• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives

    2021-07-23 10:20:30MohamedAmineFerragLeiShuandKimKwangRaymondChoo
    IEEE/CAA Journal of Automatica Sinica 2021年9期

    Mohamed Amine Ferrag, Lei Shu,, and Kim-Kwang Raymond Choo,

    Abstract—The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2; also referred to as novel Coronavirus 2019 and COVID-19) have resulted in a global pandemic, with significant health, financial,political, and other implications. There have been various attempts to manage COVID-19 and other pandemics using technologies such as Internet of Things (IoT) and 5G/6G communications. However, we also need to ensure that IoT devices used to facilitate COVID-19 monitoring and treatment(e.g., medical IoT devices) are secured, as the compromise of such devices can have significant consequences (e.g., life-threatening risks to COVID-19 patients). Hence, in this paper we comprehensively survey existing IoT-related solutions, potential security and privacy risks and their requirements. For example,we classify existing security and privacy solutions into five categories, namely: authentication and access control solutions,key management and cryptography solutions, blockchain-based solutions, intrusion detection systems, and privacy-preserving solutions. In each category, we identify the associated challenges.We also identify a number of recommendations to inform future research.

    I. INTRODUCTION

    THE global outbreak of the novel coronavirus 2019(COVID-19) was declared by the World Health Organization (WHO) on 30 January 2020 [1]. The clinical symptoms of COVID-19 are predominantly pulmonary,although serious cardiovascular side effects were also observed in a number of patients [2]. Fig. 1 presents an overview of COVID-19 symptoms and protective strategies.Existing preventative solutions, include frequent hand wash using soap and water, or a hydro-alcoholic solution, and digital technologies such as mobile applications (e.g., contact tracing applications), artificial intelligence (AI), blockchain technology, drones, and robots to detect and limit the spread of the virus and track/monitor the movement of quarantined citizens [3]–[8].

    Fig. 1. Overview of COVID-19 symptoms and protective strategies.

    A. COVID-19 Mobile Applications (Apps)

    A number of governments/countries have introduced the use of official contact tracing apps for iOS and Android devices.Examples include Australia (COVIDSafe), Austria (Stopp Corona), Canada (COVID Alert), Denmark (Smittestop),Finland (Koronavilkku), France (StopCovid), Germany(Corona-Warn-App), China (LeaveHomeSafe), Italy (Immuni),Singapore (TraceTogether), etc. In addition to these official contact tracing apps, some organizations (e.g., hospitals) have also used other systems and approaches such as COVID Symptom Tracker, HowWeFeel, COVID-19 Symptoms &Social Distancing Web Survey, Global COVID-19 Survey,and Beiwe, to facilitate the monitoring and management of the COVID-19 pandemic [9]. The COVID Symptom Tracker[10], for example, is created by medical doctors and scientists at Stanford University School of Medicine, King’s College London, Harvard T.H. Chan School of Public Health, and Massachusetts General Hospital, to track the spread of COVID-19 and study the symptoms of this virus.

    Fig. 2. The use of IoT in healthcare systems during pandemics.

    Existing COVID-19 mobile apps can be categorised into six groups [11], namely: COVID-19 symptoms apps, COVID-19 contact tracing apps, COVID-19 health monitoring apps,COVID-19 research apps, telemedicine apps, and social distancing apps. These apps play different roles. For example,COVID-19 symptoms apps can facilitate users to monitor their own health, while COVID-19 contact tracing apps (e.g.,COVIDWISE (for Virginia) and GuideSafe (for Alabama))can be used by healthcare authorities to identify individuals who may have been in contact with an infected person. Also,data sensed/collected by COVID-19 health monitoring apps can be used by medical doctors to monitor the health of their patients. COVID-19 research apps can be used by research institutions to trace and study the spread of COVID-19, as well as its impacts. To enable video chat between medical doctors and their patients, telemedicine apps (e.g., Doctor On Demand, MDLive, and Amwell) can be adopted by healthcare providers. We also remark that these COVID-19 mobile apps can be integrated with other internet of things (IoT) devices and telecommunication networks (e.g., 5G) to enable public health institutions to further improve the quality of user experience and healthcare delivery, for example in terms of improved and real-time data and service access.

    B. The Use of IoT Approaches to Fight Against COVID-19

    The IoT is an ideal potential network for vaccine cold chain monitoring, healthcare management, healthcare delivery drones, remote patient monitoring, detecting and preventing infectious diseases such as COVID-19 [12]–[15]. As presented in Fig. 2, the use of IoT in healthcare systems to fight against epidemic situations like COVID-19 is structured in three layers, namely, the healthcare sensor layer, fog computing layer, and cloud computing layer. The healthcare sensor layer consists of IoT-enabled devices, including, smart hospitals, patients (COVID-19) with wearable smart devices,and doctors. The smart hospitals enable intelligent monitoring of the inside parameters such as temperature [16]. The wearable smart devices enable health data to be obtained using handheld smart devices and then forwarded to a doctor.The doctors use video calls for remote consultations and diagnosis of patients through a COVID-19 tracing app [17],[18]. The fog computing layer consists of network devices such as router, gateway, switch, and access points [19], [20].The healthcare data are transmitted directly to the fog computing layer from the healthcare sensor layer via the 5G/6G wireless connectivity network for analysis and machine learning algorithms [21]. In addition, the fog computing layer provides a detailed view of each patient and manages such information quickly. The cloud computing layer consists of traditional cloud servers with sufficient computing resources to provides storage and end-to-end services [22].

    The internet of bio-nanothings (IoBNT) concept considers the connectivity between the Internet and biological cells. The IoBNT’s vision is to accelerate progress in biomedical research technologies based on synthetic biology, biosensors,integrated technologies, molecular communication, to achieve a better quality of life as well as human health, as discussed by Akyildizet al. [23]. The advantages of using IoT approaches to fight against COVID-19 are presented in Table I.Regarding the diagnosis and treatment, the use of IoT approaches provides real-time patient monitoring based on IoT-powered telemedicine and reducing unnecessary medical visits as well as hospital stays. Therefore, thanks to the IoTdevices that are connected to the IoT network, drugs and equipment are efficiently administered and operated with lower costs. The IoT architecture includes fog computing and cloud computing technologies which can enable cost-effective decision making using the data generated via IoT devices.Regarding healthcare delivery, IoT-enabled drones are used to deliver lightweight packages such as medical and vaccines.Based on IoT sensors placed on the vaccine, the use of IoT applications can optimize the vaccine supply chain and can provide flexibility, efficiency, and speed. The blockchainbased solution stops the propagation of the COVID-19 virus using chained medical digital passports and immunity certificates. In addition, LoRaWAN trackers and emerging wearables are used for detecting COVID-linked symptoms.

    TABLE I EXAMPLES OF IOT AND CONVENTIONAL APPLICATION USAGE DURING COVID-19 MANAGEMENT

    C. Related Works

    In the literature, there are a number of recent surveys published in 2020 and 2021 for the use of IoT applications to fight against the COVID-19 pandemic. As shown in Table II,we categorize the related surveys according to the following criteria:

    1) The Use of IoT Approaches:It indicates whether the survey described the use of IoT approaches.

    2) Security and Privacy Requirements:It states if the survey has provided the security and privacy requirements as well as the threat models.

    3) Security and Privacy Solutions:It indicates whether the survey presented a comparative analysis of potential solutions for security and privacy in epidemic situations like COVID-19.

    4) Security and Privacy Challenges:It indicates whether the survey discussed the challenges and future research directions to combat COVID-19 as well as security and privacy challenges faced by the use of the IoT.

    Most of the surveys on the use of IoT applications to fight against the COVID-19 pandemic outline the emerging technologies without focusing on security and privacy solutions. For example, a brief overview of solutions that IoT and associated sensor technologies have made to fight against the COVID-19 pandemic was discussed in [25], [26].However, these surveys are very limited regarding detailed discussion on security and privacy solutions. Moreover,Ahmedet al. [24] provided an overview and detailed investigation of COVID-19 contact tracing apps with a discussion of users’ concerns about their uses. Chamolaet al.[4] presented a systematic survey that covers the role of various emerging technologies such as 5G, Blockchain,artificial intelligence, drones, and IoT in the fight against the COVID-19 pandemic. The feasibility of efficiency of edge computing and deep learning approaches for mitigating the COVID-19 pandemic were presented in [27]. Hussainet al.[28] provided a review on existing artificial intelligence techniques applied to the medical information-based pandemic as well as discussed the implementation of cloud and edge computing against COVID-19. The feasibility of efficiency of blockchain applications in combating the COVID-19 pandemic is presented in [31] and [32]. Table II summarizes the main focuses and major contributions of the previous comprehensive surveys on the use of IoT applications to fight against the COVID-19 pandemic. Although the abovementioned surveys [28]–[30] have laid a solid foundation for the detection and classification of COVID-19 medical images using artificial intelligence techniques, our survey differs in several aspects. To the best of our knowledge, our survey is the first that thoroughly covers security and privacy solutions as well as challenges and future research directions faced by the use of IoT applications to combat COVID-19 and future pandemics.

    D. Systematic Review and Meta-Analysis Methodology

    The process of conducting our literature review is based on the following phases proposed by Snyder in [35]:

    1) Designing the Review:The identification of literature for analysis in this paper was based on a keyword search, namely,“An IoT-based framework for COVID-19”, “An IoT-based system for COVID-19”, “An IoT-based protocol for COVID-19”, and “An IoT-based scheme for COVID-19”. Searching for these keywords in academic databases such as medRxiv,SCOPUS, Web of Science, Wiley Online Library, Google Scholar, and ACM Digital Library, an initial set of relevant sources were located. The search process provided a significant number of results, which only proposed IoT-based schemes for COVID-19 were collected.

