key: cord-0770452-mmgjo0hx authors: Toral-Cruz, Homero; He, Debiao; Mihovska, Albena D.; Choo, Kim-Kwang Raymond; Khan, Muhammad Khurram title: Reliable and Secure e-Health Networks date: 2021-02-03 journal: Wirel Pers Commun DOI: 10.1007/s11277-021-08104-z sha: 4e18b8db2f1f7ff9a0e1cb9f2de761bc3783aa90 doc_id: 770452 cord_uid: mmgjo0hx nan using blockchain. To achieve this, the authors proposed recording the medicine logistics requirements from medicine manufacturing to the patient on the blockchain. The system is simulated using a decentralized network of eleven computer nodes and its performance is compared with other existing methods under different network configurations. The authors' simulation results showed that the system offers a reliable solution to the menace of fake medicines. The second paper by Kumari et al. [2] proposes improvements to the scheme recently presented by Qiu et al. designed for telecare medical information systems (TMIS). The authors show that Qiu et al.'s protocol is vulnerable to offline password guessing, replay, and anonymity violation attacks. To avoid these weaknesses, the authors developed an improved biometric-based three-factor protocol with added security features. The authors claimed that the proposed protocol is more secure and efficient as compared with other authentication protocols for the healthcare environment. To validate this, they use Burrows-Abadi-Needham (BAN) logic. The third paper by Alzahrani et al. [3] proposes improvements to the new patient healthcare monitoring and authentication protocol presented by Xu et al., designed for WBAN environments. The authors showed that Xu et al.'s protocol is vulnerable to many attacks, including replay attacks and key compromise impersonation attacks, and that it suffers from privacy issues. To avoid these shortcomings, the authors proposed an improved scheme and formally analyzed its security features by implementing BAN logic and an automated simulation tool. The fourth paper by Xie et al. [4] presents a basic RFID authentication protocol for the healthcare environment, based on indistinguishability obfuscation, to prevent the leakage of sensitive data from the backend server. They claimed that their proposed protocol is the first applications of indistinguishability obfuscation in the field of RFID authentication system, as well as being scalable. The fifth paper by Chauhan et al. [5] presents an integrated framework of big data analytics with privacy and security concerns in context with healthcare databases for patients suffering from Human Immunodeficiency Virus (HIV) and Tuberculosis (TB). The proposed framework focuses on the detection of patterns from healthcare databases and generation of patterns for future clinical decision making. Finally, the authors proposed a framework using unsupervised learning techniques in STATA and MATLAB 7.1 to develop patterns for the knowledge discovery process. The authors emphasized that their study can potentially benefit end-users to predict future prognosis of the disease and combinatorial effects in determining varied policies that can assist patients with needs. The sixth paper by Memos et al. [6] proposes a cloud infrastructure for e-health data transmission. In this paper, the authors redesigned the cloud computing model to support better resource allocation, less analysis time of the users' files and quicker response to the users' requests to the cloud servers. They proposed a cloud model architecture comprising four layers: (a) the master cloud server, (b) the slave servers, (c) the virtual sub servers and (d) the users connected to the cloud. The authors' experimental results showed that the proposed layered cloud architecture is more lightweight, efficient, and secure for e-health data transmission. The seventh paper by Goyal et al. [7] presents a posture aware dynamic data delivery (PA-DDD) protocol in WBAN to deal with shadow effect due to body movement and change in posture. To avoid this problem, the authors used an Improved Initial Centroid K-means (IIC K-means) clustering technique for classification of various human body postures followed by back propagation neural network as a classifier to recognize human body posture. The authors' simulation results showed that the proposed protocol prolongs the network lifetime and is energy efficient. The eighth paper by Rachata et al. [8] proposes a mobile application to provide an efficient self-monitoring, which can encourage patients with type 2 diabetes mellitus and hypertension to improve their health status for preventing themselves from cardiovascular complication. To demonstrate the progression of the health status for the patients, the authors used the trend progression module, modelled with a fuzzy logic-based method. To verify an accuracy of the proposed mobile application, the authors tested one hundred twenty-one patients with type 2 diabetes mellitus and hypertension. Finally, the authors showed that the developed mobile application obtains 92% trend progression accuracy compared with decisions from eleven healthcare professionals and can encourage 85% of patients to improve their health status. The ninth paper by Boubiche et al. [9] reviews the most leading protocols and classify them based the addressed security issue in the wireless sensor networks (WSN). In this paper, the