CFP last date
22 September 2025
Call for Paper
October Edition
IJCA solicits high quality original research papers for the upcoming October edition of the journal. The last date of research paper submission is 22 September 2025

Submit your paper
Know more
Random Articles
Reseach Article

Cybersecurity in Robotic Healthcare Systems: A Critical Thematic Review of Challenges, Solutions, and Research Directions

by Hadi Dastan Elikhchi, Thaier Hamid
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 32
Year of Publication: 2025
Authors: Hadi Dastan Elikhchi, Thaier Hamid
10.5120/ijca2025925601

Hadi Dastan Elikhchi, Thaier Hamid . Cybersecurity in Robotic Healthcare Systems: A Critical Thematic Review of Challenges, Solutions, and Research Directions. International Journal of Computer Applications. 187, 32 ( Aug 2025), 65-70. DOI=10.5120/ijca2025925601

@article{ 10.5120/ijca2025925601,
author = { Hadi Dastan Elikhchi, Thaier Hamid },
title = { Cybersecurity in Robotic Healthcare Systems: A Critical Thematic Review of Challenges, Solutions, and Research Directions },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2025 },
volume = { 187 },
number = { 32 },
month = { Aug },
year = { 2025 },
issn = { 0975-8887 },
pages = { 65-70 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number32/cybersecurity-in-robotic-healthcare-systems-a-critical-thematic-review-of-challenges-solutions-and-research-directions/ },
doi = { 10.5120/ijca2025925601 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-08-20T21:35:27.424954+05:30
%A Hadi Dastan Elikhchi
%A Thaier Hamid
%T Cybersecurity in Robotic Healthcare Systems: A Critical Thematic Review of Challenges, Solutions, and Research Directions
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 32
%P 65-70
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, Robotic systems are increasingly deployed in the healthcare system to enable modern autonomous delivery, real-time diagnostics, and precision in surgery. However, these contemporary and intelligent machines, connected into complex systems which introduce new cybersecurity challenges that can impact operational availability, data integrity, also threaten patient safety. This review critically examines the recent robotic healthcare systems' current landscape of cybersecurity. By utilizing the CIA security model (Confidentiality, Integrity, Availability) and socio-technical systems theory. Therefore, we organize the literature into three thematic domains such as: behavioral anomaly detection using machine learning, access control, and secure communication. Each one of the domains is evaluated for its integration potential, limitations, real-world applicability, and theoretical foundations. This review reveals significant research gaps in deployment realism, regulatory alignment, and resilience. This study proposes a comprehensive research direction and agenda to lead future work toward layered and robust ethical cybersecurity frameworks for clinical robotic systems and environments.

References
  1. Sun, Y., et al. (2020). "TLS 1.3 Deployment in IoT." IEEE Internet of Things Journal.
  2. Ferraiolo, D., and Kuhn, D.R. (1992). "Role-Based Access Control." NIST.
  3. Khan, M., et al. (2019). "ML-Based Anomaly Detection in Cyber-Physical Systems." Computers & Security.
  4. Salim, R., et al. (2022). "GRU-Based IDS for ROS2." IEEE Transactions on Industrial Informatics.
  5. U.S. FDA. (2018). "Cybersecurity for Networked Medical Devices."
  6. European Union. (2016). "General Data Protection Regulation (GDPR)."
  7. Naylor, D., et al. (2019). "Performance of TLS 1.3 on Embedded Devices." SIGCOMM.
  8. Ahmed, M., et al. (2016). "Survey of Network Anomaly Detection." J. Network & Comp. Apps.
  9. Zhang, X., et al. (2020). "Fine-Grained Access Control in Healthcare Robotics." IEEE Access.
  10. Chen, T., et al. (2021). "Context-Aware RBAC Using IoT Sensors." J. Biomed. Informatics.
  11. Habibzadeh, H., et al. (2020). "IoT Security in Smart Healthcare Systems." Sensors.
  12. Kesarwani, A., et al. (2018). "Explainable AI for Healthcare." Nature Machine Intelligence.
  13. Rahman, F., et al. (2021). "Secure ROS2 Architecture." IEEE Embedded Systems Letters.
  14. Hossain, M., et al. (2018). "Privacy-Preserving Frameworks in Medical IoT." FGCS.
  15. Shafiq, M., et al. (2017). "Real-Time IDS with RNN for CPS." Information Sciences.
  16. Ristic, I. (2019). Bulletproof TLS and PKI. Feisty Duck.
  17. Boulton, M., & Krishnamachari, B. (2023). "Resilient Robotic Swarms." IEEE Transactions on Robotics.
  18. Casola, V., et al. (2021). "Cyber Threats in eHealth." IEEE Internet of Things Journal.
  19. Anderson, R. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems.
  20. McGraw, G. (2006). Software Security: Building Security In. Addison-Wesley.
  21. Lee, E.A., and Seshia, S.A. (2017). Introduction to Embedded Systems: A Cyber-Physical Systems Approach.
  22. Yang, G.Z., et al. (2018). "Medical Robotics: Current Status and Future Trends." IEEE EMBS Magazine.
  23. Wright, A., and Sittig, D. (2008). "Clinical Decision Support and Malpractice Risk." JAMA.
  24. Van der Aalst, W.M.P. (2011). Process Mining: Discovery, Conformance and Enhancement of Business Processes.
  25. ISO/IEC 27001. (2013). "Information Security Management Systems.
Index Terms

Computer Science
Information Sciences

Keywords

Healthcare Robotic Systems Role-Based Access Control Human-Centered Security Resilience Behavioral Anomaly Detection GRU TLS 1.3 Secure Communication.