{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T13:10:08Z","timestamp":1756732208631,"version":"3.44.0"},"reference-count":119,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2026,1,31]]},"abstract":"<jats:p>Medical Cyber-Physical Systems (MCPS) are the prerequisites for a highly digital environment in medical facilities. All the technologies, methods, and problems that arise in developing MCPS should be mitigated systematically and continuously to meet this need. This study analytically discusses the currently available MCPS models, threat scenarios, attacks, and data breach statistics to evaluate the current security situation of the research community in the MCPS domain. The large and complex components of MCPS comprise many computational and physical aspects, making managing secure reliability challenging. To address this challenge, there is a need for security by design that incorporates built-in security functionality in the development of an MCPS. Our comprehensive review critically analyzes the current state-of-the-art in MCPS by considering various aspects, such as functionality, communication media, design characteristics, and security. Furthermore, we explore the security threats posed by MCPS as well as their potential impact. Finally, we propose a potential future pathway to effectively mitigate the identified threats by providing a promising direction for further investigation.<\/jats:p>","DOI":"10.1145\/3757731","type":"journal-article","created":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T11:17:17Z","timestamp":1754133437000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Integration of Cyber Engineering and Medical Cyber-Physical System: A Survey and Open Issues"],"prefix":"10.1145","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4021-9819","authenticated-orcid":false,"given":"Abhishek Kumar","family":"Pandey","sequence":"first","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad","place":["Hyderabad, India"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5982-8190","authenticated-orcid":false,"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"College of Communication and Information, University of Kentucky","place":["Lexington, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad","place":["Hyderabad, India"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology","place":["Patiala, India"]},{"name":"University of Economics and Human Sciences (UEHS)","place":["Patiala, India"]},{"name":"Department of Networks and Communications, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University","place":["Patiala, India"]}]}],"member":"320","published-online":{"date-parts":[[2025,9]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800083"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3159526"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.04.007"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055530"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2808190"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899323"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101159"},{"key":"e_1_3_3_9_2","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.283","volume-title":"2017 IEEE Trustcom\/BigDataSE\/ICESS","author":"Alexopoulos Nikolaos","year":"2017","unstructured":"Nikolaos Alexopoulos, J\u00f6rg Daubert, Max M\u00fchlh\u00e4user, and Sheikh Mahbub Habib. 2017. Beyond the hype: On using blockchains in trust management for authentication. In 2017 IEEE Trustcom\/BigDataSE\/ICESS. IEEE, Los Alamitos, CA, USA, 546\u2013553."},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.017"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7120436"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18030817"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2017.69"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2017.69"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169949"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.008"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3122807"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.022"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3007535"},{"key":"e_1_3_3_20_2","article-title":"How Cyber-Physical Systems Are Reshaping the Robotics Landscape","year":"2019","unstructured":"Cognizant. 