Skip to main content
Erschienen in:
Buchtitelbild

Open Access 2024 | OriginalPaper | Buchkapitel

Adaptive Security in 6G for Sustainable Healthcare

verfasst von : Ijaz Ahmad, Ijaz Ahmad, Erkki Harjula

Erschienen in: Digital Health and Wireless Solutions

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

6G will fulfill the requirements of future digital healthcare systems through emerging decentralized computing and secure communications technologies. Digital healthcare solutions employ numerous low-power and resource-constrained connected things, such as the Internet of Medical Things (IoMT). However, the current digital healthcare solutions will face two major challenges. First, the proposed solutions are based on the traditional IoT-Cloud model that will experience latency and reliability challenges to meet the expectations and requirements of digital healthcare, while potentially inflicting heavy network load. Second, the existing digital healthcare solutions will face security challenges due to the inherent limitations of IoMT caused by the lack of resources for proper security in those devices. Therefore, in this research, we present a decentralized adaptive security architecture for the successful deployment of digital healthcare. The proposed architecture leverages the edge-cloud continuum to meet the performance, efficiency, and reliability requirements. It can adapt the security solution at run-time to meet the limited capacity of IoMT devices without compromising the security of critical data. Finally, the research outlines comprehensive methodologies for validating the proposed security architecture.

1 Introduction

6G is the next-generation wireless communication technology with promising unprecedented speed and low latency [1]. In addition to evolutionary improvements in performance to its predecessors, 6G will also include novel innovations such as convergence of computing, communication, and sensing [24]. It also supports better integration with AI/ML by enabling the extension of edge computing to the local level (further closer to UEs), and traditional mobile operator and customer organizations’ communication infrastructures. It also facilitates the use of renewable energy sources, within and outside the network infrastructure, as well as it is envisaged to support quantum computing/communication requirements. IMT-2030 recommendations [1] comprise of novel capabilities such as artificial intelligence (AI) and sensing, ubiquitous connectivity, and integrated sensing which were not described in IMT-2020 (5G).
Digital healthcare applications, including decentralized clinical trials, mobile imaging, computer-assisted surgery, emergency response, and telemedicine, among many others, have considerable low-latency and stringent privacy requirements governed by regulatory authorities. In a digital healthcare solution, numerous connected things (IoMT) help in monitoring, processing, storing, and transmitting the patient’s data. There is a need to protect the patient’s data from potential exposure in full compliance with stricter regulatory and legislative requirements for privacy and security [23]. Conventional IoT-cloud setup faces the challenges of latency and exposure of sensitive data to a wider audience consisting of potentially hostile nodes.
The potential to process data at the network edge near the data source enables lower communication costs, reduced latency, enhanced efficiency, and increased system capacity for compute-intensive healthcare applications. In general, IoMT devices deployed in healthcare scenarios are resource-constrained and unable to sustain conventional heavyweight security solutions. Hence, there is a need to provide a context-aware and resource-efficient adaptable security architecture protecting sensitive information in dynamic network conditions, available resources, and evolving threat landscape. In this research, we propose an adaptive security architecture that leverages the potential emerging technologies such as distributed ledger technologies, zero-trust [9] security, differential privacy, and federated learning in a resource-constrained environment.
The rest of the paper is organized as follows: Sect. 2 describes the background and related work, and Sect. 3 presents our position statement. Section 4 provides robust evidence and reasoning to support our position and ensures our arguments are grounded in fact and logic. Section 5 comprises counterarguments and rebuttals, addressing the opposing perspectives hands-on, and Sect. 6 reflects on the discussions presented in the article.

2.1 Healthcare in 6G

The advancement of wireless communication networks has had a profound effect on the healthcare industry. The shift from 4G to 5G initiated a new era in digital healthcare [7], facilitating the emergence of the Intelligent Internet of Healthcare Things (IIoHT) or Internet of Medical Things (IoMT). This technology transition has created new possibilities in the healthcare sector, enhancing the efficiency, resilience, sustainability, affordability, and widespread availability of services. The expected shift to 6G is poised to profoundly transform healthcare [2, 7]. 6G will be a comprehensive system that will combine sensors, mobile communications, and processing capacity to effectively link virtual and actual environments. In healthcare scenarios, this implies that, e.g., the vital signs of patients may be detected, analyzed, and transferred immediately over the 6G network. 6G is anticipated to enable physicians and nurses to collaborate in new ways by using advanced network features, such as augmented reality (AR) apps or telemedicine.

