2023
DOI: 10.3390/s23239372
|View full text |Cite
|
Sign up to set email alerts
|

Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework

Mannan Javed,
Noshina Tariq,
Muhammad Ashraf
et al.

Abstract: The increasing reliance on cyber-physical systems (CPSs) in critical domains such as healthcare, smart grids, and intelligent transportation systems necessitates robust security measures to protect against cyber threats. Among these threats, blackhole and greyhole attacks pose significant risks to the availability and integrity of CPSs. The current detection and mitigation approaches often struggle to accurately differentiate between legitimate and malicious behavior, leading to ineffective protection. This pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 117 publications
0
4
0
Order By: Relevance
“…Specification-based methods, as demonstrated by the security mechanism in Secure RPL, offer comprehensive approaches to identify and respond to black hole threats. In [ 14 ], the authors introduce GBG-RPL, a technique leveraging Gini-index and blockchain to detect and mitigate black hole attacks in smart health monitoring CPSs. GBG-RPL not only identifies anomalous activities but also proposes a resilient framework, achieving notable improvements in terms of reduced packet loss, enhanced residual energy utilization, decreased energy consumption, improved attack-detection rate, faster attack-detection time, optimized network management, and reduced end-to-end delay.…”
Section: Related Workmentioning
confidence: 99%
“…Specification-based methods, as demonstrated by the security mechanism in Secure RPL, offer comprehensive approaches to identify and respond to black hole threats. In [ 14 ], the authors introduce GBG-RPL, a technique leveraging Gini-index and blockchain to detect and mitigate black hole attacks in smart health monitoring CPSs. GBG-RPL not only identifies anomalous activities but also proposes a resilient framework, achieving notable improvements in terms of reduced packet loss, enhanced residual energy utilization, decreased energy consumption, improved attack-detection rate, faster attack-detection time, optimized network management, and reduced end-to-end delay.…”
Section: Related Workmentioning
confidence: 99%
“…In smart healthcare, network segmentation is a security practice and defense-in-depth strategy that involves splitting a healthcare organization's network into multiple smaller subnetworks or zones to protect sensitive medical data, reduce congestion, limit system failures, and limit access to the rest of the network [171]. Each segment in an intelligent healthcare setting serves as an extra security layer with access points, login credentials, and firewall protection separated from the others, forming barriers that prevent unauthorized access to SHSs, separating IoMT devices from the rest of the IT, medical devices and services that help in monitoring patients in real-time and remotely and restricting the spread of cyber threats [22]. By implementing a network segmentation policy, smart healthcare providers can control the spread of a cyber-attack and limit the damage caused, provide better access control to network security, improve the flow of traffic between networks, easier network traffic monitoring and threat detection, improve the performance and reliability of the smart healthcare network, better protect sensitive medical data and endpoint devices, reduce the impact of a successful cyberattack, enhance compliance with regulations and standards, such as HIPAA, and secure cloud-based servers [140].…”
Section: Network Segmentationmentioning
confidence: 99%
“…Security audits and testing for smart healthcare networks and systems include vulnerability assessments, compliance checks, penetration testing, vulnerability scanning, access logs and code review, security configuration review, security incident response testing, security awareness training, continuous network traffic monitoring, and third-party assessments [141]. They are essential because they help to ensure sensitive medical data integrity and confidentiality, guarantee the proper functioning of the SHS, track system and healthcare user activities, identify and address potential system vulnerabilities and security incidents, and ensure adherence to industry standards and regulations [22][142] [174][175].…”
Section: Regular Security Audits and Testingmentioning
confidence: 99%
See 1 more Smart Citation