{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:54:54Z","timestamp":1775040894724,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T00:00:00Z","timestamp":1476144000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10916-016-0597-z","type":"journal-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T05:33:23Z","timestamp":1476164003000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":64,"title":["Security Attacks and Solutions in Electronic Health (E-health) Systems"],"prefix":"10.1007","volume":"40","author":[{"given":"Sherali","family":"Zeadally","sequence":"first","affiliation":[]},{"given":"Jes\u00fas T\u00e9llez","family":"Isaac","sequence":"additional","affiliation":[]},{"given":"Zubair","family":"Baig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,11]]},"reference":[{"key":"597_CR1","unstructured":"Abelson, R., and Creswell, J., Data breach at anthem may forecast a trend. http:\/\/www.nytimes.com\/2015\/02\/07\/business\/data-breach-at-anthem-may-lead-to-others.html , 2015."},{"key":"597_CR2","doi-asserted-by":"crossref","unstructured":"Alrabady, AI., and Mahmud, S M., Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. IEEE Trans. Veh. Technol. 54(1):41\u201350, 2005.","DOI":"10.1109\/TVT.2004.838829"},{"key":"597_CR3","doi-asserted-by":"crossref","unstructured":"Assaad, A., and Fayek, D.: General hospitals network models for the support of e-health applications. In: IEEE\/IFIP Network Operations and Management Symposium (NOMS 2006), pp. 1\u20134 (2006)","DOI":"10.1109\/NOMS.2006.1687619"},{"key":"597_CR4","unstructured":"Office of the Australian Information Commissioner Australian government. Regulation of drone technology. https:\/\/www.oaic.gov.au\/media-and-speeches\/statements\/regulation-of-drone-technology . 2013 Last accessed September 3, 2016"},{"issue":"6","key":"597_CR5","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/MCOM.2009.5116816","volume":"47","author":"H Baldus","year":"2009","unstructured":"Baldus, H., Corroy, S., Fazzi, A., Klabunde, K., Schenk, T., Human-centric connectivity enabled by body-coupled communications. IEEE Commun. Mag. 47(6):172\u2013178, 2009.","journal-title":"IEEE Commun. Mag."},{"issue":"99","key":"597_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JQE.2014.2344043","volume":"PP","author":"O Bello","year":"2014","unstructured":"Bello, O., and Zeadally, S., Intelligent device-to-device communication in the internet of things. IEEE Syst. J. PP(99):1\u201311, 2014.","journal-title":"IEEE Syst. J."},{"key":"597_CR7","unstructured":"Brodsky, Y., Are drones set for health in africa? https:\/\/ehna.acfee.org\/read\/art-5613eaa2c52dc , 2015. Last accessed September 3, 2016."},{"key":"597_CR8","doi-asserted-by":"crossref","unstructured":"Bruce, N., Sain, M., Lee, H J.: A support middleware solution for e-healthcare system security. In: 16th International Conference on Advanced Communication Technology (2014)","DOI":"10.1109\/ICACT.2014.6778919"},{"key":"597_CR9","doi-asserted-by":"crossref","unstructured":"Buttyan, L., and Holczer, T.: Traffic analysis attacks and countermeasures in wireless body area sensor networks. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2012), pp. 1\u20136 (2012)","DOI":"10.1109\/WoWMoM.2012.6263774"},{"key":"597_CR10","unstructured":"Identity Theft Resource Center. Data breach reports. http:\/\/www.idtheftcenter.org\/images\/breach\/DataBreachReports2014.pdf . 2014 Last accessed July 14, 2016"},{"key":"597_CR11","unstructured":"Chowles, T., Drones to improve hiv testing in malawi. http:\/\/ehealthnews.co.za\/drones-hiv-testing-malawi\/ , 2016. Last accessed September 3, 2016."},{"key":"597_CR12","unstructured":"Cramer, V., Healthcare suffers largest number of data breaches in 2014, 2015. Last accessed July 14, 2016."},{"key":"597_CR13","unstructured":"Desai, N., and Shahnasser, H.: A light review of data security and privacy approaches applicable to e-health systems. In: Proceedings of the International conference on Computing Technology and Information Management (ICCTIM 2014). Last accessed July 14, 2016, pp. 362\u2013367 (2014)"},{"key":"597_CR14","unstructured":"Institute for Health Freedom. Protecting americans\u2019 medical privacy: Why congress must act or be acted upon. http:\/\/www.forhealthfreedom.org\/Publications\/Privacy\/CongressOrHHS.html . 