This report aims to discuss the security challenges in the emerging networks. A literature review on the healthcare networks is provided in this report. A discussion regarding the architecture of network in healthcare is stated. The recent developments in the healthcare networks is discussed in this report. The importance of security in the networks of healthcare is provided. An analysis of three present or future potential issues in security in healthcare networks is discussed. A suitable solution for one of the three potential issues that can help in mitigating the issue is provided. Lastly, the report concludes with a suitable conclusion for this entire report.
The IOT (Internet of Things) creates smart objects as the major building blocks for the development of pervasive frameworks that are smart and cyber-physical. IoT affects the healthcare domain in a very significant way. Economical, social and technological prospects are redesigned in the modern healthcare with the help of IoT. IoT helps in redesigning several medical applications like remote monitoring of health, fitness plans, prolonged diseases, and care for the elderly [1].
The demand of Networking is increasing for the large hospitals and its subsidiaries to create a more stable and dependable network solutions. A complex digital hospital networking architecture can be measured as a digital neural network system. Several tasks in a hospital are accomplished in a clinic with the help of medical information system located in the middle ring, which is integrated to the exterior neural system in the middle ring. The most commonly uses networking devices in a healthcare networking architecture are switches, routers, firewalls and servers [2].
Servers: servers are used to setup databases for the data of patients, which can be used by clients for accessing or inserting data and monitor the developments in the information of the patients. Active directory setup is the first step involved in configuration of a server. Global distribution of the necessities of a management in a healthcare organisation is achieved with this configuration of server. The information structure confined in such system will match any structure and type of the organisation. Administrative authority allocation and central management system that is used for network governance is offered by an active directory and thus allowing access to all the resources stored in local domain. The fundamental component of a server is the database. The information stored in a healthcare database of the patients ranges from medical history, insurance plans and personal details [3].
Routers: Data packets are transmitted between the computer networks using a router. A router performs the function of directing traffic over the internet. Data is sent over the internet in the form of data packets and these packets are exchanged between the routers with the help of networks constituting an internetwork. Routers are connected between two or more lines of data from various networks. Healthcare organisations commonly use high-speed LAN connections for efficient communication among the various departments. Organisational routers are most effective in these kind of communications [4].
Switches: Switches study every packet in a signal and then process it rather than just repeating that signal to every ports. The Ethernet address of all nodes residing in each segment of network is mapped and then the traffic is allowed to pass through the switches. The mapping of a data packet is done by a switch by examining the source and destination hardware addresses and comparing them to the addresses and network segments table. Switches are used in the healthcare domain to create more possibilities in the sharing of data in the various nodes and lower the collision in the domains [5].
Firewalls: The first line of defense in a healthcare organisation is the firewall.. Firewalls follow a set of established rules and protocols for monitoring incoming and outgoing traffic. The secure network is blocked from the access of internet and enables the pass-through of pre-cleared data. Firewalls are adjusted for allowing remote access as required and it can be combined in the solutions of virtualisation or mobility. It plays an important role in HIPAA compliance as it creates the first defense line against unauthorised access and malicious attacks [6].
Smart healthcare and connected healthcare is a growing trend in the modern times with the developments of modernised wireless and mobile networking technologies. The modern networking technologies like mobile edge computing (MEC), 5G wireless networks, SDN (software-defined networking), and C-RANs (cloud radio access networks) can introduce smart healthcare facilities by providing better vision of varied healthcare media contents to keep up reasonable and high-quality care of patients.
