{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:57:54Z","timestamp":1776445074090,"version":"3.51.2"},"reference-count":89,"publisher":"Wiley","issue":"7","license":[{"start":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T00:00:00Z","timestamp":1750723200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100011234","name":"State Key Laboratory of Automotive Simulation and Control","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011234","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2025,7]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>The integration of the Internet of Things (IoT) into consumer devices has driven the evolution of the Industrial Internet of Things (IIoT), also known as Industry 4.0 (I4.0), extending connectivity to industrial settings where benefits such as increased efficiency, automation, and predictive maintenance are transforming processes. However, with these advancements comes a host of cybersecurity challenges unique to IIoT, including the longevity of industrial components and the expansive scale of interconnected networks, which differ from security needs in Consumer IoT (C\u2010IoT). In parallel, the healthcare sector has seen similar technological integration through the Healthcare Internet of Things (H\u2010IoT) and the progression to Healthcare 4.0 (HC4.0), emphasizing data\u2010driven patient care and seamless digital health services. This paper presents a comprehensive and systematic review of emerging cybersecurity technologies in healthcare, focusing on IoT, IIoT, H\u2010IoT, and HC4.0 applications. Our study examines recent advancements in cybersecurity protocols and identifies critical security challenges that arise from the increased reliance on these technologies. Specifically, we aim to highlight how these interconnected frameworks can enhance patient data protection, ensure resilience against cyber threats, and strengthen healthcare systems' operational integrity. Key areas of focus include data privacy, network vulnerabilities, and the risks of cyber\u2010attacks in healthcare contexts, with an emphasis on the necessity of robust and adaptive security measures to safeguard sensitive healthcare information. Furthermore, this survey synthesizes current research on security frameworks and protocols tailored to HC4.0 applications, offering an in\u2010depth analysis of their strengths, limitations, and applicability in real\u2010world scenarios. We identify gaps in the literature and propose future research directions aimed at advancing encryption, authentication, and network resilience in interconnected healthcare systems. The concluding sections address ongoing challenges, open issues, and the need for scalable and interoperable security solutions to support the seamless integration of IoT technologies across healthcare and industrial sectors. By providing a holistic overview of the cybersecurity landscape in IoT, IIoT, and H\u2010IoT, this paper contributes valuable insights to the development of secure, resilient, and sustainable systems in an increasingly connected world.<\/jats:p>","DOI":"10.1002\/ett.70183","type":"journal-article","created":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T20:01:27Z","timestamp":1750795287000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Systematic Review of New Technologies for Cybersecurity Healthcare Applications: A Systematic and Comprehensive Study"],"prefix":"10.1002","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1917-8251","authenticated-orcid":false,"given":"Fatma","family":"Khallaf","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering Faculty of Engineering, Ahram Canadian University  Giza Egypt"},{"name":"Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering, Menoufia University  Menouf Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-2120","authenticated-orcid":false,"given":"Walid","family":"El\u2010Shafai","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering, Menoufia University  Menouf Egypt"},{"name":"Automated Systems and Computing Lab (ASCL), Computer Science Department, Prince Sultan University  Riyadh Saudi Arabia"}]},{"given":"El\u2010Sayed M.","family":"El\u2010Rabaie","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering, Menoufia University  Menouf Egypt"}]},{"given":"Fathi E.","family":"Abd El\u2010Samie","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering, Menoufia University  Menouf Egypt"}]}],"member":"311","published-online":{"date-parts":[[2025,6,24]]},"reference":[{"key":"e_1_2_15_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3066427"},{"key":"e_1_2_15_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.006"},{"key":"e_1_2_15_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3047960"},{"key":"e_1_2_15_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004790"},{"key":"e_1_2_15_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"e_1_2_15_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3059858"},{"key":"e_1_2_15_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-10164-8"},{"key":"e_1_2_15_9_1","first-page":"195","volume-title":"Internet of Things in the Healthcare Applications: Overview of Security and Privacy Issues","author":"Othman S. B.","year":"2022"},{"key":"e_1_2_15_10_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/6632599","article-title":"IoT\u2010Based Applications in Healthcare Devices","volume":"2021","author":"Pradhan B.","year":"2021","journal-title":"Journal of Healthcare Engineering"},{"key":"e_1_2_15_11_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7608296"},{"key":"e_1_2_15_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8070768"},{"key":"e_1_2_15_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81473-1_1"},{"key":"e_1_2_15_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"e_1_2_15_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2946359"},{"key":"e_1_2_15_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"e_1_2_15_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-018-0618-4"},{"key":"e_1_2_15_18_1","doi-asserted-by":"crossref","unstructured":"N. N.Thilakarathne M. K.Kagita andT. R.Gadekallu \u201cThe Role of the Internet of Things in Health Care: A Systematic and Comprehensive Study \u201d2020available at SSRN 3690815.","DOI":"10.2139\/ssrn.3690815"},{"key":"e_1_2_15_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2016.03.004"},{"key":"e_1_2_15_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2973314"},{"key":"e_1_2_15_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jobcr.2021.01.015"},{"key":"e_1_2_15_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18075-1_9"},{"key":"e_1_2_15_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2018.8653708"},{"issue":"6","key":"e_1_2_15_24_1","first-page":"383","article-title":"Security Issues in the Internet of Things (IoT): A Comprehensive Study","volume":"8","author":"Razzaq