2019. How Cyber-Physical Systems Are Reshaping the Robotics Landscape. Retrieved from https:\/\/www.cognizant.com\/us\/en\/whitepapers\/documents\/how-cyber-physical-systems-are-reshaping-the-robotics-landscape-codex4484.pdf. (2019). Accessed on September 2022.","journal-title":"https:\/\/www.cognizant.com\/us\/en\/whitepapers\/documents\/how-cyber-physical-systems-are-reshaping-the-robotics-landscape-codex4484.pdf"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3529758"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3283347"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0921-x"},{"key":"e_1_3_3_24_2","doi-asserted-by":"crossref","unstructured":"Sadia Din and Anand Paul. 2019. Smart health monitoring and management system: Toward autonomous wearable sensing for internet of things using big data analytics. (2019) 611\u2013219.","DOI":"10.1016\/j.future.2017.12.059"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00015"},{"key":"e_1_3_3_26_2","doi-asserted-by":"crossref","first-page":"3659","DOI":"10.1109\/ECC.2015.7331099","volume-title":"2015 European Control Conference (ECC)","author":"Djouadi Seddik M.","year":"2015","unstructured":"Seddik M. Djouadi, Alexander M. Melin, Erik M. Ferragut, Jason A. Laska, Jin Dong, and Anis Drira. 2015. Finite energy and bounded actuator attacks on cyber-physical systems. In 2015 European Control Conference (ECC). IEEE, IEEE Computer Society, Altenbergerstra\u00dfe 69, 4040 Linz, Austria, 3659\u20133664."},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.10.004"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817615"},{"key":"e_1_3_3_29_2","article-title":"The surgeon who operates from 400km away","author":"Eveleth Rose","year":"2014","unstructured":"Rose Eveleth. 2014. The surgeon who operates from 400km away. https:\/\/www.bbc.com\/future\/article\/20140516-i-operate-on-people-400km-away. (2014). Accessed on September 2022.","journal-title":"https:\/\/www.bbc.com\/future\/article\/20140516-i-operate-on-people-400km-away"},{"key":"e_1_3_3_30_2","article-title":"Exponential Moving Average (EMA)","year":"2022","unstructured":"Fidelity. 2022. Exponential Moving Average (EMA). Retrieved from https:\/\/www.fidelity.com\/learning-center\/trading-investing\/technical-analysis\/technical-indicator-guide\/ema. (2022). Accessed on September 2022.","journal-title":"https:\/\/www.fidelity.com\/learning-center\/trading-investing\/technical-analysis\/technical-indicator-guide\/ema"},{"key":"e_1_3_3_31_2","first-page":"373","volume-title":"2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)","author":"Fu Zhicheng","year":"2017","unstructured":"Zhicheng Fu, Chunhui Guo, Shangping Ren, Yizong Ou, and Lui Sha. 2017. Modeling and integrating human interaction assumptions in medical cyber-physical system design. In 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS). IEEE, IEEE Computer Society, Los Alamitos, CA, USA, 373\u2013378."},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3561084"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700817"},{"key":"e_1_3_3_34_2","article-title":"Recently spotted Trinity ransomware spurs federal warning to healthcare industry","author":"Greig Jonathan","year":"2024","unstructured":"Jonathan Greig. 2024. Recently spotted Trinity ransomware spurs federal warning to healthcare industry. Retrieved from https:\/\/therecord.media\/trinity-ransomware-alert-healthcare-industry-hhs-cyber-center. (2024). Accessed on November 2024.","journal-title":"https:\/\/therecord.media\/trinity-ransomware-alert-healthcare-industry-hhs-cyber-center"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0982-x"},{"issue":"1","key":"e_1_3_3_36_2","first-page":"230","article-title":"Toward ubiquitous healthcare services with a novel efficient cloud platform","volume":"60","author":"He Chenguang","year":"2012","unstructured":"Chenguang He, Xiaomao Fan, and Ye Li. 2012. Toward ubiquitous healthcare services with a novel efficient cloud platform. IEEE Transactions on Biomedical Engineering 60, 1 (2012), 230\u2013234.","journal-title":"IEEE Transactions on Biomedical Engineering"},{"issue":"1","key":"e_1_3_3_37_2","first-page":"72","article-title":"An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography","volume":"2","author":"He Debiao","year":"2014","unstructured":"Debiao He and Sherali Zeadally. 