    TABLE II RELATED SURVEYS ON THE USE OF IOT APPLICATIONS TO FIGHT AGAINST THE COVID-19 PANDEMIC

    2) Conducting the Review:The collected references have been evaluated based on the following key factors: a)reputation, b) pertinence, c) originality, and d) most influential articles in the topic area.

    3) Analyze Data:After conducting the literature review and selecting a final sample, the articles are evaluated and analyzed according to the following key factors: a) network model, b) solution type, c) countermeasures, d) security and privacy requirements, e) resistance to attacks, f) advantages and disadvantages, and g) motivation and design goals for COVID-19.

    4) Synthesize Data:Based on the evaluation and analysis of the articles, the sections are structured and synthesized to provide different types of information and different levels of details. Specifically, the final review article is structured in five sections, which offer an overview of future research directions to combat COVID-19 as well as security and privacy challenges faced by the use of IoT applications.

    E. Our Contributions

    The major challenge of IoT deployment for COVID-19 does not reside in the implementation of the emerging technologies,but primarily in the guarantee of security and privacy since the deployment of thousands of IoT based devices is in an open field [36]. For example, an adversary can use many cyber attacks, such as DDoS attacks to makes a service unavailable and then injects false data, which affects vaccine cold chain monitoring, healthcare management, healthcare delivery drones, and remote patient monitoring.

    Our contributions in this work are:

    1) We discuss the use of IoT applications to fight against the COVID-19 pandemic, including, for diagnosis and treatment,drugs and equipment management, decision making,healthcare delivery, vaccine cold chain monitoring,disinfecting public spaces, digital medical passports,immunity certificates, and COVID-linked symptoms.

    2) We overview security and privacy requirements as well as the threat models, and the challenges associated with developing IoT-based frameworks for COVID-19.

    3) Based on review and a new taxonomy of state-of-the-art solutions, we provide a classification into five categories,namely, authentication and access control solutions, key management and cryptography solutions, blockchain-based solutions, intrusion detection systems, and privacy-preserving solutions.

    4) We outline challenges and future research directions to combat COVID-19 as well as security and privacy challenges faced by the use of the IoT, such as the use of the internet of bio-nano things, applications of industry 4.0, IoTs solutions for vaccine shipments, computer vision for remote diagnosis,private patient information issues, vulnerabilities of machine learning techniques, compliance with healthcare data protection regulation, etc.

    The remaining part of this paper is structured as Fig. 3.Section II focuses on security and privacy requirements.Section III describes threat models. Section IV presents security and privacy solutions to combat COVID-19. Section V describes future research against epidemic situation applications like COVID-19. Lastly, Section VI presents conclusions.

    II. SECURITY AND PRIVACY REQUIREMENTS

    Due to continuing serious cyber attacks on public and private healthcare services, the proposal of a security and privacy solution to fight against epidemic situations like COVID-19 should provide and achieve the following requirements.

    1) Conditional Privacy Preserving:Viewed as an essential characteristic of privacy protection, which there are two aspects: the protection of user privacy and the targeted retrieval of device information. In other words, the user’s confidential data will be stored securely during the whole session. The unauthorized tracking to a specific device will not be permitted to be successful.

    2) Differential Privacy:Refers to a set of mathematical techniques (e.g., stable transformations, randomized response,Laplace mechanism, and sensitivity) that enable big data analysis on epidemic situation applications to be performed without disclosing individual information.

    3)Patient Anonymity:The open wireless transmission functionalities mean that communication channels of epidemic situation applications can be eavesdropped on by malicious devices. An adversary can analyze eavesdropped information such as user location, which seriously affects the user’s privacy. Hence, the anonymity of each device in epidemic situation applications must be guaranteed. The security solution should assure that an adversary is unable to determine a user’s true identity through intercepted data.

    4)Unforgeability:In practical transmission of epidemic situation applications, an adversary can forge selectively legitimate credentials, authentication session keys, or other signatures in order to complete the verification process successfully [37]. Therefore, unforgeability against the chosen message attack is the main characteristic of a secured exchange of information.

    5) Mutual Authentication:In the design of epidemic situation applications, mutual authentication is the primary and principal safety feature, which ensures that both units(Fog device, IoT device, Cloud center, etc.) in a session of communication can mutually authenticate each other. Thus,the identity theft attacks to specific equipment can be prevented [38].

    6)Untraceability:The untraceability of patients of COVID-19 when a program is under the surveillance of an adversary is the characteristic that the adversary is unable to track the patients when moving from one location to the next destination. Usually, the security protocols achieves untraceability using identities, current timestamps, and random nonces.

    7)Non-Repudiation:It guarantees the reliability of the data communicated in epidemic situation applications, where the originator of the data is not able to deny the validity of the signature transmitted.

    8)Session Key Establishment:When mutual authentication takes place, one single session key between individual device and epidemic situation application system must be provided to ensure secure communication [39].

    9) Session-Key Security:It maintains a secret session key between an approved member and an authorized device after they have successfully authenticated each other.

    10) Perfect Forward Secrecy:To ensure the security of data previously sent, the security solutions for epidemic situation applications need to provide the perfect forward secrecy,which means that an adversary is unable to retrieve a session key from a previous session of two users, although the adversary may compromise the two users’ private keys [40].

    11) Patient Location Privacy:The idea of location privacy can be described as the ability of patients COVID-19 to choose exactly when and how their location credentials may be shared with other parties and for what purposes.

    12) Patient Identity Privacy:It consists of applying protection technologies to minimize the disclosure of patient data that allow attackers to infer a patient’s identity.

    13) Patient Traceability:The medical center is capable of extracting the true identity of the patient by scanning pertinent information when requested. Heet al.[41] designed a crossdomain handshake solution based on hierarchical identitybased cryptography, which can provide patient traceability.

    14) Data Integrity:The integrity is one of the essential basic security requirements for the benign function of epidemic situation applications. Data integrity is the confirmation that the data that has been sent, received, or stored is complete and has not been altered. Therefore, security solutions use hash functions to provide data integrity. The blockchain-based solutions have integrity protection built-in since it is a tamperproof and immutable ledger.

    Fig. 3. Organization of this paper.

    III. THREAT MODELS

    Since the COVID-19 sensitive patient information will be transmitted through an open channel (i.e., the Internet), the potential for misuse of this information can happen. Hence,we propose the following threat models against epidemic situation applications like COVID-19. Specifically, we consider the widely accepted Dolev-Yao (DY) threat model[42] according to which two parties are allowed to interact through a public (unsecured) network. In the DY model, an adversaryAlaunches the following attacks to interrupt the data that are exchanged between parties but can also alter or eliminate the content of the data and can insert false data during the communication. Fig. 4 classifies the prevalent threats in the IoT-based healthcare systems on the basis of the layer it affects.

    Fig. 4. Classification of security threats in IoT-based healthcare systems to fight against epidemic situations like COVID-19.

    1) Replay Attack:To provide replay attacking resistance in epidemic situations, Tanet al.[43] designed a practical homomorphic authentication framework, which is based on the fresh timestamps used in each calculation. Usually, the use of timestamps can resist against replay attack.

    2) Impersonation Attack:An adversary assumes the identity of one of the legitimate entities in a communication protocol or a system. Alladiet al.[44] proposed an authentication framework for providing two-way authentication based on physical unclonable functions, which can resist impersonation attacks.

    3) Denial-of-Service Attack:This attack aims to make an epidemic situation application unable to respond to the requests of its users. Challaet al.[45] proposed an authentication framework based on ECC cryptography and three-factor, which can resist the denial-of-service attacks.

    4) Stolen Smart Card Attack:This implies that if an adversary takes the smart card of a user of an epidemic situation application, he may have the opportunity to impersonate this user identity or to initiate a new attack.Usually, the use of cryptography methods (e.g., Elliptic Curve Cryptography) can resist against stolen smart card attack.

    5) Man-in-the-Middle (MITM) Attack:It is an attack that uses at least three devices. Two devices use an epidemic situation application and communicate with each other. The third (i.e., an adversary) in the middle breaks the link between the two devices and masquerades as the other device. In other words, it intercepts and redirects the communications, and can also modify the exchanged data. Srinivaset al.[46] designed a cloud-based user authentication framework for enhanced medical data authentication, which can resist to the MITM attack since the random nonces and timestamps are used in encrypted data.

    6) Tampering Attack:It is a form of web-based attack where some parameters in the epidemic situation application or web page form field data that are submitted by a user are altered without that user’s authorization.

    7) De-Synchronization Attack:This type of attack means that the private data exchanged between a specific tag and the main server can be desynchronized using a number of attack techniques.

    8) Privileged-Insider Attack:This attack means that any person with special access (e.g., login information) to critical systems, servers and databases in epidemic situation applications can be viewed as an internal threat, as everyone’s access is a vulnerable point.

    9) False Data Injection Attack:These attacks are designed to compromising the readings of several medical sensors and healthcare data with the objective of misleading control and operations.

    10) Ephemeral Secret Leakage Attack:When ephemeral secrets are compromised, an adversary is able to divulge patients’ private keys, and the session key will be revealed from the listened messages.

