existing digital healthcare solutions will face security challenges due to the inherent limitations of IoMT caused by the lack of resources for proper security in those devices. Therefore, in this research, we present a decentralized adaptive security architecture for the successful deployment of digital healthcare. The proposed architecture leverages the edge-cloud continuum to meet the performance, efficiency, and reliability requirements. It can adapt the security solution at run-time to meet the limited capacity of IoMT devices without compromising the security of critical data. Finally, the research outlines comprehensive methodologies for validating the proposed security architecture.
Publisher
Springer Nature Switzerland
Reference26 articles.
1. Recommendation m.2160-0 (11/2023) framework and overall objectives of the future development of IMT for 2030 and beyond. Technical report. International Telecommunication Union (2023). https://www.itu.int/rec/R-REC-M.2160-0-202311-I/en
2. Abdellatif, A.A., Mohamed, A., Chiasserini, C.F., Tlili, M., Erbad, A.: Edge computing for smart health: context-aware approaches, opportunities, and challenges. IEEE Network 33(3), 196–203 (2019). https://doi.org/10.1109/MNET.2019.1800083
3. Ahmad, I., et al.: Edge computing for critical environments: vision and existing solutions. arXiv preprint arXiv:2411.7567v1 (2023)
4. Ahmad, I., et al.: Communications security in industry X: a survey. IEEE Open J. Commun. Soc. 5, 982–1025 (2024). https://doi.org/10.1109/OJCOMS.2024.3356076
5. Aman, W.: Assessing the feasibility of adaptive security models for the Internet of Things. In: Tryfonas, T. (ed.) Human Aspects of Information Security, Privacy, and Trust, HAS 2016. LNCS, vol. 9750, pp. 201–211. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39381-0_18
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献