2014. An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet of Things Journal 2, 1 (2014), 72\u201383.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_3_38_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-031-02067-4_1","volume-title":"Risks and Security of Internet and Systems","author":"Jamil Ameerah-Muhsinah","year":"2022","unstructured":"Ameerah-Muhsinah Jamil, Lotfi Ben Othmane, and Altaz Valani. 2022. Threat modeling of cyber-physical systems in practice. In Risks and Security of Internet and Systems. Bo Luo, Mohamedr135 Mosbah, Fr\u00e9d\u00e9ric Cuppens, Lotfi Ben Othmane, Nora Cuppens, and Slim Kallel (Eds.). Springer International Publishing, Cham, 3\u201319."},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.3233\/MIS-130169"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.5555\/2595158.2595160"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3141064"},{"key":"e_1_3_3_42_2","article-title":"December 2019 Healthcare Data Breach Report","author":"Journal HIPAA","year":"2020","unstructured":"HIPAA Journal. 2020. December 2019 Healthcare Data Breach Report. Retrieved from https:\/\/www.hipaajournal.com. (2020). Accessed on July 2022.","journal-title":"https:\/\/www.hipaajournal.com"},{"key":"e_1_3_3_43_2","article-title":"August 2022 Healthcare Data Breach Report","author":"Journal HIPAA","year":"2022","unstructured":"HIPAA Journal. 2022. August 2022 Healthcare Data Breach Report. Retrieved from https:\/\/www.hipaajournal.com\/august-2022-healthcare-data-breach-report\/. (2022). Accessed on September 2022.","journal-title":"https:\/\/www.hipaajournal.com\/august-2022-healthcare-data-breach-report\/"},{"issue":"1","key":"e_1_3_3_44_2","doi-asserted-by":"crossref","first-page":"42","DOI":"10.4018\/ijhisi.2014010103","article-title":"Human and organizational factors of healthcare data breaches the swiss cheese model of data breach causation and prevention","volume":"9","author":"Kamoun Faouzi","year":"2014","unstructured":"Faouzi Kamoun and Mathew Nicho. 2014. Human and organizational factors of healthcare data breaches the swiss cheese model of data breach causation and prevention. International Journal of Healthcare Information Systems and Informatics 9, 1 (2014), 42\u201360.","journal-title":"International Journal of Healthcare Information Systems and Informatics"},{"key":"e_1_3_3_45_2","first-page":"673","volume-title":"SECRYPT","author":"Karati Arijit","year":"2023","unstructured":"Arijit Karati, Yu-Sheng Chang, and Ting-Yu Chen. 2023. Robust three-factor lightweight authentication based on extended chaotic maps for portable resource-constrained devices.. In SECRYPT. 673\u2013682."},{"key":"e_1_3_3_46_2","first-page":"85","article-title":"Formulation of distributed electronic patient record (DEPR) system using openemr concept","volume":"4","author":"Kemkar Onkar S.","year":"2012","unstructured":"Onkar S. Kemkar and Priti Kalode. 2012. Formulation of distributed electronic patient record (DEPR) system using openemr concept. International Journal of Engineering Innovations and Research IJEIR 4, 1 (2012), 85\u201389.","journal-title":"International Journal of Engineering Innovations and Research IJEIR"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102950"},{"key":"e_1_3_3_48_2","first-page":"1","volume-title":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","author":"King Andrew L.","year":"2013","unstructured":"Andrew L. King, Lu Feng, Oleg Sokolsky, and Insup Lee. 2013. Assuring the safety of on-demand medical cyber-physical systems. In 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA). IEEE, IEEE Computer Society, Los Alamitos, CA, USA, 1\u20136."},{"issue":"3","key":"e_1_3_3_49_2","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TCBB.2016.2520933","article-title":"Emerging security mechanisms for medical cyber physical systems","volume":"13","author":"Kocabas Ovunc","year":"2016","unstructured":"Ovunc Kocabas, Tolga Soyata, and Mehmet K. Aktas. 2016. Emerging security mechanisms for medical cyber physical systems. IEEE\/ACM Transactions on Computational Biology and Bioinformatics 13, 3 (2016), 401\u2013416.","journal-title":"IEEE\/ACM Transactions on Computational Biology and Bioinformatics"},{"key":"e_1_3_3_50_2","article-title":"14 Biggest Healthcare Data Breaches","author":"Kost Edward","year":"2024","unstructured":"Edward Kost. 2024. 