    11) Attacks Against Blockchain-Based Solutions:These attacks are designed to create the vulnerabilities of the blockchain systems such as 51% vulnerability, selfish and reputation-based behaviors, private key leakage, double spending, and transaction privacy leakage. For more information about the threat models against blockchain systems, we refer the reader to the work [47].

    12) Sybil Attack:With this attack, an adversary generates a number of additional node identities based on a single physical device in order to acts in the same way as if it were a larger number of nodes.

    13) Botnet Attack:Botnets are malware-controlled and infected networks of electronic devices used to carry out DDoS or other types of cyber attacks.

    IV. SECURITY AND PRIVACY SOLUTIONS

    According to the security and privacy models, we classify the security and privacy solutions to combat COVID-19 into five categories, namely, 1) Authentication and access control solutions, 2) Key management and cryptography solutions, 3)Blockchain-based solutions, 4) Intrusion detection systems,and 5) Privacy-preserving solutions. The summary of potential solutions for security and privacy to combat epidemic situations like COVID-19 is presented in both Tables III and IV. The opportunities for these security and privacy solutions are presented in Fig. 5.

    A. Authentication and Access Control Solutions

    According to authentication models, we classify the authentication and access control solutions to combat COVID-19 into nine categories, namely, 1) Homomorphic authentication, 2) Electrocardiogram-based authentication, 3)Two-Way authentication, 4) ECC-based user authentication,5) Fine-grained data access control, 6) Cloud-centricauthentication, 7) Anonymous RFID tag authentication, 8)Smart card-based anonymous user authentication, and 9)Biometric authentication.

    TABLE III SUMMARY OF POTENTIAL SOLUTIONS FOR SECURITY AND PRIVACY IN EPIDEMIC SITUATIONS LIKE COVID-19 (PART 1)

    TABLE III SUMMARY OF POTENTIAL SOLUTIONS FOR SECURITY AND PRIVACY IN EPIDEMIC SITUATIONS LIKE COVID-19 (PART 1) (CONTINUED)

    TABLE IV SUMMARY OF POTENTIAL SOLUTIONS FOR SECURITY AND PRIVACY IN EPIDEMIC SITUATIONS LIKE COVID-19 (PART 2)

    TABLE IV SUMMARY OF POTENTIAL SOLUTIONS FOR SECURITY AND PRIVACY IN EPIDEMIC SITUATIONS LIKE COVID-19 (PART 2) (CONTINUED)

    1) Homomorphic Authentication:Based on the new intelligent transportation system (ITS)’s emerging advantages,Vehicle ad-hoc networks (VANETs) can capture and processing valuable vehicle data to enhance the driving environment and road safety. Tanet al.[43] addressed improving healthcare surveillance and infection monitoring for high-mobility transportation systems, which is not achievable for pandemic control. The automated tracking of infections for pandemic control can be performed consequently. Specifically, the authors designed a practical homomorphic authentication framework for cloud-assisted VANETs, where healthcare surveillance for any involved passengers is delivered. The proposed framework includes the use of the integrated cloud-based VANET infrastructure,where the medical data collection module is connected to the hybrid medical data acquisition module. To provide the infection monitoring on a specific vehicle and person, the mechanism of decentralized vehicle registration based on the blockchain is implemented cooperatively between vehicular cloud and edge units.

    2) Electrocardiogram-Based Authentication:The electrocardiogram can be used as tool for authenticate the telemedical terminals of epidemic situation applications.Zhanget al.[51] proposed an authentication framework based on the parallel electrocardiogram, named PEA, which can be applied for epidemic situation applications. The PEA framework provides a method of hybrid electrocardiogram feature extraction which includes features based on fiducialand non-fiducial for extracting enhanced electrocardiogram features to improve the stability of the authentication. Huanget al.[50] introduced an authentication framework that can authenticate patients based on noisy electrocardiogram data and guarantee the privacy of the patterns stored in the system.The proposed framework can be adopted for epidemic situation applications like COVID-19 which is able to track movements and adjust the algorithm depending on the current state of the movement.

    Fig. 5. Opportunities for security and privacy solutions to fight against epidemic situations like COVID-19.

    3) Two-Way Authentication:With the new use of IoT in health care, a large number of data on patients of COVID-19 are communicated and provided online. Alladiet al.[44]proposed an authentication framework, named HARCI, for providing two-way authentication, which can be applied between various entities in epidemic situation applications.The HARCI framework uses IoT devices with limited resources and architecture of three layers, including,healthcare cloud server, sink nodes, and patient nodes.Therefore, the HARCI framework can offer end-to-end authenticity by providing a single session key for each step of the authentication process. Based on a formal security proof called the Mao-Boyd logic, the HARCI framework is proven that it can ensure session key uniqueness and resist against node tampering attack, reply attack, man-in-the-middle(MITM) attack, and impersonation attack.

    4) ECC-Based User Authentication:The elliptic curve cryptography (ECC) is used by security protocols for providing authentication. Challaet al.[45] proposed an authentication framework based on ECC cryptography and three factors for wireless healthcare sensor networks, which can be applied for epidemic situation applications. Through formal security analysis techniques (e.g., BAN logic, AVISPA tool, and real-or-random (ROR) model), the proposed framework is proven to be secure against replay attack, denialof-service attack, stolen smart card attack, offline password guessing attack, impersonation attack, privileged-insider attack. In addition, the proposed framework guarantees user anonymity and mutual authentication.

    5) Fine-Grained Data Access Control:In smart healthcare where an epidemic situation application is used, some attributes of the server database information may be accessible only to privileged users. Royet al.[52] proposed a security framework that combines fine-grained access control and mutual authentication for healthcare applications using mobile cloud computing, which can be applied for epidemic situation applications like COVID-19. Based on the attribute-based encryption techniques and hash functions, the proposed framework can provide untraceability and user anonymity.

    6) Cloud Centric Authentication:Security and privacy are key issues in cloud computing-based epidemic situation applications, where people are restricted in their access to data stored at remote sites operated by various providers. Srinivaset al.[46] designed a cloud-based user authentication framework for enhanced medical data authentication, which can be applied for epidemic situation applications like COVID-19. Based on mutual successful authentication performed by a patient and a handheld sensor node, both parties create a secret session key which is then applied for secure communications in the future. Based on the ROR model and AVISPA tool, the proposed framework is proven secure against wearable sensor node capture attack as well as password change attack.

    7) Anonymous RFID Tag Authentication:The epidemic situation applications like COVID-19 use the low-cost radio frequency identification (RFID) tag to communicate with the servers and access points. Wuet al.[53] designed an anonymous RFID tag authentication framework for ehealthcare systems, which can be applied for epidemic situation applications. The proposed framework employs three techniques, namely, the secret key, the pseudo-identity, and the hash functions, which can provide anonymity for both the tag and the reader. Based on the game theory model, the proposed framework can provide forward and backward untraceability as well as can resist data forgery attacks and desynchronization attacks.

    8) Smart Card-Based Anonymous User Authentication:A wireless medical sensor network is a network of sensors composed of lightweight devices with limited resources,limited memory, low computational performance, and low energy battery power. The healthcare sensor devices (e.g.,ECG monitoring electrodes, heart rate monitors, oxygen,temperature, and blood pressure sensors) are placed on a user’s body, forming a wireless body network. Daset al.[55]designed a smart card-based anonymous user authentication framework for wireless body networks, which can be applied to counter epidemic situations like COVID-19. Based on the BAN Logic and AVISPA tool, the proposed framework is proven that can provides user anonymity as well as resistance against the following five attacks: replay attack, identity and password guessing attack, stolen verifier attack, and privileged-insider attack.

    9) Biometric Authentication:Biometric authentication is a security concept that is based on an individual’s unique biological characteristics to ensure that they are exactly who the individuals say they are. Biometric authentication technologies are based on the comparison of a biometric data capture with authentic data stored and validated in a database.Zhanget al.[56] proposed an authenticated key agreement system, which can address the security and computational requirements of eHealth applications. In the proposed system,the medical server is in charge of controlling the validity of the user. To protect the server from the possibility of identifying the biometric template, a random string is associated with it using the gold-exclusive operation. In addition, these hidden strings are protected by hash or biohach functions throughout the authentication and key negotiation procedures. This enables the medical server to check the biometric features in epidemic situations like COVID-19 directly without storing and retrieving the exact values.Biometric templates in storage devices such as smart cards and databases are protected by random numbers, ensuring that only the user has the actual value.

    B. Key Management and Cryptography Solutions

    According to key management models, we classify the key management and cryptography solutions to combat COVID-19 into five categories, namely, 1) Lattice-based secure cryptosystem; 2) Pairwise key establishment-based solution;3) Cross-domain handshake solution; 4) Three-factor remote user authentication; and 5) Homomorphic encryption-based solution.

    1) Lattice-Based Secure Cryptosystem:To securely processing COVID-19 data, it very important to use key management and cryptography solutions for providing security and privacy. Chaudharyet al.[54] designed a security protocol that is based on the lattice, named LSCSH, providing security of smart healthcare, which can be applied to counter epidemic situations. The security key used by the proposed LSCSH protocol is computed using lattice-based vector equations. The LSCSH protocol enables the validation of demands from cloud storage to various end-users including doctors and patients. In addition, the LSCSH protocol can resist to quantum attacks since breaking the security of Lattice vectors is equal to trying to solve NP-difficult problems.