authors outlined the main security constraints and challenges and present the future research directions based on the emerged application fields. The tenth paper by Chaising et al. [10] proposes the personalized recommendation method using integrated objective distance for preventing Cardiovascular Disease (CVD) complication in the elderly. The authors' experimental results showed that the proposed new measurement can efficiently compute the shortest objective distance between the current health status of elderly individuals and the expected objective level. To verify the proposed model's accuracy, the authors compared the recommendations for 121 elderly persons with the high risk of developing this critical disease with expert recommendations. Finally, the authors showed that the proposed new approach has a high ability in providing personalized recommendation, which is nearly identical to the expert with 95% accuracy. The eleventh paper by Goyal et al. [11] presents a hybrid Genetic Algorithm (GA) with BAT and Transmission Rate Adaption Policy (TRAP) abbreviated GABAT-TRAP to maximize the energy efficiency of the Wireless Body Area Networks (WBAN) with consideration of both the limitations of Quality of Service (QoS) metrics and dynamic link properties. The authors' simulation results showed that the proposed scheme improves the energy efficiency of WBAN without violating the QoS parameters such as packet delivery ratio, packet loss rate (PLR), and throughput as compared to other schemes such as TRAP, GA-TRAP, BAT-TRAP, UPA, TPC, and LSEPC. The twelfth paper by Soldatos et al. [12] proposes a platform called SecureIoT to provide security monitoring, security analysis and security automation functionalities on IoT applications that involve smart objects. The authors claimed that the proposed platform enables the collection and analysis of security information from all elements of an IoT systems, including field, edge, and cloud elements. In addition, it allows for the flexible integration of different machine learning and AI models based on the modular and powerful mechanism of IoT security templates. To validate the functionalities, the authors used an Ambient Assisted Living (AAL) system that comprises socially assistive robots. Now that we have summarized all accepted papers, we would like to thank the Editorin-Chief (Professor Ramjee Prasad), Mr. Meertinus Faber (Project Coordinator) and Mr. Joseph Ian Reyes (Journal's Editorial Office Assistant) for their support, assistance and for giving us the opportunity to realize this special issue. We also would like to sincerely thank all the authors for their contributions and the subject matter experts for their time and efforts in reviewing the submissions to this special issue. We hope you will enjoy reading this special issue. Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Engineering, Telecommunication option from Center for Research and Advanced Studies of the National Polytechnic Institute (CIN-VESTAV), Jalisco, Mexico, in 2010 and 2006, respectively. He received his BSc degree in Electronic Engineering from "Instituto Tecnológico de la Laguna", Coahuila, Mexico in 2002. He is currently an assistant professor at Sciences and Engineering department at the University of Quintana Roo, Mexico. Prior to holding this position, he served as an assistant researcher at Electrical Engineering department, Telecommunication section in CINVESTAV, Jalisco, Mexico. His research interest includes network measurement, IP technologies, network security and wireless sensor networks. He has served as guest editor of some high quality journals. In addition, he has served as a chair, organizing committee member and technical program committee member for many international conferences and workshops. Dr Toral is also an active reviewer of some renowned international journals. Furthermore, he has been awarded a national recognition as a Securing e-health networks from counterfeit medicine penetration using blockchain. Wireless Personal Communications Design of a password authentication and key agreement scheme to access e-healthcare services. Wireless Personal Communications A provably secure and lightweight patienthealthcare authentication protocol in wireless body area networks Security enhanced RFID authentication protocols for healthcare environment An optimized integrated framework of big data analytics managing security and privacy in healthcare data An enhanced and secure cloud infrastructure for e-health data transmission. Wireless Personal Communications An efficient data delivery scheme in WBAN to deal with shadow effect due to postural mobility Mobile-based self-monitoring for preventing patients with type 2 diabetes mellitus and hypertension from cardiovascular complication. Wireless Personal Communications Cybersecurity issues in wireless sensor networks: current challenges and solutions. Wireless Personal Communications Personalized recommendation method for preventing elderly people from cardiovascular disease complication using integrated objective distance. Wireless Personal Communications An energy efficient QoS supported optimized transmission rate technique in WBANs. Wireless Personal Communications Securing IoT applications with smart objects: framework and a socially assistive robots case study. Wireless Personal Communications