14 Biggest Healthcare Data Breaches. Retrieved from https:\/\/www.upguard.com\/blog\/biggest-data-breaches-in-healthcare. (2024). Accessed on November 2024.","journal-title":"https:\/\/www.upguard.com\/blog\/biggest-data-breaches-in-healthcare"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714599"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(20)30042-7"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2021.01.014"},{"issue":"4","key":"e_1_3_3_54_2","doi-asserted-by":"crossref","first-page":"664","DOI":"10.3390\/sym12040664","article-title":"Fuzzy-based symmetrical multi-criteria decision-making procedure for evaluating the impact of harmful factors of healthcare information security","volume":"12","author":"Kumar Rajeev","year":"2020","unstructured":"Rajeev Kumar, Abhishek Kumar Pandey, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami, Alka Agrawal, and Raees Ahmad Khan. 2020. Fuzzy-based symmetrical multi-criteria decision-making procedure for evaluating the impact of harmful factors of healthcare information security. Symmetry 12, 4 (2020), 664.","journal-title":"Symmetry"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym12040664"},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.d.190513.001"},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584944"},{"key":"e_1_3_3_58_2","first-page":"29","article-title":"The design and implementation of a ubiquitous personal health record system for South Africa","volume":"206","author":"Kyazze Michael","year":"2014","unstructured":"Michael Kyazze, Janet Wesson, and Kevin Naude. 2014. The design and implementation of a ubiquitous personal health record system for South Africa. Stud. Health Technol. Inform 206 (2014), 29\u201341.","journal-title":"Stud. Health Technol. Inform"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837463"},{"key":"e_1_3_3_61_2","first-page":"1333","volume-title":"2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","author":"Liu Chao","year":"2018","unstructured":"Chao Liu, Cheng Zhang, Fulong Chen, and Chuanxin Zhao. 2018. Towards IPv6-based architecture for big data processing of community medical internet of things. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, IEEE, United States, 1333\u20131338."},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19204579"},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6140978"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.013579"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.007"},{"key":"e_1_3_3_66_2","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1109\/DSD.2018.00008","volume-title":"2018 21st Euromicro Conference on Digital System Design (DSD)","author":"Mikula Tomas","year":"2018","unstructured":"Tomas Mikula and Rune Hylsberg Jacobsen. 2018. Identity and access management with blockchain in electronic healthcare records. In 2018 21st Euromicro Conference on Digital System Design (DSD). IEEE, IEEE Computer Society, Los Alamitos, CA, USA, 699\u2013706."},{"issue":"6","key":"e_1_3_3_67_2","first-page":"7","article-title":"Security for cyber-physical systems","volume":"1","author":"Moholkar Amey Vinayak","year":"2014","unstructured":"Amey Vinayak Moholkar. 2014. Security for cyber-physical systems. International Journal of Computing and Technology 1, 6 (2014), 7.","journal-title":"International Journal of Computing and Technology"},{"key":"e_1_3_3_68_2","doi-asserted-by":"crossref","first-page":"1199","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00201","volume-title":"2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)","author":"Mohsen Nada Radwan","year":"2019","unstructured":"Nada Radwan Mohsen, Bidi Ying, and Amiya Nayak. 2019. Authentication protocol for real-time wearable medical sensor networks using biometrics and continuous monitoring. In 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, IEEE Computer Society, Los Alamitos, CA, USA, 1199\u20131206."},{"key":"e_1_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.020"},{"key":"e_1_3_3_70_2","doi-asserted-by":"crossref","first-page":"63","DOI":"10.23919\/ICACT.2018.8323646","volume-title":"2018 20th International Conference on Advanced Communication Technology (ICACT)","author":"Mowla Nishat","year":"2018","unstructured":"Nishat Mowla, Inshil Doh, and KiJoon Chae. 2018. Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE, Chuncheon-si Gangwon-do South Korea, 63\u201367."