    2) Pairwise Key Establishment-Based Solution:The idea of the pairwise key establishment is adopted by Zhouet al.[59]for designing a privacy-preserving key management framework, named 4S, in the m-healthcare social network,which can be applied to counter epidemic situations. Based on the collaboration of patients affected by similar pathologies in the same community, the proposed framework can withstand both time-based and location-based mobile attacks. Due to the symmetrical structure of the body, sensors for body monitoring such as electrocardiogram and electroencephalography are usually placed on patients symmetrically to track their vital symptoms. By extending the proactive secretsharing approach, the proposed framework is proven that can provide both identity and location privacy.

    3) Cross-Domain Handshake Solution:The handshake solution is an example of an effective cryptography method,that can enable secure communication in epidemic situation applications like COVID-19. Based on hierarchical identitybased cryptography, Heet al.[41] designed a cross-domain handshake solution, named CDHS, for secure communication in mobile healthcare social networks. For securing epidemic situation applications, two patients who are registered at various health institutions can obtain mutual authentication and then create a session key, where the elliptic curve cryptography is applied. In addition, using the random oracle model, the CDHS solution was proven secure assuming the intractability of the inversion computational diffie-Hellman(ICDH) problem. Therefore, to provide anonymity in internet of medical things with COVID-19 patients care, Masudet al.[60] designed a secure key establishment scheme. The proposed scheme uses some cryhptographics methods,including, Bit-wise XOR operations, physical unclonable functions, nonce, and one-way hash function. Based on these lightweight cryptography primitives, the proposed scheme is proven that can secure communication from adversarial threats through secure sessions as well as providing resistance to cloning, tampering and side-channel attacks.

    4) Three-Factor Remote User Authentication:Implantable medical devices (IMDs) are artificial devices that can be placed in the patient’s body to enhance the operation of different parts of the body. IMDs are used to control and process the human physiological status (e.g., blood glucose monitoring by insulin pumps). In this type of communications infrastructure, however, security and privacy issues such as health data leakage and IMD malfunction through unauthorized access are always present. Wazidet al.[57]designed a lightweight three-factor remote user authentication framework for secure IMDs, which can be applied for epidemic situation applications like COVID-19. Based on the security verification tool, the proposed framework can provide protection against some attacks, namely, replay attack,controller node impersonation attack, user impersonation attack, and privileged-insider and offline password guessing attack. In addition, the proposed framework can provide session key security and preserve both anonymity and untraceability properties.

    Fig. 6. Blockchain-based solution for security and privacy to counter epidemic situations like COVID-19.

    5) Homomorphic Encryption-Based Solution:E-health systems are enabling the monitoring of health conditions like COVID-19, facilitating disease models and rapid intervention,as well as providing evidence-based medical intervention through medical text mining and the extraction of image characteristics. Zhouet al.[58] designed a privacy-preserving fully holomorphic data aggregation framework, named PPDM, for securing data exchanged between parties. Based on the formal security proof, the PPDM framework can achieve a higher security level of privacy preservation.

    C. Blockchain-Based Solutions

    The blockchain technology [76] is identified by the European parliament’s research service (EPRS) as one of the ten key enabling strategies to combat COVID-19, as discussed by Kallaet al.[32], where blockchain-based systems can be used for 1) tracking of contacts, 2) emergency assistance and insurance, 3) sharing patient data, 4) automated monitoring and contactless delivery, etc. According to the case used, we classify the blockchain-based solutions to combat COVID-19 into six categories, namely, 1) Digital medical passports and immunity certificates, 2) Blockchain-based data tracking solution, 3) Blockchain-based evaluation for online education,4) Artificial intelligence and blockchain-based solution, 5)Blockchain-based access control, and 6) Decoupled blockchain-based solution.

    1) Digital Medical Passports and Immunity Certificates:The basic idea of the blockchain data structure is based on a chained list, i.e., it is distributed between all nodes of the network where each node stores its local copy of all blocks started from the block of genesis. Hasanet al.[48] designed a blockchain-based solution based on proxy re-encryption for digital medical passports and immunity certificates, as presented in Fig. 6. The proposed solution employs programmable Ethereum Smart Contracts to perform function calls and produce events which inform entities involved of health data, updates on tests and other requirements.Therefore, the proposed solution helps stop the propagation of the COVID-19 virus using chained medical digital passports and immunity certificates. Because the information broadcast on the network is immutable, it can be reliable because it comes from an affiliated source. In addition, in the proposed solution, all notifications are reported by trusted authorities affiliated with high authorities such as the COVID-19 testing centers, the Ministry of Health, and the Ministry of Foreign Affairs.

    2) Blockchain-Based Data Tracking Solution:To guarantee that the data collected by the public and government organizations are dependable and trusted, the implementation of a blockchain-based tracking system is essential to fight against the COVID-19 pandemic. Marbouhet al.[31]designed a blockchain-based tracking solution based on Ethereum smart contracts and oracles to monitor data reported on a number of new infections, mortality, and recovery rates from reliable information sources. In the proposed solution,there three smart contracts used by the blockchain system,namely, aggregator Smart contract, reputation contract, and registration contract. The aggregator smart contract consists of recovering the most recent updates and forwarding that information to front-end users. The reputation contract involves attributing a reputation rating to an oracle obtained from the assessment of web data sources that are evaluated to recover data. The registration contract contains details of web sources and stakeholders involved.

    Fig. 7. Artificial intelligence and blockchain-based solution for drone-aided healthcare services including the current pandemic of COVID-19.

    3) Blockchain-Based Evaluation for Online Education:Online education is now required internationally during the COVID-19 pandemic situations. Therefore, it is necessary to improve e-learning technology for the preservation of data privacy and transparency in the education system. Shuklaet al.[49] introduced a blockchain-based evaluation framework, named BDoTs, for securing online education during the COVID-19 pandemic situations. The BDoTs framework is based on three layers, including, instructor layer,middleware layer, and student layer. The instructor layer ensures pedagogical support by providing the required content to support learning. The middleware contains the Ethereum blockchain, while the student layer consists of the registration of students in the system. These layers develop smart contracts on blockchain technology to ensure accountability,trust between parties involved, and a secure payment system in the online education environment.

    4) Artificial Intelligence and Blockchain-Based Solution:The artificial intelligence-based IoT UAV-assisted healthcare service is a dedicated framework that can be deployed for various different types of healthcare tasks, for example, the collection of blood and urine tests, the delivery of medical products, and the delivery of other medical services, such as the present COVID-19 pandemic, as presented in Fig. 7.Wazidet al.[61] designed a security solution using a private blockchain for securing communications in an IoT-activated UAV-assisted healthcare communication infrastructure. Based on the elliptic curve digital signature algorithm and blockchain technology, the proposed solution can resist some attacks, such as privileged-insider attacks, impersonation attacks, man-in-the-middle attacks, and replay attacks.

    5) Blockchain-Based Access Control:Access control is a critical security measure required for an authorized user equipped with IoT that uses his or her intelligent wireless enabled device to authenticate with a hospital’s trusted authority. Sahaet al.[62] proposed an access control framework using private blockchain technology for secure communications for IoT-enabled healthcare systems, which can be applied to counter epidemic situations like COVID-19.Based on the elliptic curve cryptography approach, the proposed framework is proven that can provide anonymity and untraceability as well as resistance against impersonation attacks, replay attacks, ephemeral secret leakage attacks,offline guessing attacks, and man-in-the-middle attacks.

    6) Decoupled Blockchain-Based Solution:The internal monitoring sensors in COVID-19 form a large IoT network which monitors and sends data to nearby equipment or computers on a permanent basis. The networking of these IoTbased sensors with various devices, however, results in security vulnerabilities that can be taken by an adversary due to the availability of data. Aujlaet al.[63] designed a decoupled blockchain-based solution for ensuring the security and privacy of information in the internal healthcare surveillance ecosystem. The proposed solution enables the transmission of internal healthcare surveillance data to the cloud by leveraging edge nodes. The proposed network model is organized in two parts, including: i) in-home health monitoring model and ii) lightweight and decoupled blockchain architecture. The in-home health monitoring model includes three layers, namely, IoT-Healthcare layer,Edge-Blockchain layer, and Cloud layer. The findings in terms of blockchain and tensor-based metrics of evaluation demonstrate the efficiency of the proposed solution.

    Fig. 8. Intrusion detection system-based solution for healthcare services including the current pandemic of COVID-19.

    D. Intrusion Detection Systems

    Intrusion detection systems (IDSs) have become one of the most important security techniques for identifying threats in smart healthcare networks. To enhance the detection capabilities of a single IDS, collaborative intrusion detection systems or networks are frequently deployed in smart hospitals, enabling a set of IDS nodes to communicate with each other by exchanging alarms, signatures, and other information such as COVID-19 alarms. The process of building an IDS-based solution for healthcare services including the current pandemic of COVID-19 is presented in Fig. 8 [77]. The first step consists of creating an environment of communications, including, IoT devices, Access Points,SDN, Cloud Computing, Edge Computing, etc. The second step consists of launching different network attacks using Kali Linux. The third step includes capturing and recording the data including the network traffic (Pcaps) and event logs(windows and Ubuntu event Logs) per machine. The fourth step consists of generating the CSV files from Pcaps files and analyzing the data (e.g., using the CICFlowMeter tool). The fifth step consists of splitting the dataset into a training dataset and a test dataset. The sixth step consists of training using machine learning approaches to build a model. The last step consists of testing using this model to identify and detect attacks on medical devices. Therefore, there are two categories of IDS solutions, namely, 1) Signature-based solutions and 2) Machine learning-based solutions.