1998 Last accessed July 14, 2016"},{"key":"597_CR15","unstructured":"Canadian Institute for Health Information. National health expenditure trends, 1975 to 2013, executive summary. https:\/\/www.cihi.ca\/en\/nhex_exec_sum_2013_en.pdf , 2013. Last accessed July 14, 2016."},{"key":"597_CR16","doi-asserted-by":"crossref","unstructured":"Garkoti, G., Peddoju, S K., Balasubramanian, R.: Detection of insider attacks in cloud based e-healthcare environment. In: International Conference on Information Technology (ICIT 2014), pp. 195\u2013200 (2014)","DOI":"10.1109\/ICIT.2014.43"},{"key":"597_CR17","unstructured":"Greenberg, A., Hacking into aerial drones. https:\/\/www.wired.com\/2016\/03\/hacker-says-can-hijack-35k-police-drone-mile-away\/ , 2016. Last accessed September 3, 2016."},{"key":"597_CR18","doi-asserted-by":"crossref","unstructured":"Guo, L., Zhang, C., Sun, J., Fang Y.: Paas: A privacy-preserving attribute-based authentication system for ehealth networks. In: IEEE 32nd International Conference on Distributed Computing Systems (ICDCS 2012), pp. 223\u2013233 (2012)","DOI":"10.1109\/ICDCS.2012.45"},{"issue":"1","key":"597_CR19","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"53","author":"D He","year":"2015","unstructured":"He, D., and Zeadally, S., Authentication protocol for an ambient assisted living system. IEEE Commun. Mag. 53(1):71\u201377, 2015.","journal-title":"IEEE Commun. Mag."},{"issue":"99","key":"597_CR20","first-page":"1","volume":"in press","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., Wu, W., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. in press(99):1 \u2013 12, 2016.","journal-title":"IEEE Syst. J."},{"issue":"99","key":"597_CR21","first-page":"1","volume":"in press","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. in press(99):1\u201310, 2016.","journal-title":"IEEE Syst. J."},{"key":"597_CR22","unstructured":"PwC Health Research Institute. Medical cost trend: Behind the numbers 2016. https:\/\/www.pwc.com\/mx\/es\/industrias\/archivo\/20150612-gx-hri-medical-cost-trend-2016.pdf . 2015 Last accessed July 14, 2016"},{"key":"597_CR23","unstructured":"iSHERIFF Inc.: The new healthcare crisis: cybercrime, data breaches and the risks to patient records. 2015 Last accessed July 14, 2016"},{"key":"597_CR24","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","volume":"3","author":"SM Riazul Islam","year":"2015","unstructured":"Riazul Islam, S M., Kwak, D., Humaun Kabir, MD., Hossain, M., Kwak, K. -S., The internet of things for health care: A comprehensive survey. IEEE Access 3:678\u2013708, 2015.","journal-title":"IEEE Access"},{"key":"597_CR25","unstructured":"Islam, T., Manivannan, D., Zeadally, S., A classification and characterization of security threats in cloud computing. Int. J. Next-Gener. Comput. 7(1), 2016."},{"key":"597_CR26","first-page":"165","volume-title":"Security and privacy in wireless body area networks for health care applications","author":"SS Javadi","year":"2013","unstructured":"Javadi, S S., and Razzaque, M A., Security and privacy in wireless body area networks for health care applications, pp. 165\u2013187. Berlin, Heidelberg: Springer, 2013."},{"key":"597_CR27","unstructured":"Khatoun, R., and Zeadally, S., Smart cities Basic concepts, architectural issues, and research opportunities. 2016 59(8), 2016."},{"key":"597_CR28","unstructured":"Li, C., Raghunathan, A., Jha, N K.: Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: 13th IEEE International Conference on e-Health Networking Applications and Services (Healthcom 2011), pp. 150\u2013156 (2011)"},{"key":"597_CR29","doi-asserted-by":"crossref","unstructured":"Liang, X., Barua, M., Chen, L., Lu, R., Shen, X., Li, X., Luo, H Y., Enabling pervasive healthcare through continuous remote health monitoring. IEEE Wireless Communications,10\u201318, 2012.","DOI":"10.1109\/MWC.2012.6393513"},{"key":"597_CR30","doi-asserted-by":"crossref","unstructured":"Liang, X., Xu Li, Shen, Q., Lu, R., Lin, X., Shen, X S., Zhuang, W.: Exploiting prediction to enable secure and reliable routing in wireless body area networks. In: Proceedings IEEE INFOCOM, pp. 388\u2013396 (2012)","DOI":"10.1109\/INFCOM.2012.6195777"},{"issue":"9","key":"597_CR31","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1109\/JSAC.2013.SUP.0513056","volume":"31","author":"X Liang","year":"2013","unstructured":"Liang, X., Xu, Li., Zhang, H Y., L. K., Lu, R., Lin, X., Shen, X S., Fully anonymous profile matching in mobile social networks. IEEE J. Sel. Areas Commun. 