2.2 Security Challenges in IoMT

The start of the 21st century witnessed a broad shift of enterprises from local data centers to cloud infrastructure considering its flexibility and scalability, resulting in the expansion of the IoT ecosystem [14]. Lack of standardized protocols, limited security controls, and a focus on functionality over security has led to a wide range of vulnerabilities exploited in critical infamous security incidents notably Marai botnet [16], Stuxnet (2010), and Vastaamo health data breach [15]. Moreover, the use of 6G technology in the healthcare sector poses security and privacy concerns, particularly due to the sensitive nature of health data [23]. Furthermore, hostile attackers could compromise implantable medical devices (IMDs) [26] such as diabetic insulin pumps, internal heart defibrillators, and pacemakers, causing not only economic losses but endangering human lives. It is essential to tackle these challenges to effectively integrate healthcare based on 6G technology. Notwithstanding these barriers, the potential advantages of 6G in healthcare are vast, and it is anticipated that the technology will enable healthcare to be heavily reliant on AI and 6G communication technology.

2.3 Adaptive Security

Adaptive security indicates that security solutions may be adjusted on the fly to accommodate changing network conditions and evolving threats. Adaptive security helps protect healthcare services and data by encompassing mechanisms for prediction, detection, mitigation, and prevention of threats to privacy and security [20]. Existing approaches such as risk-based [8], Game-based [12], Requirements-driven [22], and event-driven [6] adaptive security models will be evaluated for edge-cloud continuum considering their applicability and adaptability.

2.4 Resource Efficient Healthcare Solutions in 6G

Sustainability is set as one of the new capabilities for IMT-2030 and security, privacy, and resilience as enhanced capabilities over the existing 5G (IMT-2020) [1]. Enhanced mMTC and uRLLC from 5G will pave the way for ubiquitous connectivity as an emerging use case in 6G that will call for robust and sustainable [11] security, privacy, and trust measures [24]. Conventional security measures and strategies use pre-set, manual methods to reduce risks and keep things safe in certain situations [5] at the cost of additional energy consumption resulting in larger energy footprints. The proposed adaptive security architecture will consider the available resources especially remaining energy while providing security in a healthcare scenario.

3 Position Statement

The development of the 6G and edge-cloud continuum will extend the widespread adoption of IoT in many delay-sensitive scenarios in healthcare [3]. Conventional stringent security mechanisms are resource-intensive and not flexible across the edge-cloud continuum. Hence, there is a need for context-aware adaptive security architecture considering the remaining energy, network dynamics, and evolving threat landscape. Adaptive security is a promising approach to address the rising security challenges by distributing security capabilities across the network, from local edge to MEC and ultimately to the cloud as illustrated in Fig. 1. The IoMT devices and the underlying network are monitored for security breaches from MEC (tier-2) in addition to computing delay-sensitive tasks that are too heavy for processing at the local edge. Local edge (tier-1) hosts lightweight cryptographic solutions with strict latency requirements, while delay-tolerant and computationally demanding security tasks are assigned to the cloud layer (tier-3). This enables adapting the security measures to the changing network conditions and the healthcare use-case requirements at run-time with no human intervention.

4 Evidence and Reasoning

4.1 Performance and Efficiency

In many digital healthcare scenarios, the key requirements include the ability to communicate in real-time with no observable latency. One such example is emergency patient monitoring to communicate the patient’s vitals from the incident site to the hospital. In such scenarios, secure communication is among the key features, in addition to performance and reliability. Adaptive security ensures that the communication is protected from potential disclosure while considering the available resources such as energy, processing, and network conditions. As illustrated in Fig. 2, the capacity of computational resources and energy reduces while moving from Tier-3 (cloud) towards Tier-1 (local edge). Fortunately, the exposure to security threats (from potential hostile/malicious nodes) reduces in line with the available computational and energy resources. From a perspective of security and privacy, the computations performed in close proximity are preferred, whenever feasible, as the data do not need to be transmitted over the air for a longer distance and these are therefore less exposed to attackers.