    1) Signature-Based Solutions:This technique is based on the description of suspicious behaviors through rules, called signatures. These signatures are used to describe state machines, pattern queries, or statistical analyses. The main disadvantage of this technique resides in the need to having a regularly updated rules base. Liet al.[67] proposed a generic blockchain-based framework, named CBSigIDS, which is a signature-based IDS. The CBSigIDS framework can ensure that signatures are shared securely against malicious nodes in IoT environments for smart healthcare. The main concept behind this is to deploy blockchain technology to build up a database of trusted signatures over time. This approach can guarantee detection efficiency by only applying verified and reliable signatures in a collaborative IoT network such as smart healthcare. Therefore, Mitchellet al.[78] provided and studied a rule-based approach for the specification of behavioral rules for intrusion detection of medical devices integrated into a medical cyber physical system where patient protection has high priority.

    2) Machine Learning-Based Solutions:This technique is based on the use of machine learning and data mining algorithms to identify and detect attacks on medical devices including fake data injection, message alteration, and eavesdropping, which can affect patient safety, security, and reliability of critical systems such as the COVID-19 applications. To ensure the security of the connected medical device network, Thamilarasuet al.[64] introduced an intrusion detection system based on a mobile agent. The proposed system is hierarchy-based, self-contained, and uses self-learning and regression algorithms to identify anomalies in the sensor data as well as intrusions at the network level.There are five machine learning algorithms evaluated,including, random forests, decision trees, k-nearest neighbor,naive Bayes classifier, and support vector machines, where the results show that random forests achieves the highest classification accuracy of approximately 100%. Heet al.[68]proposed an intrusion detection system based on stacked autoencoder to identify and detect attacks in connected healthcare systems, which can be applied for healthcare critical systems such as the COVID-19 applications. The proposed system uses a stacked autoencoder to extracting the attributes, which reduces not only the size of the attributes but also the memory necessary to compute the covariance matrix.Based on the ensemble learning technique, Kumaret al.[66]designed an intrusion detection system for securing the internet of medical things environment that combines Cloud architecture with Fog computing. The performance evaluation on the ToN_IoT dataset shows that the proposed system achieves an accuracy of 96.35%.

    E. Privacy-Preserving Solutions

    According to the privacy model, we classify the privacypreserving solutions to combat COVID-19 into six categories,namely, 1) Anonymity preserving solutions, 2) Privacypreserving collaborative model learning solution, 3) Users privacy-preserving solution, 4) Data privacy-preserving solution, 5) Identity privacy-preserving solution, and 6)Location privacy-preserving solution.

    1) Anonymity Preserving Solutions:Automating electronic contacts is one of the most cost-effective and efficient additional non-pharmaceutical strategies for reducing and controlling diseases such as Coronavirus 2019. To provide anonymity-preserving, Garget al.[7] created and implemented an anonymous IoT privacy framework with an RFID proof of concept. Based on blockchain technology, the proposed model solution enables moving devices to be able to send or receive alerts when they are in close proximity to a reported, suspected or confirmed case of disease. Yuet al.[65] developed a blockchain-based framework to enhance the support of medical research, which can enable efficient sharing of information while maintaining privacy against COVID-19. In the first stage, both hospitals and medical research organizations are considered as nodes in the alliance chain, allowing consensus and data sharing between the nodes. Secondly, researchers, medical doctors, COVID-19 patients are required to be authenticated at different locations.In addition, medical doctors and researchers are required to be registered with the Fabric Certification Authority. To protect privacy, The COVID-19 patient uses the pseudonym mechanism of blockchain technology. The performance evaluation demonstrates that the security performance of reading and writing and security on blockchain satisfies the specifications, which can support a large application of the results of scientific research to combat COVID-19.

    2) Privacy-Preserving Collaborative Model Learning Solution:To enhance the medical online diagnostic service accuracy, Wanget al.[69] designed a privacy-preserving collaborative model learning framework, named PCML, for secure E-Healthcare, which can be applied to combat COVID-19. With the proposed PCML framework, medical institutions can more safely train a comprehensive global diagnostic model from their cloud-based local diagnostic models, and each medical institution’s critical data is fully secured using the paillier cryptosystem. Besides, the proposed PCML framework employs a secure multi-party vector comparison algorithm which ensures that any local diagnostic models are encoded by the local community before they are delivered to the cloud and can be used immediately without decryption.

    3) Users Privacy-Preserving Solution:To provide the development of predictions of disease risk and recommendations for hospitals, Wanget al.[70] designed a privacy-preserving pre-clinical guidance framework, called PGuide, which can be applied to combat COVID-19. Using the PGuide framework, a user requiring health services is able to access the disease risk prediction and hospital recommendation services provided by the health service provider while maintaining the privacy of the user and the service provider. Based on the performance evaluation, the PGuide framework is proven efficient in terms of communication overhead and computational cost. Note that the single-attribute encryption technique is used to achieve privacy-preservation requirements.

    4) Data Privacy-Preserving Solution:The online health care provider can offer a trusted data service (e.g., k-NN query) to doctors for more accurate diagnosis with the help of health data. For encrypted outsourced eHealthcare data, Zhenget al.[71] proposed a privacy-preserving k-NN query framework based on the homomorphic encryption method. The proposed framework can perform a k-NN computation on data encrypted with a computing complexityO(lklogN), in whichlandNrefer to the size of data and the number of data,respectively. Therefore, there is another potential solution that uses the homomorphic cryptographic method, where Yanget al.[72] designed a privacy-preserving disease risk prediction framework, named EPDP, which can be applied to combat COVID-19. The proposed EPDP framework performs two phases of disease risk prediction overall, i.e., training in the disease model and disease prediction, while maintaining confidentiality.

    5) Identity Privacy-Preserving Solution:To provide an identity privacy-preserving solution, Zhanget al.[73]introduced a privacy-preserving disease prediction system,named PPDP, for securing cloud-based e-Healthcare system which can be applied to combat COVID-19. With the proposed PPDP framework, the historical medical data collected from COVID-19 patients are encrypted and transferred to the cloud server, which can then be used to build prediction patterns through the Perceptron Single-Layer learning algorithm to maintain identity privacy. The disease risk for future medical data can be calculated on the basis of prediction models. Based on the nonlinear kernel support vector machine, Zhuet al.[74] designed a privacy-preserving online medical pre-diagnosis scheme, named eDiag, for secure healthcare systems. The eDiag scheme enables that critical personal health data can be managed anonymously during the process of online pre-diagnosis. In addition, the eDiag scheme uses polynomial aggregation and lightweight multi-party random masking techniques for providing privacy-preserving.

    6) Location Privacy-Preserving Solution:To identify the risk of patient disease in a privacy-sensitive environment, Liuet al.[75] designed a privacy-preserving patient-centric clinical decision support framework. In the proposed framework, historical data of previous patients is stored in the cloud and can be applied to build the naive Bayesian classifier without disclosing the patients’ individual medical data, then the built classifier can be implemented to calculate the risk of disease for new patients in the future and also allow these patients to recover the names of the most popular diseases depending on their own preferences. Therefore, the additive homomorphic proxy aggregation technique is used to ensure the protection of the privacy of historical data (e.g., location privacy).

    V. FUTURE RESEARCH

    To complete our study, we outline both open challenges and future research opportunities to combat COVID-19. Table V summarizes research challenges in terms of security and privacy for fighting COVID-19 and future pandemics with the IoT.

    A. Resistance Against Quantum Computing Attacks

    With the new emerging technologies that are evolving all the time, such as quantum computing, the potential solutions of cybersecurity to fight against epidemic situations like COVID-19 will continue to be adapted [104]. As we have seen in this study, through public-key cryptography and hash functions, the blockchain-based solution can provide accountability, redundancy, and transparency. Therefore, the rapid advances in quantum computing technologies are making attacks based on Grover and Shor’s methods possible in the near future. Such methods menace both public-key cryptography and hash functions, which require the rethinking of blockchains to use encryption systems that are resistant to quantum attacks. The development of quantum-resistant cryptosystems is one of the significant research challenges,which will help the blockchain-based solutions to combat COVID-19.

    B. Vulnerabilities of Machine Learning Techniques

    Artificial intelligence is currently employed as a tool to contribute to the fight against the viral pandemic which has infected the world since the beginning of 2020 [105]. The predictions of the virus structure generated by machine learning techniques helped scientists to gain many months of experimentation. The American start-up Moderna is renowned for its control of new biotechnology techniques based on messenger ribonucleic acid (mRNA). With the support of bioinformatics, which includes machine learning techniques,the company has reduced significantly the time needed to design a prototype vaccine testable on humans [106].However, during learning and classification, an adversarial attack on deep learning can allow an adversary to inject false data into the target system, which will disturb the predictions of the virus structure. Hence, potential vulnerabilities of machine learning algorithms should be carefully designed to find the best predictions of the virus structure.

    C. Computer Vision for Remote Diagnosis

    Computer vision, as a sub-field of artificial intelligence, has had a big success in the solution of several complex healthcare challenges and has the opportunity to support the control of COVID-19. There have been many computer vision approaches proposed so far, addressing various dimensions of controlling the COVID-19 pandemic. Recently, Ulhaqet al.[107] proposed a classification of computer vision techniques to combat COVID-19 into three main research areas: 1)disease treatment and management, 2) disease prevention and control, and 3) diagnosis and prognosis. However, these computer vision techniques are vulnerable to adversarial preprocessing techniques such as image-scaling attacks [108],[109], which will affect the classification of image features(e.g., classify the COVID-19 as a bacterial condition). A possible research direction in this topic could be related to the development of new defenses against image-scaling attacks.