},{"key":"e_1_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887095"},{"key":"e_1_3_3_72_2","volume-title":"Impact of COVID-19 Pandemic on Utilisation of Healthcare Services: A Systematic Review","author":"Moynihan Ray","year":"2021","unstructured":"Ray Moynihan, Sharon Sanders, Zoe A. Michaleff, Anna Mae Scott, Justin Clark, Emma J. To, Mark Jones, Eliza Kitchener, Melissa Fox, Minna Johansson, et\u00a0al. 2021. Impact of COVID-19 Pandemic on Utilisation of Healthcare Services: A Systematic Review. British Medical Journal Publishing Group."},{"key":"e_1_3_3_73_2","article-title":"Stolen Patient Records a Hot Commodity on the Dark Web","author":"Nadrag Paul","year":"2021","unstructured":"Paul Nadrag. 2021. Stolen Patient Records a Hot Commodity on the Dark Web. Retrieved from https:\/\/capsuletech.com\/blog\/stolen-patient-records-a-hot-commodity-on-the-dark-web. (2021). Accessed on September 2022.","journal-title":"Retrieved from https:\/\/capsuletech.com\/blog\/stolen-patient-records-a-hot-commodity-on-the-dark-web"},{"key":"e_1_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10434-z"},{"issue":"4","key":"e_1_3_3_75_2","doi-asserted-by":"crossref","first-page":"253","DOI":"10.5455\/aim.2019.27.253-258","article-title":"Security requirements of internet of things-based healthcare system: A survey study","volume":"27","author":"Nasiri Somayeh","year":"2019","unstructured":"Somayeh Nasiri, Farahnaz Sadoughi, Mohammad Hesam Tadayon, and Afsaneh Dehnad. 2019. Security requirements of internet of things-based healthcare system: A survey study. Acta Inform Med 27, 4 (Dec.2019), 253\u2013258.","journal-title":"Acta Inform Med"},{"key":"e_1_3_3_76_2","article-title":"IoT Devices and Infrastructures Group, National Institute of Standards and Technology (NIST)","year":"2020","unstructured":"NIST. 2020. IoT Devices and Infrastructures Group, National Institute of Standards and Technology (NIST). Retrieved from https:\/\/www.nist.gov\/el\/cyber-physical-systems. (2020). Accessed on July 2022.","journal-title":"https:\/\/www.nist.gov\/el\/cyber-physical-systems"},{"key":"e_1_3_3_77_2","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1007\/978-3-319-60699-6_67","volume-title":"Trends in Advanced Intelligent Control, Optimization and Automation","author":"Novikov Dmitry A.","year":"2017","unstructured":"Dmitry A. Novikov. 2017. Cybernetics 2.0: Modern challenges and perspectives. In Trends in Advanced Intelligent Control, Optimization and Automation. Springer International Publishing, Cham, 693\u2013702."},{"key":"e_1_3_3_78_2","article-title":"Trinity Ransomware","author":"Health U.S. Department of","year":"2024","unstructured":"U.S. Department of Health and Human Services. 2024. Trinity Ransomware. Retrieved from https:\/\/www.hhs.gov\/sites\/default\/files\/trinity-ransomware-threat-actor-profile.pdf. (2024). Accessed on November 2024.","journal-title":"https:\/\/www.hhs.gov\/sites\/default\/files\/trinity-ransomware-threat-actor-profile.pdf"},{"key":"e_1_3_3_79_2","article-title":"Data Breach","author":"Organization Privacy Rights","year":"2021","unstructured":"Privacy Rights Organization. 2021. Data Breach. Retrieved from https:\/\/privacyrights.org\/data-breaches. (2021). Accessed on September 2022.","journal-title":"https:\/\/privacyrights.org\/data-breaches"},{"key":"e_1_3_3_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976687"},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22093438"},{"key":"e_1_3_3_82_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21206828"},{"key":"e_1_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3555159"},{"key":"e_1_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3022797"},{"key":"e_1_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08971-6"},{"key":"e_1_3_3_86_2","first-page":"1 to 10","article-title":"An architectural approach to the design and analysis of cyber-physical systems","volume":"21","author":"Rajhans Akshay","year":"2009","unstructured":"Akshay Rajhans, Shang-Wen Cheng, Bradley Schmerl, David Garlan, Bruce H. Krogh, Clarence Agbi, and Ajinkya Bhave. 