4.2 Heterogeneity and Diversity

Heterogeneity refers to the variety and diversity of standards and technology included in medical devices. 6G networks are anticipated to facilitate a substantial volume of interconnected devices and transfer data of high intensity [17, 21]. It is essential to tackle the diversity and range of IoMT devices to guarantee the security of 6G-enabled healthcare services and data. Traditional security solutions are inadequate in a diverse IoMT environment with a dynamic and evolving technological and threat landscape. The envisioned heterogeneity feature of future 6G networks increases the attack surface and may result in complex security challenges [25].

4.3 Technological Advancements

The IMT-2030 recommendations [1] have identified distributed ledger technologies (DLT such as blockchain), differential privacy, and federated learning as potential security technologies for achieving security and resilience in future 6G networks. Utilizing the potential of blockchain technology for authentication and securing healthcare data in a distributed manner with no or reduced reliance on centralized servers will improve the efficiency of the network. Similarly, with the breakthrough of Artificial Intelligence and Machine Learning based solutions can be developed for detecting and responding to threats efficiently in real-time.

4.4 Lightweight Cryptography

Security specialists at the National Institute of Standards and Technology (NIST) have declared a champion in their quest to identify a robust defender for data produced by resource-constrained devices. The triumphant contender, a set of cryptographic algorithms known as ASCON [10], has been recognized as NIST’s standard for lightweight cryptography since February 2023. This helps in providing sustainable and affordable security in IoT-based resource-constrained devices whereby conventional heavyweight security solutions are considered as barriers to performance and survival.

4.5 Limited Exposure to Malicious Agents

By employing effective and adaptive security solutions across the edge-to-cloud continuum ensures the protection of sensitive data closer to the origin and thus reduces the geographical area of exposure to potential malicious agents. The widespread popularity and adoption of IoMT devices are continuously contributing to novel security threats and their complexities are increasing over time. The vulnerabilities in communication networks can be broken down into the core technologies and potential solutions can be looked into to achieve overall security [4]. Adaptive security ensures timely protection of data in a resource-constrained IoMT environment.

5 Counterarguments and Rebuttals

5.1 Complexity and Cost

Implementing adaptive security in 6G for sustainable healthcare could increase complexity and cost. Adaptive security is the ability to adapt to threats in real time and can potentially save costs associated with data breaches and system downtime. Recent research indicates that the long-term advantages of incorporating adaptive security in healthcare offered by 6G technology surpass these early obstacles of increased complexity and cost. The traditional approach of using a single security strategy is no longer suitable for 6G networks [24]. This is because there is a greater variation in device capabilities, energy conditions, service features, threats and vulnerabilities, and other attributes that change over time. Therefore, the selection and configuration of security strategies for 6G networks should be optimized flexibly and responsively. By using this adaptable strategy, it is possible to optimize resource use, which may result in a decrease in overall expenses over time.

5.2 Technology Maturity

6G technology is still in its infancy and it is too early to discuss its security aspects. IMT-2030 recommendation [1] describes 6G to be secure by design with the ability to continue operating in the presence of malicious agents and be able to recover from disruptive events. Recent research [19] suggests that the discussion and preparation for security concerns of 6G technology should begin without delay, even before the technology reaches full maturity. Instead, security issues should be included in the development process from the beginning. Implementing this strategy may facilitate the early detection and resolution of possible security vulnerabilities, resulting in the development of more resilient and secure 6G networks.

5.3 Privacy Concerns

Patient privacy is impacted by the increased connectivity and data sharing in 6G-enabled healthcare. 6G technology promises to make healthcare more efficient, robust, sustainable, and ubiquitous, yet increased communication raises patient privacy concerns [7, 13]. Security and privacy concerns for 6G are being actively considered from the very beginning, with the identification of particular security requirements, highlighting of security challenges, and identification of gaps for future research. Moreover, emerging technologies such as DLTs and differential privacy are being explored as effective methods to significantly reduce the scale of attacks and personal data breaches [18]. Although privacy issues are present, the emphasis on adaptive security in 6G for sustainable healthcare is robust, guaranteeing the protection of patient data and the preservation of privacy.