SDN or Software-Defined Networking is a trending architecture, which is dynamic, adaptable, controllable, and cost-effective. These features of SDN makes it ideal for high-bandwidth and vibrant nature of modern applications [7]. This kind of architecture distributes the control of network and progressing functions. The architecture of SDN is:
C-RAN or Cloud Radio Access Network is an architecture that is based on cloud computing for networks of radio access that supports mobile and wireless communication values [8]. The architecture of C-RAN has the following features:
Network security refers to the protection from misuse, hacking, and access to the files and folders that are stored in a network system of a healthcare organisation. The most popular threats in a network are worms, viruses, spyware, and adware and theft of identity [8]. The several security layers are the most crucial aspect of network security. The attacks that are targeted in healthcare are theft of medical records, information of billing, authorisation credentials, authentication and password, and research information of clinics. Education of employee and response for incidents are important for protecting data of patients, but the healthcare organisations cannot depend on users to understand and aggressively avoid data breaches [9]. The data of patients will be on risk and the network can be vulnerable to attacks if there is a lack in upgrades of cyber-security. Healthcare organisations implement digital transformation to examine the security budgets as huge amount of tools are implemented to IT infrastructure. Patch management, configuration management, data encryption, and security of website are some of the cyber-security vulnerabilities that are faced by the organisation with outdated network infrastructure [10]. Organisations need to upgrade the digital tools for moving forward with medical research and care initiatives that are value-based.
Conclusion
Thus, it can be concluded recent development in the field of Information Technology has affected the healthcare domain and several healthcare organisations are progressing towards upgrading the networks. The commonly used network devices in healthcare network architecture are routers, firewalls, switches, and servers. Some of the recent development in the healthcare networks are SDN (Software defined network), 5g wireless network, and C-RAN (cloud radio access network). Some of the potential security issues in the network of the healthcare organisations are threat the cloud storage, breach of firewall, and ransomware attacks on the network.
References
[1] Bhatt, Y. and Bhatt, C., Internet of things in healthcare. In Internet of things and big data technologies for next generation HealthCare (pp. 13-33). Springer, Cham, 2017.
[2] Catarinucci, L., De Donno, D., Mainetti, L., Palano, L., Patrono, L., Stefanizzi, M.L. and Tarricone, L., An IoT-aware architecture for smart healthcare systems. IEEE Internet of Things Journal, 2(6), pp.515-526, 2015.
[3] Zhang, K., Yang, K., Liang, X., Su, Z., Shen, X. and Luo, H.H., Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wireless Communications, 22(4), pp.104-112, 2015.
[4] Charani, E., Castro-Sánchez, E., Moore, L.S. and Holmes, A., Do smartphone applications in healthcare require a governance and legal framework? It depends on the application!. BMC medicine, 12(1), p.29, 2014.
[5] Natoli, J.D., Kermanshahche, K.M., Painter, J. and Boucher, A., Intel Corp, Healthcare semantic interoperability platform. U.S. Patent 8,850,057, 2014.
[6] Agyapong, P.K., Iwamura, M., Staehle, D., Kiess, W. and Benjebbour, A., Design considerations for a 5G network architecture. IEEE Communications Magazine, 52(11), pp.65-75, 2014.
[7] Jo, M., Maksymyuk, T., Strykhalyuk, B. and Cho, C.H., Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing. IEEE Wireless Communications, 22(3), pp.50-58, 2015.
[8] Cai, W. and Shi, F., High performance SOI RF switch for healthcare application. Int. J. of Enhanced Research in Sci., Tech. & Eng, 5(10), 2016.
[9] Khan, F.A., Ali, A., Abbas, H. and Haldar, N.A.H., A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks. Procedia Computer Science, 34, pp.511-517, 2014.
[10] Salehi, S.A., Razzaque, M.A., Naraei, P. and Farrokhtala, A., July. Security in wireless sensor networks: Issues and challanges. In Space Science and Communication (IconSpace), 2013 IEEE International Conference on (pp. 356-360). IEEE, 2013.
[11] Patil, H.K. and Seshadri, R., June. Big data security and privacy issues in healthcare. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 762-765). IEEE, 2014.
[12] Kim, J.T., Privacy and security issues for healthcare system with embedded RFID system on Internet of Things. Advanced Science and Technology Letters, 72, pp.109-112, 2014.
[13] Kumar, J.S. and Patel, D.R., A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11), 2014.
[14] Abbas, A. and Khan, S.U., E-Health cloud: privacy concerns and mitigation strategies. In Medical Data Privacy Handbook (pp. 389-421). Springer, Cham, 2015.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download