    D. IoT Solutions for Vaccine Shipments

    On December 11, 2020, the U.S. Food and Drug Administration issued its approval authority stamp for the authorization of Pfizer BioNTech COVID-19 vaccine for use as an emergency product in the United States. However, the Pfizer vaccine faces a challenge in terms of logistics, which shippers are required to maintain it in exceptionally cold temperatures of minus 70 degrees Celsius [110]. The progress of the internet of things technologies can allows monitoring this temperatures of vaccine shipments in transit and can significantly contribute to improving the public’s assurance that vaccines are both reliable and cost-effective [111]. The use of the IoT solutions for vaccine shipments is one of the significant research challenges.

    E. Applications of Industry 4.0

    Industry 4.0 is the implementation of advanced new technologies such as, the IoT, cyber-physical system, cloud computing, fog computing, and Big data analytics, etc., that enable reliability flexibility, visibility, and traceability in an intelligent production system [112]. The use of industry 4.0 as an implementation of a smart factory can contribute to developing a vaccine for COVID-19, which the industrial internet of things (IIoT) will be implemented to integrate the underlying equipment resources and guarantee cooperation among equipment as well as the quality-of-service (QoS) ofthe network. Hence, smart factory architecture should be carefully designed to improve the management of manufacturing resources.

    TABLE V SUMMARY OF RESEARCH CHALLENGES FOR FIGHTING COVID-19 AND FUTURE PANDEMICS WITH THE IOT

    F. The Internet of Bio-Nano Things (IoBNT)

    The IoBNT concept is introduced by Akyildizet al.[113],which is defined as the basic structure and function parts that are uniquely identifiable and interact with each other in the biological system. This concept executes functions and processes in connected bio-nano sensors and devices, such as sensing, analysis, operation, and communication with each other. The nano-senors can operate inside the human body and transmit the data (i.e., ECG, heart rate monitors, oxygen,temperature, and blood pressure sensors) to edge nodes for data analysis, and then cloud data centers for storage and endto-end services [114]. However, a group of attackers can use many cyber attacks (i.e., attacks against Cloud data centers,attacks against Fog-nodes, and attacks against nano-sensors)as presented in Fig. 9, which will disclose sensitive information and affect the smooth operation of the IoBNT networks, such as remote patient monitoring, healthcare delivery drones, and healthcare management, etc. Hence,critical security issues arise as follows:

    Fig. 9. Security threats in the IoBNT architecture with nano-scale devices.

    1) How to provide secure data exchange between parties involved in the healthcare process and ensure connectivity with patients?

    2) How to provide authentication and access control between nano-sensors and Edge nodes?

    3) How to preserve the privacy of location and identity of nano-sensors?

    G. Compliance With Healthcare Data Protection Regulation

    To track COVID-19 in countries, some nations like China,Israel, Singapore, and South Korea, the government uses each person’s cellphone and credit card information in order to track the moving information as well as know and control whether a person has once been to a high-risk area [115]. In this kind of control, there is no privacy for hiding the visited places from the government. Another thing, some researchers mentioned that they can use the cellphone to record all the potentially contacted (i.e., pass by) people to allow the government to quickly identify and localize the potentially affected people, in this scenario, there is no privacy for hiding from the government. Therefore, the European Union (EU)applies the General Data Protection Regulation (GDPR),which addresses EU law on data protection and privacy, but does not take people’s privacy into consideration in epidemic situations like COVID-19. Hence, new technical and organizational measures must be implemented by controllers and processors of personal data in epidemic situations, which is a promising area of research for the near future.

    H. Designing a Secure SDN-IoT Framework

    The IoT architecture to combat COVID-19 is a fusion of a heterogeneous collection of several technologies, where each technology carries a different set of security challenges and weaknesses. The software defined network (SDN), along with its special features of separating the control plan from the data plan and providing maintenance of a centralized programmable controller, has become increasingly important in overcoming the security issues and challenges associated with the IoT environment [116]. However, the design of a secure SDN-IoT framework to combat COVID-19 is particularly challenging as it requires applying a security protection scheme for various IoT network technologies and management aspects while taking into account the sensitivities of each IoT sub-system.

    I. Private Patient Information Issues

    Hospitals store an incredible quantity of data on COVID-19 patients. This confidential data is highly valuable to hackers who can easily market it, which makes the industry a rising target. Since the healthcare staff need to access data remotely,the IoT devices can be used as an entry point for attackers to launch an attack such as man-in-the-middle attacks and DoS attacks, which will prevent health care institutions to provide life-saving treatment to COVID-19 patients [117]–[119]. To monitors the system for such attacks, some countermeasures like public key infrastructure (PKI), TLS/SSL-based communication, cryptographic algorithms and protocols, and differential privacy techniques have been proposed. A possible research direction in this topic could be related to developing efficient secure and privacy-preserving schemes using these countermeasures in order to preserve private patient information. In addition, the optimization of computing cost needs to be taken into consideration since the connected bio-nano sensors and devices are characterized by limited resources.

    J. Cyber Security Datasets for IoT-Based Platforms

    When proposing intrusion detection systems for identifying threats in smart healthcare networks, the finding of complete and valid cyber security datasets is incredibly challenging since there are few IoT-based network traffic datasets with malicious attack behaviors such as BoT-IoT dataset [120].Therefore, security researchers also use other cyber security datasets such as UNSW-NB15, DARPA/KDD Cup99, NSLKDD, ISCX 2012, CICIDS 2017, etc. [121]. These cyber security datasets are not simulated for smart healthcare environments to fight against COVID-19. Hence, the development of a new cyber security dataset to build a network intrusion detector under an IoT-based smart healthcare environment is one of the significant research challenges to fight against COVID-19.

    VI. CONCLUSION

    In this paper, we provided a comprehensive survey of potential solutions for security and privacy challenges faced by the use of IoT applications for fighting against epidemic situations like COVID-19. Specifically, we presented the security and privacy requirements as well as the threat models,and the challenges associated with developing IoT-based frameworks for COVID-19. Based on review and a new taxonomy of state-of-the-art solutions, we provided a classification into five categories, namely, authentication and access control solutions, key management and cryptography solutions, blockchain-based solutions, intrusion detection systems, and privacy-preserving solutions. The works presented in each class have been crisply summarized and compared with each other. Finally, we discussed and highlighted open challenges and future research directions,including, 1) resistance against quantum attacks, 2)Vulnerabilities of machine learning techniques, 3) computer vision for remote diagnosis, 4) internet of things solutions, 5)applications of industry 4.0, 6) the internet of bio-nano things,7) compliance with healthcare data protection regulation, 8)designing a secure SDN-IoT framework, 9) private patient information issues, and 10) cyber security datasets for IoTbased platforms. We hope that this survey will help security and privacy protocol designers to design efficient solutions for fighting COVID-19 and future pandemics with the use of IoT applications.