2009. An architectural approach to the design and analysis of cyber-physical systems. Electronic Communications of the EASST 21 (2009), 1 to 10.","journal-title":"Electronic Communications of the EASST"},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"e_1_3_3_88_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2017.05.012"},{"key":"e_1_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2019.103140"},{"issue":"1","key":"e_1_3_3_90_2","first-page":"457","article-title":"Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications","volume":"15","author":"Roy Sandip","year":"2018","unstructured":"Sandip Roy, Ashok Kumar Das, Santanu Chatterjee, Neeraj Kumar, Samiran Chattopadhyay, and Joel JPC Rodrigues. 2018. Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Transactions on Industrial Informatics 15, 1 (2018), 457\u2013468.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0114306"},{"key":"e_1_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare8020133"},{"key":"e_1_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03815-9"},{"key":"e_1_3_3_94_2","volume-title":"Constrained RESTful environments (CoRE) link format","author":"Shelby Zach","year":"2012","unstructured":"Zach Shelby. 2012. Constrained RESTful environments (CoRE) link format. Technical Report. Internet Engineering Task Force (IETF)."},{"issue":"1","key":"e_1_3_3_95_2","first-page":"126","article-title":"State of the art in the healthcare cyber-physical systems","volume":"17","year":"2014","unstructured":"Skorobogatjko, Alyona, Romanovs, Andrejs, Kunicina, and Nadezhda. 2014. State of the art in the healthcare cyber-physical systems. Information Technology and Management Science 17, 1 (2014), 126\u2013131.","journal-title":"Information Technology and Management Science"},{"key":"e_1_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5667-8"},{"key":"e_1_3_3_97_2","first-page":"423","volume-title":"2013 International Conference on Advanced Computer Science and Electronics Information (ICACSEI 2013)","author":"Sternly KSimon","year":"2013","unstructured":"KSimon Sternly, Kalaiarasi Sonai Muthu Anbananthen, and Seldon Lee. 2013. A ubiquitous personal health record (uPHR) framework. In 2013 International Conference on Advanced Computer Science and Electronics Information (ICACSEI 2013). Atlantis Press, Beijing, China, 423\u2013427."},{"key":"e_1_3_3_98_2","article-title":"For hospitals defending against cyberattacks, patch management remains a struggle","author":"Sweeney Evan","year":"2017","unstructured":"Evan Sweeney. 2017. For hospitals defending against cyberattacks, patch management remains a struggle. Retrieved from https:\/\/www.fiercehealthcare.com\/privacy-security\/for-hospitals-defending-against-cyberattacks-patch-management-remains-a-struggle. (2017). Accessed: 2022-10-10.","journal-title":"https:\/\/www.fiercehealthcare.com\/privacy-security\/for-hospitals-defending-against-cyberattacks-patch-management-remains-a-struggle"},{"key":"e_1_3_3_99_2","doi-asserted-by":"crossref","first-page":"1245","DOI":"10.1109\/RTEICT.2016.7808031","volume-title":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","author":"Tamboli Mohsin B.","year":"2016","unstructured":"Mohsin B. Tamboli and Dayanand Dambawade. 2016. Secure and efficient CoAP based authentication and access control for Internet of Things (IoT). In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, Bangalore, India, 1245\u20131250."},{"issue":"5","key":"e_1_3_3_100_2","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/TSC.2015.2512589","article-title":"Dynamic-hash-table based public auditing for secure cloud storage","volume":"10","author":"Tian Hui","year":"2015","unstructured":"Hui Tian, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen, and Jin Liu. 2015. Dynamic-hash-table based public auditing for secure cloud storage. IEEE Transactions on Services Computing 10, 5 (2015), 701\u2013714.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_3_101_2","article-title":"Design and Development","author":"Valvano Jonathan","year":"2014","unstructured":"Jonathan Valvano and Ramesh Yerraballi. 2014. Design and Development. Retrieved from http:\/\/users.ece.utexas.edu\/ valvano\/Volume1\/E-Book\/C7_DesignDevelopment.htm. (2014). Accessed on August 2022.","journal-title":"http:\/\/users.ece.utexas.edu\/ valvano\/Volume1\/E-Book\/C7_DesignDevelopment.htm"},{"issue":"1","key":"e_1_3_3_102_2","first-page":"1","article-title":"Improving accessibility of the Australian my health records while preserving privacy and security of the system","volume":"8","author":"Vimalachandran Pasupathy","year":"2020","unstructured":"Pasupathy Vimalachandran, Hong Liu, Yongzheng Lin, Ke Ji, Hua Wang, and Yanchun Zhang. 