Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives

The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2; also referred to as novel Coronavirus 2019 and COVID-19) have resulted in a global pandemic, with significant health, financial, political, and other implications. There have been various attempts to manage COVID-19 and other pandemics using technologies such as Internet of Things (IoT) and 5G/6G communications. However, we also need to ensure that IoT devices used to facilitate COVID-19 monitoring and treatment (e.g., medical IoT devices) are secured, as the compromise of such devices can have significant consequences (e.g., life-threatening risks to COVID-19 patients). Hence, in this paper we comprehensively survey existing IoT-related solutions, potential security and privacy risks and their requirements. For example, we classify existing security and privacy solutions into five categories, namely: authentication and access control solutions, key management and cryptography solutions, blockchain-based solutions, intrusion detection systems, and privacy-preserving solutions. In each category, we identify the associated challenges. We also identify a number of recommendations to inform future research.

[1]  Helge Janicke,et al.  A Survey of COVID-19 Contact Tracing Apps , 2020, IEEE Access.

[2]  Gerhard P. Hancke,et al.  IoT in the Wake of COVID-19: A Survey on Contributions, Challenges and Evolution , 2020, IEEE Access.

[3]  Rongxing Lu,et al.  An efficient and privacy-Preserving pre-clinical guide scheme for mobile eHealthcare , 2019, J. Inf. Secur. Appl..

[4]  Y. Koucheryavy,et al.  The internet of Bio-Nano things , 2015, IEEE Communications Magazine.

[5]  Xiaolei Dong,et al.  PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems , 2015, IEEE Journal of Selected Topics in Signal Processing.

[6]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[7]  Ali Safaa Sadiq,et al.  A Survey on Deep Transfer Learning to Edge Computing for Mitigating the COVID-19 Pandemic , 2020, Journal of Systems Architecture.

[8]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[9]  Mohamed Amine Ferrag,et al.  Teaching the process of building an Intrusion Detection System using data from a small‐scale SCADA testbed , 2019, Internet Technol. Lett..

[10]  Mohsen Guizani,et al.  A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact , 2020, IEEE Access.

[11]  Fadi Al-Turjman,et al.  A Three Layered Decentralized IoT Biometric Architecture for City Lockdown During COVID-19 Outbreak , 2020, IEEE Access.

[12]  M. Shamim Hossain,et al.  Privacy-Enhanced Data Fusion for COVID-19 Applications in Intelligent Internet of Medical Things , 2020, IEEE Internet of Things Journal.

[13]  Hannah Snyder,et al.  Literature review as a research methodology: An overview and guidelines , 2019, Journal of Business Research.

[14]  Jianfeng Ma,et al.  Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification , 2016, IEEE Journal of Biomedical and Health Informatics.

[15]  Athanasios V. Vasilakos,et al.  Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues , 2018, Telecommun. Syst..

[16]  A. Aman,et al.  IoMT amid COVID-19 pandemic: Application, architecture, technology, and security , 2020, Journal of Network and Computer Applications.

[17]  Chinmay Chakraborty,et al.  Anonymity Preserving IoT-Based COVID-19 and Other Infectious Disease Contact Tracing Model , 2020, IEEE Access.

[18]  Gautam Srivastava,et al.  Efficient and Privacy-Preserving Medical Research Support Platform Against COVID-19: A Blockchain-Based Approach , 2021, IEEE Consumer Electronics Magazine.

[19]  Deepak Puthal,et al.  Software Defined Internet of Things Security: Properties, State of the Art, and Future Research , 2020, IEEE Wireless Communications.

[20]  Ashok Kumar Das,et al.  Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services , 2020, DroneCom@MOBICOM.

[21]  Maysam Ghovanloo,et al.  PANACEA: An Internet of Bio-NanoThings Application for Early Detection and Mitigation of Infectious Diseases , 2020, IEEE Access.

[22]  Vanga Odelu,et al.  A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks , 2017, Wirel. Pers. Commun..

[23]  Yu Wang,et al.  Designing collaborative blockchained signature-based intrusion detection in IoT environments , 2019, Future Gener. Comput. Syst..

[24]  Muhammad Ali Imran,et al.  BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond , 2020, ArXiv.

[25]  Mohamed Amine Ferrag,et al.  Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.