31(9):641\u2013655, 2013.","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"597_CR32","doi-asserted-by":"crossref","unstructured":"Liu, W., and Park, E.: E-healthcare security solution framework. In: 21st International Conference on Computer Communications and Networks (ICCCN 2012), pp. 1\u20136 (2012)","DOI":"10.1109\/ICCCN.2012.6289239"},{"key":"597_CR33","unstructured":"Ponemon Institute LLC: 2016 ponemon cost of data breach study: Global analysis. 2016 Last accessed July 14"},{"key":"597_CR34","unstructured":"Ponemon Institute LLC. Sixth annual benchmark study on privacy and security of healthcare data. http:\/\/www.ponemon.org\/library\/sixth-annual-benchmark-study-on-privacy-security-of-healthcare-data-1 . 2016 Last accessed July 14"},{"issue":"2","key":"597_CR35","doi-asserted-by":"crossref","first-page":"205","DOI":"10.3390\/fi5020205","volume":"5","author":"G Loukas","year":"2013","unstructured":"Loukas, G., Gan, D., Vuong, T., A review of cyber threats and defence approaches in emergency management. Fut. Internet 5(2):205\u2013236, 2013.","journal-title":"Fut. Internet"},{"issue":"6","key":"597_CR36","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1007\/s11036-010-0274-2","volume":"16","author":"R Lu","year":"2011","unstructured":"Lu, R., Lin, X., Liang, X., Shen, X., A secure handshake scheme with symptoms-matching for mhealthcare social network. J. Mob. Netw. Appl. 16(6):683\u2013694, 2011.","journal-title":"J. Mob. Netw. Appl."},{"issue":"3","key":"597_CR37","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1109\/TPDS.2012.146","volume":"24","author":"R Lu","year":"2013","unstructured":"Lu, R., Lin, X., Shen, X., Spoc: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3):614\u2013624, 2013.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"6","key":"597_CR38","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11859-013-0967-z","volume":"18","author":"Y Ma","year":"2013","unstructured":"Ma, Y., Liu, J., Liu, W., Security and privacy issues in electronic health network. Wuhan J. Natur. Sci. 18(6):523\u2013529, 2013.","journal-title":"Wuhan J. Natur. Sci."},{"key":"597_CR39","unstructured":"Millman, J.: The end of health cares historic spending slowdown is near. https:\/\/www.washingtonpost.com\/news\/wonk\/wp\/2014\/09\/03\/the-end-of-health-cares-historic-spending-slowdown-is-near\/ https:\/\/www.washingtonpost.com\/news\/wonk\/wp\/2014\/09\/03\/the-end-of-health-cares-historic-spending-slowdown-is-near\/ . 2014 Last accessed July 14, 2016"},{"key":"597_CR40","unstructured":"United Nations. Transforming our world: the 2030 agenda for sustainable development. https:\/\/sustainabledevelopment.un.org\/post2015\/transformingourworld . 2015 Last accessed July 14, 2016"},{"key":"597_CR41","unstructured":"US Department of Health and Human Services Office for Civil Rights. Breach portal: Notice to the secretary of hhs breach of unsecured protected health information. https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf . 2016 Last accessed July 14, 2016"},{"key":"597_CR42","first-page":"92","volume-title":"Biometrics Applications in e-Health Security: A Preliminary Survey","author":"E Okoh","year":"2015","unstructured":"Okoh, E., and Awad, A I., Biometrics Applications in e-Health Security: A Preliminary Survey, pp. 92\u2013103. Cham: Springer International Publishing, 2015."},{"key":"597_CR43","unstructured":"World Health Organization and World Bank. Tracking universal health coverage, first global monitoring report, 2015. Last accessed July 14, 2016."