    无遮挡黄片免费观看| 成人手机av| 亚洲第一av免费看| 亚洲精品中文字幕在线视频| 亚洲av片天天在线观看| av一本久久久久| 久久久久国产一级毛片高清牌| 18在线观看网站| 国产精品.久久久| 欧美97在线视频| av线在线观看网站| 悠悠久久av| 中文字幕精品免费在线观看视频| 久久热在线av| 亚洲国产欧美在线一区| 老司机午夜十八禁免费视频| 久久久久久久久久久久大奶| 人体艺术视频欧美日本| 在线精品无人区一区二区三| 久热这里只有精品99| 新久久久久国产一级毛片| 在线观看www视频免费| 99九九在线精品视频| 高潮久久久久久久久久久不卡| 精品久久蜜臀av无| 少妇人妻久久综合中文| 免费人妻精品一区二区三区视频| 亚洲九九香蕉| 亚洲中文av在线| 国产伦理片在线播放av一区| 少妇精品久久久久久久| 亚洲图色成人| 亚洲精品国产区一区二| www日本在线高清视频| 久久国产亚洲av麻豆专区| 欧美另类一区| 国产亚洲欧美精品永久| 一区二区av电影网| 香蕉国产在线看| 亚洲五月婷婷丁香| 高清黄色对白视频在线免费看| 人人妻人人澡人人爽人人夜夜| 亚洲av美国av| 尾随美女入室| 两个人免费观看高清视频| 丝瓜视频免费看黄片| 999精品在线视频| 亚洲精品第二区| 最近手机中文字幕大全| 久久 成人 亚洲| 欧美日韩视频高清一区二区三区二| 一级毛片电影观看| 国产亚洲欧美精品永久| 爱豆传媒免费全集在线观看| 老司机午夜十八禁免费视频| 精品熟女少妇八av免费久了| 日本av免费视频播放| 亚洲av国产av综合av卡| 满18在线观看网站| 男女免费视频国产| 黑丝袜美女国产一区| 久热这里只有精品99| 精品国产一区二区三区四区第35| 国产免费又黄又爽又色| 精品亚洲成a人片在线观看| 丝瓜视频免费看黄片| 飞空精品影院首页| 蜜桃国产av成人99| 久久久精品区二区三区| 国产视频一区二区在线看| 一边摸一边抽搐一进一出视频| 2021少妇久久久久久久久久久| 在线观看免费高清a一片| 看免费av毛片| 一级毛片女人18水好多 | av在线app专区| 精品人妻一区二区三区麻豆| 久久精品国产a三级三级三级| 欧美+亚洲+日韩+国产| 王馨瑶露胸无遮挡在线观看| 黑人欧美特级aaaaaa片| 只有这里有精品99| 久久性视频一级片| 婷婷色综合大香蕉| 久久精品久久久久久噜噜老黄| 麻豆国产av国片精品| 成人黄色视频免费在线看| 最新的欧美精品一区二区| 这个男人来自地球电影免费观看| 汤姆久久久久久久影院中文字幕| 丝袜人妻中文字幕| 久久精品亚洲av国产电影网| 又大又爽又粗| 丝袜人妻中文字幕| 欧美精品一区二区免费开放| 欧美精品一区二区免费开放| 亚洲色图 男人天堂 中文字幕| 最新的欧美精品一区二区| 超色免费av| 亚洲美女黄色视频免费看| 中文欧美无线码| 欧美人与性动交α欧美精品济南到| 99精品久久久久人妻精品| 免费在线观看黄色视频的| 午夜av观看不卡| 香蕉国产在线看| 亚洲一卡2卡3卡4卡5卡精品中文| 婷婷色综合大香蕉| 国产成人一区二区三区免费视频网站 | 亚洲国产精品成人久久小说| 国产精品久久久久久精品电影小说| 亚洲国产精品成人久久小说| 久久久久国产精品人妻一区二区| 国产片特级美女逼逼视频| a级毛片黄视频| 免费日韩欧美在线观看| 在现免费观看毛片| 亚洲一区中文字幕在线| 黄色视频在线播放观看不卡| 侵犯人妻中文字幕一二三四区| 亚洲五月色婷婷综合| 国产精品一区二区精品视频观看| 亚洲精品第二区| 激情视频va一区二区三区| 亚洲精品在线美女| 中文字幕制服av| 纯流量卡能插随身wifi吗| 成年av动漫网址| 99久久人妻综合| 精品亚洲成a人片在线观看| 搡老岳熟女国产| 国产主播在线观看一区二区 | 七月丁香在线播放| 亚洲综合色网址| 国产视频首页在线观看| 久久久久久久久免费视频了| 丁香六月欧美| 欧美乱码精品一区二区三区| 五月天丁香电影| 日韩 亚洲 欧美在线| 国产亚洲一区二区精品| 丝袜在线中文字幕| 亚洲av成人不卡在线观看播放网 | 婷婷成人精品国产| 国产深夜福利视频在线观看| tube8黄色片| 亚洲精品久久成人aⅴ小说| h视频一区二区三区| 国产又色又爽无遮挡免| 欧美人与善性xxx| www.av在线官网国产| 国产有黄有色有爽视频| 国产成人精品无人区| 久久天躁狠狠躁夜夜2o2o | 99国产精品一区二区三区| 777久久人妻少妇嫩草av网站| 国产日韩欧美视频二区| 999久久久国产精品视频| 少妇 在线观看| 国产精品99久久99久久久不卡| 精品国产超薄肉色丝袜足j| 欧美+亚洲+日韩+国产| 日韩 欧美 亚洲 中文字幕| kizo精华| 女性生殖器流出的白浆| 51午夜福利影视在线观看| 视频在线观看一区二区三区| 欧美日韩视频精品一区| 又大又黄又爽视频免费| 色综合欧美亚洲国产小说| 激情五月婷婷亚洲| 久久 成人 亚洲| 亚洲自偷自拍图片 自拍| 午夜激情av网站| 一级黄片播放器| 精品国产超薄肉色丝袜足j| 黑人巨大精品欧美一区二区蜜桃| 国产免费又黄又爽又色| 免费在线观看完整版高清| 黄色一级大片看看| 美女中出高潮动态图| 黄片小视频在线播放| 在线天堂中文资源库| 无遮挡黄片免费观看| 91成人精品电影| 亚洲五月色婷婷综合| 中文字幕亚洲精品专区| 国产在线观看jvid| 另类亚洲欧美激情| 国产三级黄色录像| 国产成人精品久久久久久| 久久精品亚洲av国产电影网| bbb黄色大片| 亚洲精品国产一区二区精华液| av在线播放精品| 99九九在线精品视频| 亚洲精品一卡2卡三卡4卡5卡 | 午夜激情久久久久久久| 亚洲国产精品一区三区| 亚洲欧美一区二区三区久久| 亚洲五月色婷婷综合| 99久久人妻综合| 免费看不卡的av| 大香蕉久久网| 久久精品国产亚洲av高清一级| 老司机午夜十八禁免费视频| 国产亚洲欧美精品永久| 啦啦啦中文免费视频观看日本| av不卡在线播放| 亚洲精品成人av观看孕妇| 人人妻,人人澡人人爽秒播 | 欧美日韩综合久久久久久| 欧美精品人与动牲交sv欧美| bbb黄色大片| 欧美国产精品一级二级三级| 国产成人免费无遮挡视频| 国产精品免费视频内射| 晚上一个人看的免费电影| 国产真人三级小视频在线观看| 久久久久精品人妻al黑| 中文字幕人妻丝袜制服| 69精品国产乱码久久久| av又黄又爽大尺度在线免费看| 精品少妇久久久久久888优播| 2021少妇久久久久久久久久久| 热re99久久精品国产66热6| 亚洲少妇的诱惑av| 久久亚洲国产成人精品v| 你懂的网址亚洲精品在线观看| 国产精品国产三级专区第一集| 性少妇av在线| 久久国产精品人妻蜜桃| 久久精品国产综合久久久| 丰满饥渴人妻一区二区三| 国产日韩欧美亚洲二区| 蜜桃在线观看..| 国产成人精品无人区| 欧美日韩一级在线毛片| 免费av中文字幕在线| 黄色毛片三级朝国网站| 亚洲专区国产一区二区| 丝瓜视频免费看黄片| 深夜精品福利| 国产有黄有色有爽视频| 国产熟女午夜一区二区三区| 亚洲成国产人片在线观看| 91老司机精品| 国产片特级美女逼逼视频| 丝瓜视频免费看黄片| 18禁国产床啪视频网站| 少妇裸体淫交视频免费看高清 | 亚洲国产看品久久| 免费高清在线观看日韩| 国产熟女午夜一区二区三区| 国产男人的电影天堂91| 免费一级毛片在线播放高清视频 | 老司机影院成人| 久久久久久久国产电影| 久久亚洲国产成人精品v| 你懂的网址亚洲精品在线观看| 美女主播在线视频| 国产精品一区二区在线不卡| 少妇猛男粗大的猛烈进出视频| 国产黄色视频一区二区在线观看| 999久久久国产精品视频| 宅男免费午夜| 天堂中文最新版在线下载| 国产成人av教育| 久久午夜综合久久蜜桃| 国产老妇伦熟女老妇高清| 成人国产一区最新在线观看 | 国产男人的电影天堂91| 99久久99久久久精品蜜桃| 国产日韩欧美视频二区| av欧美777| 成人免费观看视频高清| 久久性视频一级片| 伦理电影免费视频| 欧美性长视频在线观看| 亚洲专区中文字幕在线| 亚洲成人国产一区在线观看 | 午夜日韩欧美国产| 另类精品久久| 赤兔流量卡办理| 中文字幕人妻丝袜制服| 视频区图区小说| 人人妻人人添人人爽欧美一区卜| 精品少妇一区二区三区视频日本电影| 男女无遮挡免费网站观看| 亚洲中文av在线| 欧美人与性动交α欧美精品济南到| 两个人看的免费小视频| 亚洲午夜精品一区,二区,三区| 亚洲精品一区蜜桃| 视频区欧美日本亚洲| 国产精品一国产av| 伦理电影免费视频| 男人爽女人下面视频在线观看| 国产亚洲精品第一综合不卡| 精品人妻熟女毛片av久久网站| 麻豆av在线久日| 色综合欧美亚洲国产小说| 国语对白做爰xxxⅹ性视频网站| 18禁观看日本| 中文字幕人妻丝袜一区二区| 电影成人av| av网站在线播放免费| 欧美性长视频在线观看| 丁香六月天网| 午夜福利在线免费观看网站| 麻豆国产av国片精品| 午夜免费鲁丝| 精品国产超薄肉色丝袜足j| 国产欧美日韩一区二区三 | 国产深夜福利视频在线观看| 五月开心婷婷网| 日韩伦理黄色片| 久久精品久久精品一区二区三区| 久久精品久久久久久久性| 少妇被粗大的猛进出69影院| 亚洲一码二码三码区别大吗| 精品久久蜜臀av无| 我要看黄色一级片免费的| 午夜免费成人在线视频| 女性生殖器流出的白浆| 别揉我奶头~嗯~啊~动态视频 | 国产男女内射视频| 欧美国产精品va在线观看不卡| www.