| Literature DB >> 35211361 |
Haneya Naeem Qureshi1,2, Marvin Manalastas2, Syed Muhammad Asad Zaidi2, Ali Imran2, Mohamad Omar Al Kalaa1.
Abstract
5G and beyond networks will transform the healthcare sector by opening possibilities for novel use cases and applications. Service level agreements (SLAs) can enable 5G-enabled medical device use cases by documenting how a medical device communication requirements are met by the unique characteristics of 5G networks and the roles and responsibilities of the stakeholders involved in offering safe and effective 5G-enabled healthcare to patients. However, there are gaps in this space that should be addressed to facilitate the efficient implementation of 5G technology in healthcare. Current literature is scarce regarding SLAs for 5G and is absent regarding SLAs for 5G-enabled medical devices. This paper aims to bridge these gaps by identifying key challenges, providing insight, and describing open research questions related to SLAs in 5G and specifically 5G-healthcare systems. This is helpful to network service providers, users, and regulatory authorities in developing, managing, monitoring, and evaluating SLAs in 5G-enabled medical systems.Entities:
Keywords: 5G; 5G-enabled medical device; Service level agreements; healthcare
Year: 2021 PMID: 35211361 PMCID: PMC8864549 DOI: 10.1109/access.2020.3046927
Source DB: PubMed Journal: IEEE Access ISSN: 2169-3536 Impact factor: 3.367
FIGURE 1.Selected SLA definitions from [35], [38], [44]–[58]. This figure should be read as follows: an SLA is [SLA descriptors (blue)] between [parties providing services (green)] and [parties receiving services (yellow)] that consists of [SLA contents (orange)].
FIGURE 2.Types of service level agreements.
FIGURE 3.The concept of 5G bandwidth adaptation.
FIGURE 4.5G adaptive numerology and minislots.
FIGURE 5.Challenges of 5G SLAs categorized according to the development, monitoring, fulfillment, and assurance SLA parts.
Cybersecurity threats to the 5G ecosystem with the corresponding affected healthcare applications.
| Point of attack | 5G security threats and attacks type [ | Affected Healthcare Application | ||
|---|---|---|---|---|
| Medical IoT (e.g., wearables, implantable devices, on-site equipment, home-based medical devices) | Remote Medical Procedures (e.g., telesurgery, teleconsultation, ambulance drone, telemedicine, in-ambulance treatment) | Medical Data Management (e.g., confidential health records, personally identifiable information) | ||
| Internet/Other Operator | Security Policy Conflicts |
|
| |
| Internet | Pharming |
|
| |
| Trojan |
|
| ||
| Virus |
|
| ||
| 5G Central Cloud | Hijacking Attack |
|
| |
| Man-in-the-middle Attack |
|
| ||
| Configuration Attack |
|
| ||
| Saturation Attack |
|
| ||
| Signaling Attack |
|
| ||
| 5G Central Cloud/5G Edge Cloud | Slice/Resource Theft |
|
| |
| 5G Central Cloud/5G Edge Cloud/5G RAN | Distributed Denial of Service (DDoS) Attack |
|
|
|
| Denial of Service (DoS) Attack |
|
|
| |
| Penetration Attack |
|
|
| |
| 5G RAN | Reset and IP Spoofing |
|
| |
| Scanning Attack |
|
| ||
| Semantic Information Attack |
|
| ||
| Signaling Storms/Signal Jamming |
|
| ||
| International Mobile Subscriber Identity (IMSI) Catching Attack |
|
| ||
| Illegal Intercept |
|
| ||
| Flash Traffic |
|
| ||
| Fake Base Station Attack |
|
| ||
| End user | User Identity Theft |
| ||
| Security Key Theft |
| |||
| Advanced Malware |
| |||
| Firmware Hacks |
| |||
| Device Tampering |
| |||
| Spyware |
| |||
| IoT Botnets |
| |||
| Ransomware |
| |||
| Battery Draining Attack |
| |||
| Identification Attack |
| |||
| Privacy Breach |
| |||