[26]  Athanasios V. Vasilakos,et al.  A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment , 2018, IEEE Journal of Biomedical and Health Informatics.

[27]  Elena Sitnikova,et al.  Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..

[28]  Reda Alhajj,et al.  A Review on Deep Learning Techniques for the Diagnosis of Novel Coronavirus (COVID-19) , 2020, IEEE Access.

[29]  Daojing He,et al.  Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems , 2019, IEEE Network.

[30]  Mohamed Amine Ferrag,et al.  Deep Learning Techniques for Cyber Security Intrusion Detection : A Detailed Analysis , 2019 .

[31]  Rongxing Lu,et al.  Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data , 2019, Journal of Medical Systems.

[32]  Mohamed Amine Ferrag,et al.  Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends , 2019, Secur. Commun. Networks.

[33]  Mika Ylianttila,et al.  The Fight Against the COVID-19 Pandemic With 5G Technologies , 2020, IEEE Engineering Management Review.

[34]  Neeraj Kumar,et al.  ξboost: An AI-Based Data Analytics Scheme for COVID-19 Prediction and Economy Boosting , 2021, IEEE Internet of Things Journal.

[35]  Lei Shu,et al.  Smart Factory of Industry 4.0: Key Technologies, Application Case, and Challenges , 2018, IEEE Access.

[36]  Mohammad S. Obaidat,et al.  BDoTs: Blockchain-based Evaluation Scheme for Online Teaching under COVID-19 Environment , 2020, 2020 International Conference on Computer, Information and Telecommunication Systems (CITS).

[37]  Joel J. P. C. Rodrigues,et al.  On the Design of Blockchain-Based Access Control Protocol for IoT-Enabled Healthcare Applications , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[38]  M. Shamim Hossain,et al.  Explainable AI and Mass Surveillance System-Based Healthcare Framework to Combat COVID-I9 Like Pandemics , 2020, IEEE Network.

[39]  Joel J. P. C. Rodrigues,et al.  Cloud Centric Authentication for Wearable Healthcare Monitoring System , 2019, IEEE Transactions on Dependable and Secure Computing.

[40]  Khaled Salah,et al.  Blockchain for COVID-19: Review, Opportunities, and a Trusted Tracking System , 2020, Arabian journal for science and engineering.

[41]  Heidi Ledford,et al.  The UK has approved a COVID vaccine — here’s what scientists now want to know , 2020, Nature.

[42]  Samiran Chattopadhyay,et al.  Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications , 2019, IEEE Transactions on Industrial Informatics.

[43]  Karrar Hameed Abdulkareem,et al.  Systematic review of artificial intelligence techniques in the detection and classification of COVID-19 medical images in terms of evaluation and benchmarking: Taxonomy analysis, challenges, future solutions and methodological aspects , 2020, Journal of Infection and Public Health.

[44]  Antonios Argyriou,et al.  Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..

[45]  Ashok Kumar Das,et al.  LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment , 2018, IEEE Communications Magazine.

[46]  M. Shamim Hossain,et al.  Adversarial Examples—Security Threats to COVID-19 Deep Learning Systems in Medical IoT Devices , 2020, IEEE Internet of Things Journal.

[47]  Mohamed Amine Ferrag,et al.  Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study , 2020, J. Inf. Secur. Appl..

[48]  Nidal Nasser,et al.  Smart IoT Solutions for Combating the COVID-19 Pandemic , 2020, IEEE Internet Things Mag..

[49]  Manoranjan Paul,et al.  COVID-19 Control by Computer Vision Approaches: A Survey , 2020, IEEE Access.

[50]  Xiang Xie,et al.  COVID-19 and the cardiovascular system , 2020, Nature Reviews Cardiology.

[51]  Mohamed Amine Ferrag,et al.  Security and Privacy Issues and Solutions for Fog , 2020, Fog and Fogonomics.

[52]  Liping Zhang,et al.  Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement , 2018, IEEE Transactions on Industrial Electronics.

[53]  Muhammad Awais,et al.  Performance evaluation of OpenDaylight SDN controller , 2014, 2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS).

[54]  Anandarup Mukherjee,et al.  S-Nav: Safety-Aware IoT Navigation Tool for Avoiding COVID-19 Hotspots , 2020, IEEE Internet of Things Journal.