6 Conclusion

The emergence of 6G technology has the potential to transform the healthcare industry. Nevertheless, the increased connectivity and data sharing that comes with 6G also present significant challenges in terms of security and privacy. This article has advocated for the indispensability of an adaptive security architecture in foreseeing the long-term viability of healthcare systems enabled by 6G technology. An architecture of this kind would not alone safeguard sensitive healthcare data but also guarantee the resilience and reliability of healthcare services in the presence of possible cyber hazards. Adaptive security can contribute to enhancing overall resource efficiency by deploying lightweight security solutions upon assessing the network dynamics and security requirements. We anticipate that this discussion will stimulate more investigation and advancement in this crucial field, facilitating the establishment of a secure and sustainable healthcare ecosystem supported by 6G technology. We plan to comprehensively analyze the results and evaluate the performance of the proposed architecture concerning energy and computation efficiency while dynamically responding to security and privacy threats considering the changing network conditions.

Acknowledgements

This research is supported by the Business Finland projects Tomohead (grant 8095/31/2022), Eware-6G (grant 8819/31/2022), Sunset-6G (grant 8682/31/2022), and the Research Council of Finland 6G Flagship program (grant number 346208).
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://​creativecommons.​org/​licenses/​by/​4.​0/​), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Literatur
3.
6.
Zurück zum Zitat Aman, W., Snekkenes, E.: Event driven adaptive security in Internet of Things. In: Proceedings of the Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2014), Rome, vol. 2428, pp. 7–15 (2014) Aman, W., Snekkenes, E.: Event driven adaptive security in Internet of Things. In: Proceedings of the Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2014), Rome, vol. 2428, pp. 7–15 (2014)
13.
Zurück zum Zitat Kamal, M., Rashid, I., Iqbal, W., Siddiqui, M.H., Khan, S., Ahmad, I.: Privacy and security federated reference architecture for internet of things. Front. Inf. Technol. Electron. Eng. 24(4), 481–508 (2023)CrossRef Kamal, M., Rashid, I., Iqbal, W., Siddiqui, M.H., Khan, S., Ahmad, I.: Privacy and security federated reference architecture for internet of things. Front. Inf. Technol. Electron. Eng. 24(4), 481–508 (2023)CrossRef
15.
Zurück zum Zitat Lindroos-Hovinheimo, S.: Serious cyberattack raises questions about QDPR application in Finland. Verfassungsblog (2020) Lindroos-Hovinheimo, S.: Serious cyberattack raises questions about QDPR application in Finland. Verfassungsblog (2020)
20.
Zurück zum Zitat Porambage, P., Liyanage, M.: Security and Privacy Vision in 6G: A Comprehensive Guide. Wiley, New York (2023) Porambage, P., Liyanage, M.: Security and Privacy Vision in 6G: A Comprehensive Guide. Wiley, New York (2023)
22.
Zurück zum Zitat Salehie, M., Pasquale, L., Omoronyia, I., Ali, R., Nuseibeh, B.: Requirements-driven adaptive security: protecting variable assets at runtime. In: 2012 20th IEEE International Requirements Engineering Conference (RE), pp. 111–120 (2012). https://doi.org/10.1109/RE.2012.6345794 Salehie, M., Pasquale, L., Omoronyia, I., Ali, R., Nuseibeh, B.: Requirements-driven adaptive security: protecting variable assets at runtime. In: 2012 20th IEEE International Requirements Engineering Conference (RE), pp. 111–120 (2012). https://​doi.​org/​10.​1109/​RE.​2012.​6345794
25.
Zurück zum Zitat Ylianttila, M.: 6G white paper: research challenges for trust, security and privacy (2020) Ylianttila, M.: 6G white paper: research challenges for trust, security and privacy (2020)
Metadaten
Titel
Adaptive Security in 6G for Sustainable Healthcare
verfasst von
Ijaz Ahmad
Ijaz Ahmad
Erkki Harjula
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-59080-1_3

Premium Partner