M. A.","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_2_15_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"e_1_2_15_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03302-w"},{"key":"e_1_2_15_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103164"},{"key":"e_1_2_15_28_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0268-2"},{"key":"e_1_2_15_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsir.2022.100257"},{"key":"e_1_2_15_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481"},{"key":"e_1_2_15_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24892-5_2"},{"key":"e_1_2_15_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24892-5_8"},{"key":"e_1_2_15_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24892-5_12"},{"key":"e_1_2_15_34_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3603739"},{"key":"e_1_2_15_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/su132111645"},{"issue":"5","key":"e_1_2_15_36_1","first-page":"1","article-title":"Cybersecurity Management for (Industrial) Internet of Things\u2013Challenges and Opportunities","volume":"8","author":"Lackner M.","year":"2018","journal-title":"Journal of Information Technology & Software Engineering"},{"key":"e_1_2_15_37_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7154587"},{"key":"e_1_2_15_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12330-7_2"},{"key":"e_1_2_15_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12330-7_13"},{"key":"e_1_2_15_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023507"},{"key":"e_1_2_15_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"e_1_2_15_42_1","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2021.015206"},{"key":"e_1_2_15_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3053595"},{"key":"e_1_2_15_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051414"},{"key":"e_1_2_15_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.11.016"},{"key":"e_1_2_15_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.62"},{"key":"e_1_2_15_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.11.017"},{"key":"e_1_2_15_48_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21227518"},{"key":"e_1_2_15_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.018"},{"key":"e_1_2_15_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116912"},{"key":"e_1_2_15_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-46197-3_1"},{"key":"e_1_2_15_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3197671"},{"issue":"3","key":"e_1_2_15_53_1","first-page":"171","article-title":"Health Care 4.0: A Vision for Smart and Connected Health Care","volume":"11","author":"Li J.","year":"2021","journal-title":"IISE Transactions on Healthcare Systems Engineering"},{"key":"e_1_2_15_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2018.2848518"},{"key":"e_1_2_15_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09932-3"},{"key":"e_1_2_15_56_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1350"},{"key":"e_1_2_15_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3156905"},{"key":"e_1_2_15_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3145813"},{"key":"e_1_2_15_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3312916"},{"key":"e_1_2_15_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3349538"},{"key":"e_1_2_15_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651863.3651877"},{"key":"e_1_2_15_62_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v15i18.25531"},{"key":"e_1_2_15_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4474"},{"key":"e_1_2_15_64_1","first-page":"215","volume-title":"Secure and Privacy\u2010Aware Intelligent Healthcare Systems: A Review. Intelligent Healthcare: Infrastructure, Algorithms and Management","author":"Vijay J. A.","year":"2022"},{"key":"e_1_2_15_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8150-9_11"},{"key":"e_1_2_15_66_1","first-page":"299","volume-title":"Internet of Medical Things (IoMT): Applications, Challenges, and Prospects in a Data\u2010Driven Technology. Intelligent Healthcare: Infrastructure, Algorithms and Management","author":"Ajagbe S. A.","year":"2022"},{"key":"e_1_2_15_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.008"},{"key":"e_1_2_15_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100123"},{"key":"e_1_2_15_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0029-7"},{"key":"e_1_2_15_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03570-x"},{"key":"e_1_2_15_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.11.017"},{"key":"e_1_2_15_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.077"},{"key":"e_1_2_15_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02597-5"},{"key":"e_1_2_15_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-06994-z"},{"key":"e_1_2_15_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03832-x"},{"key":"e_1_2_15_76_1","first-page":"2134","volume-title":"Encyclopedia of Data Science and Machine Learning","author":"Stojanovi\u0107 M. D.","year":"2023"},{"key":"e_1_2_15_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.153"},{"key":"e_1_2_15_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103097"},{"key":"e_1_2_15_79_1","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12917"},{"key":"e_1_2_15_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16479-3"},{"key":"e_1_2_15_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEM58740.2023.10319514"},{"key":"e_1_2_15_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1513-0"},{"key":"e_1_2_15_83_1","first-page":"1","article-title":"Blockchain\u2010Based Color Medical Image Cryptosystem for Industrial Internet of Healthcare Things (IoHT)","author":"Khallaf F.","year":"2024","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_2_15_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2020.100129"},{"key":"e_1_2_15_85_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9324035"},{"key":"e_1_2_15_86_1","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.037655"},{"key":"e_1_2_15_87_1","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.2200372"},{"key":"e_1_2_15_88_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JBHI.2024.3422180","article-title":"Multiview Deep Learning\u2010Based Efficient Medical Data Management for Survival Time Forecasting","author":"Yu K.","year":"2024","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"key":"e_1_2_15_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582556"},{"key":"e_1_2_15_90_1","doi-asserted-by":"publisher","DOI":"10.1080\/0951192X.2013.874595"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.70183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T23:13:02Z","timestamp":1752793982000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.70183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,24]]},"references-count":89,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["10.1002\/ett.70183"],"URL":"https:\/\/doi.org\/10.1002\/ett.70183","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,24]]},"assertion":[{"value":"2023-04-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70183"}}