[55]  Dinggang Shen,et al.  Review of Artificial Intelligence Techniques in Imaging Data Acquisition, Segmentation, and Diagnosis for COVID-19 , 2020, IEEE Reviews in Biomedical Engineering.

[56]  Fadi Al-Turjman,et al.  AI Techniques for COVID-19 , 2020, IEEE Access.

[57]  Martin Johns,et al.  Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning , 2020, USENIX Security Symposium.

[58]  Vinay Chamola,et al.  HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks , 2021, IEEE Journal on Selected Areas in Communications.

[59]  Shu Lih Oh,et al.  Future IoT tools for COVID‐19 contact tracing and prediction: A review of the state‐of‐the‐science , 2021, Int. J. Imaging Syst. Technol..

[60]  Gurjot Singh Gaba,et al.  A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care , 2020, IEEE Internet of Things Journal.

[61]  Geethapriya Thamilarasu,et al.  An Intrusion Detection System for Internet of Medical Things , 2020, IEEE Access.

[62]  Hao Xu,et al.  Privacy-Preserving Contact Tracing and Public Risk Assessment Using Blockchain for COVID-19 Pandemic , 2020, IEEE Internet of Things Magazine.

[63]  H. Fujita,et al.  Using artificial intelligence techniques for COVID-19 genome analysis , 2021, Applied Intelligence.

[64]  Khaled Salah,et al.  Blockchain-based Solution for COVID-19 Digital Medical Passports and Immunity Certificates , 2020 .

[65]  Awais Ahmad,et al.  An IoT-Based Deep Learning Framework for Early Assessment of Covid-19 , 2020, IEEE Internet of Things Journal.

[66]  M. Obaidat,et al.  Contact Tracing Incentive for COVID-19 and Other Pandemic Diseases From a Crowdsourcing Perspective , 2021, IEEE Internet of Things Journal.

[67]  Pavlin Radoslavov,et al.  ONOS: towards an open, distributed SDN OS , 2014, HotSDN.

[68]  Xiaolei Dong,et al.  4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..

[69]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[70]  Haowen Tan,et al.  Practical Homomorphic Authentication in Cloud-Assisted VANETs with Blockchain-Based Healthcare Monitoring for Pandemic Control , 2020 .

[71]  Ing-Ray Chen,et al.  Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems , 2015, IEEE Transactions on Dependable and Secure Computing.

[72]  M. Shamim Hossain,et al.  COVID-19 Networking Demand: An Auction-Based Mechanism for Automated Selection of Edge Computing Services , 2020, IEEE Transactions on Network Science and Engineering.

[73]  Lawrence Carin,et al.  Digital technology and COVID-19 , 2020, Nature Medicine.

[74]  Soo Young Shin,et al.  Efficient Monitoring and Contact Tracing for COVID-19: A Smart IoT-Based Framework , 2020, IEEE Internet of Things Magazine.

[75]  Huimin Lu,et al.  PEA: Parallel electrocardiogram-based authentication for smart healthcare systems , 2018, J. Netw. Comput. Appl..

[76]  Mika Ylianttila,et al.  The Role of Blockchain to Fight Against COVID-19 , 2020, IEEE Engineering Management Review.

[77]  Jian Shen,et al.  A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications , 2018, J. Ambient Intell. Humaniz. Comput..

[78]  Kim-Kwang Raymond Choo,et al.  A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.

[79]  Xiaoxia Liu,et al.  Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM , 2017, IEEE Journal of Biomedical and Health Informatics.

[80]  Abdulkadir Şengür,et al.  Deep learning approaches for COVID-19 detection based on chest X-ray images , 2020, Expert Systems with Applications.

[81]  Prabhat Kumar,et al.  An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks , 2021, Comput. Commun..

[82]  Anish Jindal,et al.  A Decoupled Blockchain Approach for Edge-Envisioned IoT-Based Healthcare Monitoring , 2020, IEEE Journal on Selected Areas in Communications.

[83]  Nasir Saeed,et al.  Body-Centric Terahertz Networks: Prospects and Challenges , 2020, IEEE Transactions on Molecular, Biological and Multi-Scale Communications.