CFP last date
15 May 2024
Reseach Article

Securing Healthcare Systems in the Era of 6G Networks: A Perspective on the Enabling Technologies

by Chinazunwa Uwaoma
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 42
Year of Publication: 2023
Authors: Chinazunwa Uwaoma
10.5120/ijais2023451954

Chinazunwa Uwaoma . Securing Healthcare Systems in the Era of 6G Networks: A Perspective on the Enabling Technologies. International Journal of Applied Information Systems. 12, 42 ( Nov 2023), 36-41. DOI=10.5120/ijais2023451954

@article{ 10.5120/ijais2023451954,
author = { Chinazunwa Uwaoma },
title = { Securing Healthcare Systems in the Era of 6G Networks: A Perspective on the Enabling Technologies },
journal = { International Journal of Applied Information Systems },
issue_date = { Nov 2023 },
volume = { 12 },
number = { 42 },
month = { Nov },
year = { 2023 },
issn = { 2249-0868 },
pages = { 36-41 },
numpages = {9},
url = { https://www.ijais.org/archives/volume12/number42/securing-healthcare-systems-in-the-era-of-6g-networks-a-perspective-on-the-enabling-technologies/ },
doi = { 10.5120/ijais2023451954 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-11-21T19:28:33.050079+05:30
%A Chinazunwa Uwaoma
%T Securing Healthcare Systems in the Era of 6G Networks: A Perspective on the Enabling Technologies
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 12
%N 42
%P 36-41
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With many sectors rapidly deploying the 5G network in their business processes and operations, researchers are now shifting their focus from 5G to 6G as a new network technology that will usher in remarkable improvements over the previous generations. In the meantime, key technological areas that will be influenced by 6G networks have been identified and these include distributed artificial intelligence, intelligent radio, real-time intelligent edge computing, and 3D intercoms. There are also relevant emerging technologies that support each area and potential use case of 6G. However, these 6G technologies and their applications also have their major security vulnerabilities which need to be addressed before the full implementation of the 6G networks. The healthcare is one of the sectors that are benefiting from the great features introduced in the 5G networks that enhance digital communications and data protection; that notwithstanding, there are still security flaws in 5G technologies that can be transferred to the 6G networks if not properly addressed. This paper provides an explorative survey of the fundamental areas of 6G networks that apply to digital healthcare systems and well-being, as well as the supporting technologies. It also identifies critical vulnerabilities of these technologies and suggests security measures that could be adopted to protect them from being exploited by threat actors.

References
  1. Wang, M., Zhu, T., Zhang, T., Zhang, J., Yu, S., and Zhou, W. 2020. “Security and privacy in 6G networks: New areas and new challenges,” Digital Communications and Networks, vol. 6, no. 3, pp. 281–291.
  2. Campitelli, V., and Angle, J., 2021. “Healthcare Cybersecurity Playbook - An Evolving Landscape 062321,” Cloud Security Alliance, (Jan. 2021).
  3. Huang, T., Yang, W., Wu, J., Ma, J., Zhang, X., and Zhang, D., 2019. “A Survey on Green 6G Network: Architecture and Technologies,” IEEE Access, vol. 7, pp. 175758–175768.
  4. Georgiou, K. E., Georgiou, E., and Satava, R. M., 2021. “5G Use in Healthcare: The Future is Present,” JSLS, vol. 25, no. 4, p. e2021.00064.
  5. Li J.-P. O. et al., 2021. “Digital technology, tele-medicine and artificial intelligence in ophthalmology: A global perspective,” Prog Retin Eye Res, vol. 82, p. 100900.
  6. David, K., and Berndt, H., 2018. “6G Vision and Requirements: Is There Any Need for Beyond 5G?” IEEE Vehicular Technology Magazine, vol. 13, no. 3, pp. 72–80.
  7. Ahad, A., and Tahir, M., 2023. “Perspective—6G and IoT for Intelligent Healthcare: Challenges and Future Research Directions,” ECS Sens. Plus, vol. 2, no. 1, p. 011601.
  8. Mahmoud, H. H. H., Amer, A. A., and Ismail, T., 2021. “6G: A comprehensive survey on technologies, applications, challenges, and research problems,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 4, p. e4233.
  9. Abdel Hakeem, S. A., Hussein, H. H., and Kim, H., 2022. “Security Requirements and Challenges of 6G Technologies and Applications,” Sensors (Basel), vol. 22, no. 5, p. 1969.
  10. Nguyen, V.-L., Lin, P.-C., Cheng, B.-C., Hwang, R.-H., and Lin, Y.-D., 2021. “Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2384–2428.
  11. Gupta, L., Jain, R., and Vaszkun, G., 2016. “Survey of Important Issues in UAV Communication Networks,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1123–1152.
  12. Prados-Garzon, J., Adamuz-Hinojosa, O, Ameigeiras, P., Ramos-Munoz, J. J., Andres-Maldonado, P., and Lopez-Soler, J. M., 2016. “Handover implementation in a 5G SDN-based mobile network architecture.” In Proceedings of IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) pp. 1–6.
  13. Kim, J., Kim, D., and Choi, S., 2017. “3GPP SA2 architecture and functions for 5G mobile communication system,” ICT Express, vol. 3, no. 1, pp. 1–8.
  14. Ahmad, I., Shahabuddin, S., Kumar, T., Okwuibe, J., Gurtov, A., and Ylianttila, M., 2019. “Security for 5G and Beyond,” IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3682–3722.
  15. Lovén, L., et al., 2019. “EdgeAI: A Vision for Distributed, Edge-native Artificial Intelligence in Future 6G Networks,” (2019).
  16. Dang, S., Amin, O., Shihada, B., and Alouini, M.-S., 2020. “What should 6G be?” Nat Electron, vol. 3, no. 1, Art. no. 1.
  17. Nawaz, S. J., Sharma, S. K., Wyne, S., Patwary, M. N., and Asaduzzaman, Md., 2019. “Quantum Machine Learning for 6G Communication Networks: State-of-the-Art and Vision for the Future,” IEEE Access, vol. 7, pp. 46317–46350.
  18. Sattiraju, R., Weinand, A., and Schotten, H., 2019. “AI-assisted PHY technologies for 6G and beyond wireless networks,” arXiv: Signal Processing, (Aug. 2019).
  19. Ucar, S., Coleri Ergen, S., Ozkasap, O., Tsonev, D., and Burchardt, H., 2016. “SecVLC: Secure Visible Light Communication for Military Vehicular Networks.” In Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, (MobiWac ’16). New York, NY, USA: Association for Computing Machinery, pp. 123–129.
  20. Lu, Y., Higgins, M. D., and Leeson, M. S., 2015. “Comparison of Channel Coding Schemes for Molecular Communications Systems,” IEEE Transactions on Communications, vol. 63, no. 11, pp. 3991–4001.
Index Terms

Computer Science
Information Sciences
Cybersecurity
Zero Trust Architecture
Artificial Intelligence

Keywords

6G networks healthcare emerging technologies security measures artificial intelligence edge computing perspective