2020. Improving accessibility of the Australian my health records while preserving privacy and security of the system. Health Inf. Sci. Syst. 8, 1 (Dec.2020), 1\u20139.","journal-title":"Health Inf. Sci. Syst."},{"key":"e_1_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0994-6"},{"key":"e_1_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2464254"},{"key":"e_1_3_3_105_2","first-page":"1h","article-title":"What caused the breach? An examination of use of information technology and health data breaches","volume":"11","year":"2014","unstructured":"Wikina and Suanu Bliss. 2014. What caused the breach? An examination of use of information technology and health data breaches. Perspect Health Inf Manag 11, Fall (oct2014), 1h.","journal-title":"Perspect Health Inf Manag"},{"key":"e_1_3_3_106_2","article-title":"Average (SMA)","year":"2022","unstructured":"Wikipedia. 2022. Average (SMA). Retrieved from https:\/\/en.wikipedia.org\/wiki\/Moving_average. (2022). Accessed on September 2022.","journal-title":"https:\/\/en.wikipedia.org\/wiki\/Moving_average"},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"e_1_3_3_108_2","first-page":"1112","volume-title":"2012 5th International Conference on BioMedical Engineering and Informatics","author":"Xia Chunzhong","year":"2012","unstructured":"Chunzhong Xia and Shunlin Song. 2012. Resource allocation in hierarchical distributed EHR system based on improved poly-particle swarm. In 2012 5th International Conference on BioMedical Engineering and Informatics. IEEE, United States, 1112\u20131116."},{"key":"e_1_3_3_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2764957"},{"key":"e_1_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912870"},{"key":"e_1_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.005"},{"issue":"2","key":"e_1_3_3_112_2","first-page":"532","article-title":"Cloud-based fine-grained health information access control framework for lightweightiot devices with dynamic auditing andattribute revocation","volume":"6","author":"Yeh Lo-Yao","year":"2015","unstructured":"Lo-Yao Yeh, Pei-Yu Chiang, Yi-Lang Tsai, and Jiun-Long Huang. 2015. Cloud-based fine-grained health information access control framework for lightweightiot devices with dynamic auditing andattribute revocation. IEEE Transactions on Cloud Computing 6, 2 (2015), 532\u2013544.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/1456625.1456629"},{"key":"e_1_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0597-z"},{"issue":"5","key":"e_1_3_3_115_2","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TDSC.2015.2483503","article-title":"On efficient and robust anonymization for privacy protection on massive streaming categorical information","volume":"14","author":"Zhang Ji","year":"2015","unstructured":"Ji Zhang, Hongzhou Li, Xuemei Liu, Yonglong Luo, Fulong Chen, Hua Wang, and Liang Chang. 2015. On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Transactions on Dependable and Secure Computing 14, 5 (2015), 507\u2013520.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422883"},{"key":"e_1_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.005"},{"key":"e_1_3_3_118_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1047-8"},{"key":"e_1_3_3_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2840504"},{"key":"e_1_3_3_120_2","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-38082-2_14","volume-title":"The Future Internet","author":"Ziegler S.","year":"2013","unstructured":"S. Ziegler, C. Crettaz, L. Ladid, et\u00a0al. 2013. IoT6 C moving to an IPv6-based future IoT. In The Future Internet. Springer Berlin, USA, 161\u2013172."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T12:52:30Z","timestamp":1756731150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":119,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1,31]]}},"alternative-id":["10.1145\/3757731"],"URL":"https:\/\/doi.org\/10.1145\/3757731","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"type":"print","value":"0360-0300"},{"type":"electronic","value":"1557-7341"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"2023-09-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}