自偷自拍.com| 日韩熟女老妇一区二区性免费视频| 大香蕉久久成人网| 精品久久蜜臀av无| 99国产精品一区二区三区| 精品亚洲乱码少妇综合久久| 大香蕉久久网| 欧美日韩一级在线毛片| 日本av手机在线免费观看| 超碰97精品在线观看| 国产成人一区二区在线| 视频在线观看一区二区三区| 男女高潮啪啪啪动态图| 欧美精品亚洲一区二区| 久久精品熟女亚洲av麻豆精品| 最近最新中文字幕大全免费视频 | 亚洲 国产 在线| 岛国毛片在线播放| 精品熟女少妇八av免费久了| 我的亚洲天堂| 晚上一个人看的免费电影| 黄色视频不卡| 最黄视频免费看| 在线观看免费高清a一片| www.自偷自拍.com| 免费高清在线观看日韩| 99热网站在线观看| 婷婷色综合www| 欧美在线黄色| 伊人亚洲综合成人网| 多毛熟女@视频| 一边摸一边做爽爽视频免费| 久久精品熟女亚洲av麻豆精品| 国产成人精品久久久久久| av又黄又爽大尺度在线免费看| 女性被躁到高潮视频| 久久精品熟女亚洲av麻豆精品| 一级片免费观看大全| www.熟女人妻精品国产| 亚洲av综合色区一区| 日本黄色日本黄色录像| 国产色视频综合| 9色porny在线观看| 韩国高清视频一区二区三区| 久久久久精品人妻al黑| 视频区图区小说| 一本综合久久免费| 亚洲第一av免费看| av网站免费在线观看视频| 激情五月婷婷亚洲| 亚洲中文字幕日韩| 亚洲,欧美,日韩| 十八禁人妻一区二区| 9色porny在线观看| 飞空精品影院首页| 亚洲av日韩精品久久久久久密 | 老司机靠b影院| 久久毛片免费看一区二区三区| 久久精品亚洲av国产电影网| 久久 成人 亚洲| 国产亚洲精品第一综合不卡| 国产免费福利视频在线观看| 亚洲国产中文字幕在线视频| 亚洲五月色婷婷综合| 亚洲av美国av| 欧美日韩一级在线毛片| 亚洲成人手机| 欧美精品高潮呻吟av久久| 精品免费久久久久久久清纯 | 国产成人91sexporn| 欧美人与性动交α欧美软件| 男女无遮挡免费网站观看| 1024视频免费在线观看| 亚洲国产精品一区三区| 久久久久久久国产电影| 99国产综合亚洲精品| 大码成人一级视频| 亚洲精品一卡2卡三卡4卡5卡 | 欧美日韩精品网址| 日韩精品免费视频一区二区三区| 老汉色av国产亚洲站长工具| 国产极品粉嫩免费观看在线| 男女国产视频网站| 狂野欧美激情性bbbbbb| 成年人免费黄色播放视频| 老司机午夜十八禁免费视频| 超碰成人久久| 国产欧美日韩一区二区三 | 午夜免费观看性视频| 一区二区三区精品91| 国产成人精品久久二区二区免费| tube8黄色片| 婷婷色麻豆天堂久久| 高清不卡的av网站| 晚上一个人看的免费电影| 国产av精品麻豆| svipshipincom国产片| 国产日韩欧美视频二区| 国产精品一区二区在线观看99| 777米奇影视久久| 欧美日韩黄片免| 叶爱在线成人免费视频播放| 国产激情久久老熟女| 婷婷成人精品国产| 欧美激情高清一区二区三区| 国产精品免费大片| 欧美亚洲日本最大视频资源| 99国产综合亚洲精品| 伦理电影免费视频| 亚洲国产成人一精品久久久| 天天操日日干夜夜撸| 国产高清国产精品国产三级| 晚上一个人看的免费电影| 国产亚洲精品久久久久5区| 久久久久精品国产欧美久久久 | 制服人妻中文乱码| 麻豆乱淫一区二区| 波野结衣二区三区在线| 多毛熟女@视频| 天天躁夜夜躁狠狠躁躁| 久久精品国产亚洲av高清一级| 久久热在线av| 午夜免费成人在线视频| 亚洲激情五月婷婷啪啪| 亚洲中文日韩欧美视频| avwww免费| 亚洲人成电影免费在线| 国产欧美日韩精品亚洲av| 男女床上黄色一级片免费看| 亚洲成国产人片在线观看| 狂野欧美激情性bbbbbb| 国产免费现黄频在线看| 日韩av免费高清视频| 亚洲欧美激情在线| 久久人妻福利社区极品人妻图片 | 波多野结衣av一区二区av| 丝袜人妻中文字幕| 王馨瑶露胸无遮挡在线观看| 久久天堂一区二区三区四区| 久久精品久久久久久噜噜老黄| 久热爱精品视频在线9| 日韩视频在线欧美| 18禁裸乳无遮挡动漫免费视频| 成年av动漫网址| 99香蕉大伊视频| 亚洲国产欧美日韩在线播放| 十八禁人妻一区二区| 国产成人免费无遮挡视频| 蜜桃在线观看..| 中文精品一卡2卡3卡4更新| 国产黄色视频一区二区在线观看| 午夜福利免费观看在线| 国产成人啪精品午夜网站| 天天躁夜夜躁狠狠躁躁| 欧美精品人与动牲交sv欧美| 男男h啪啪无遮挡| 国产午夜精品一二区理论片| 亚洲av男天堂| 性色av一级| 99国产精品一区二区蜜桃av | 亚洲精品久久久久久婷婷小说| 99久久99久久久精品蜜桃| 国产91精品成人一区二区三区 | 国产精品久久久久久精品古装| 久久精品国产亚洲av高清一级| 青青草视频在线视频观看| 国产又爽黄色视频| 中文字幕人妻熟女乱码| 九色亚洲精品在线播放| 久久精品人人爽人人爽视色| 夫妻午夜视频| 国产在线一区二区三区精| 国产黄频视频在线观看| 我要看黄色一级片免费的| 人妻一区二区av| 精品久久蜜臀av无| 亚洲专区中文字幕在线| 五月天丁香电影| 欧美人与善性xxx| 多毛熟女@视频| av在线app专区| 如日韩欧美国产精品一区二区三区| 高清欧美精品videossex| 成年人免费黄色播放视频| 国产精品 欧美亚洲| 精品人妻一区二区三区麻豆| 国产黄频视频在线观看| 久久久久网色| 精品久久久久久久毛片微露脸 | 男女之事视频高清在线观看 | 丰满饥渴人妻一区二区三| 国产福利在线免费观看视频| 少妇猛男粗大的猛烈进出视频| 1024香蕉在线观看| 精品欧美一区二区三区在线| 黑人巨大精品欧美一区二区蜜桃| 久久精品亚洲av国产电影网| 国产精品99久久99久久久不卡| 性色av乱码一区二区三区2| 啦啦啦中文免费视频观看日本| 午夜福利一区二区在线看| 首页视频小说图片口味搜索 | 亚洲五月婷婷丁香| 色婷婷久久久亚洲欧美| 久久久国产精品麻豆| xxxhd国产人妻xxx| 国产成人系列免费观看| bbb黄色大片| 亚洲国产欧美日韩在线播放| 1024视频免费在线观看| 丰满少妇做爰视频| 一二三四社区在线视频社区8| 夫妻午夜视频| 久久久久久人人人人人| 性色av乱码一区二区三区2| 啦啦啦视频在线资源免费观看| 久久天堂一区二区三区四区| 国产成人啪精品午夜网站| 欧美精品高潮呻吟av久久| 精品国产一区二区久久| 老汉色∧v一级毛片| 亚洲精品日韩在线中文字幕| 国产在视频线精品| 天天添夜夜摸| 国产免费视频播放在线视频| 久久精品aⅴ一区二区三区四区| xxx大片免费视频| 亚洲图色成人| 国产一区二区三区av在线| 亚洲欧美日韩另类电影网站| 天天操日日干夜夜撸| 超碰成人久久| 久久人妻熟女aⅴ| 丰满少妇做爰视频| 19禁男女啪啪无遮挡网站| 人人妻人人添人人爽欧美一区卜| a级片在线免费高清观看视频| 国产男女内射视频| 免费黄频网站在线观看国产| 99热网站在线观看| 亚洲国产精品国产精品| 国产极品粉嫩免费观看在线| 婷婷成人精品国产| 超色免费av| 日韩一区二区三区影片| 欧美精品人与动牲交sv欧美| 在线 av 中文字幕| 久久人妻熟女aⅴ| 91九色精品人成在线观看| 丝袜美腿诱惑在线| 国产免费一区二区三区四区乱码| 19禁男女啪啪无遮挡网站| 亚洲 欧美一区二区三区| 亚洲精品美女久久av网站| 午夜免费鲁丝| 精品少妇黑人巨大在线播放| 精品第一国产精品| 午夜免费男女啪啪视频观看| 男女国产视频网站| 国产又色又爽无遮挡免| 欧美另类一区| 成人午夜精彩视频在线观看| 久久久精品94久久精品| 人妻 亚洲 视频| 啦啦啦在线观看免费高清www| 天天躁狠狠躁夜夜躁狠狠躁| 在线av久久热| 午夜福利视频在线观看免费| 爱豆传媒免费全集在线观看| tube8黄色片| 国产精品人妻久久久影院| 国产又爽黄色视频| 一级片'在线观看视频| 欧美97在线视频| 国产精品欧美亚洲77777| 成人午夜精彩视频在线观看| 欧美国产精品一级二级三级| 赤兔流量卡办理| 黄片播放在线免费| 十八禁网站网址无遮挡| 亚洲精品av麻豆狂野| 久久久国产精品麻豆| 王馨瑶露胸无遮挡在线观看| 人体艺术视频欧美日本| 亚洲欧美清纯卡通| 日本a在线网址| 国产精品久久久久久精品电影小说|