},{"key":"597_CR44","unstructured":"Peacock, M., and Johnstone, M.: Towards detection and control of civilian unmanned aerial vehicles. In: Proceedings of the Australian Information Warfare and Security Conference, SRI Security Research Institute. Edith Cowan University (2013)"},{"key":"597_CR45","doi-asserted-by":"crossref","unstructured":"Postolache, G., Gir\u00e3o, P. S., Postolache, O.: Requirements and barriers to pervasive health adoption. In: Subhas Chandra Mukhopadhyay, and Octavian A. Postolache (Eds.) Pervasive and Mobile Sensing and Computing for Healthcare, pp. 315\u2013359. Springer Berlin Heidelberg (2013)","DOI":"10.1007\/978-3-642-32538-0_15"},{"key":"597_CR46","doi-asserted-by":"crossref","unstructured":"Ren, Y., Chen, Y., Chuahy, M C.: Social closeness based clone attack detection for mobile healthcare system. In: IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), pp. 191\u2013199 (2012)","DOI":"10.1109\/MASS.2012.6502517"},{"key":"597_CR47","unstructured":"Rodday, N.: Exploring security vulnerabilities of unmanned aerial vehicles, masters thesis, dacs research group, university of twente, amsterdam, https:\/\/www.jbisa.nl\/download\/?id=17706129 . 2015 Last accessed September 3, 2016"},{"issue":"2","key":"597_CR48","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1109\/JBHI.2013.2292829","volume":"18","author":"Q Shen","year":"2014","unstructured":"Shen, Q., Liang, X., Shen, X S., Lin, X., Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation. IEEE J. Biomed. Health Inf. 18(2):430\u2013439, 2014.","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"597_CR49","doi-asserted-by":"crossref","unstructured":"Shen, X., Emerging technologies for e-healthcare [editor\u2019s note]. IEEE Netw. 26(5), 2012.","DOI":"10.1109\/MNET.2012.6308066"},{"issue":"8","key":"597_CR50","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCOM.2014.6871673","volume":"52","author":"A Solanas","year":"2014","unstructured":"Solanas, A., Patsakis, C., Conti, M., Vlachos, I S., Ramos, V., Falcone, F., Postolache, O., P\u00e9rez-Mart\u00ednez, P A., Di Pietro, R., Perrea, D N., Mart\u00ednez-Ballest\u00e9, A., Smart health: a context-aware health paradigm within smart cities. IEEE Commun. Mag. 52(8):74\u201381, 2014.","journal-title":"IEEE Commun. Mag."},{"key":"597_CR51","unstructured":"Thiels, C., Drones in medicine: What are the possibilities? http:\/\/www.kevinmd.com\/blog\/2015\/05\/drones-in-medicine-what-are-the-possibilities.html , 2015. Last accessed August 14, 2016."},{"key":"597_CR52","unstructured":"WHO. World health statistics 2016, monitoring health for the sdgs, the 2030 a new impetus for health monitoring, 2015. 2016 Last accessed July 14, 2016"},{"key":"597_CR53","first-page":"311","volume-title":"Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems","author":"S Yu","year":"2009","unstructured":"Yu, S., Ren, K., Lou, W., Li, J., Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems, pp. 311\u2013329. Berlin, Heidelberg: Springer, 2009."},{"key":"597_CR54","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-08470-1","volume-title":"editors. Privacy in a Digital, Networked World - Technologies, Implications and solutions","author":"S Zeadally","year":"2015","unstructured":"Zeadally, S., and Badra, M., editors. Privacy in a Digital, Networked World - Technologies, Implications and solutions. London, United Kingdom: Springer, 2015."},{"issue":"4","key":"597_CR55","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MWC.2013.6590046","volume":"20","author":"J Zhou","year":"2013","unstructured":"Zhou, J., Cao, Z., Dong, X., Lin, X., Vasilakos, A V., Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel. Commun. 20(4):12\u201321, 2013.","journal-title":"IEEE Wirel. Commun."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0597-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0597-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0597-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:49:20Z","timestamp":1498337360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0597-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,11]]},"references-count":55,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["597"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0597-z","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,11]]},"article-number":"263"}}