Toward Uniform Smart Healthcare Ecosystems: A Survey on Prospects, Security, and Privacy Considerations

2019 ◽  
pp. 75-112
Author(s):  
Hadi Habibzadeh ◽  
Tolga Soyata
Author(s):  
Puspanjali Mallik

The internet of things (IoT) fulfils abundant demands of present society by facilitating the services of cutting-edge technology in terms of smart home, smart healthcare, smart city, smart vehicles, and many more, which enables present day objects in our environment to have network communication and the capability to exchange data. These wide range of applications are collected, computed, and provided by thousands of IoT elements placed in open spaces. The highly interconnected heterogeneous structure faces new types of challenges from a security and privacy concern. Previously, security platforms were not so capable of handling these complex platforms due to different communication stacks and protocols. It seems to be of the utmost importance to keep concern about security issues relating to several attacks and vulnerabilities. The main motive of this chapter is to analyze the broad overview of security vulnerabilities and its counteractions. Generally, it discusses the major security techniques and protocols adopted by the IoT and analyzes the attacks against IoT devices.


2021 ◽  
Vol 11 (22) ◽  
pp. 10793
Author(s):  
Azin Moradbeikie ◽  
Ahmad Keshavarz ◽  
Habib Rostami ◽  
Sara Paiva ◽  
Sérgio Ivan Lopes

Large-scale deployments of the Internet of Things (IoT) are adopted for performance improvement and cost reduction in several application domains. The four main IoT application domains covered throughout this article are smart cities, smart transportation, smart healthcare, and smart manufacturing. To increase IoT applicability, data generated by the IoT devices need to be time-stamped and spatially contextualized. LPWANs have become an attractive solution for outdoor localization and received significant attention from the research community due to low-power, low-cost, and long-range communication. In addition, its signals can be used for communication and localization simultaneously. There are different proposed localization methods to obtain the IoT relative location. Each category of these proposed methods has pros and cons that make them useful for specific IoT systems. Nevertheless, there are some limitations in proposed localization methods that need to be eliminated to meet the IoT ecosystem needs completely. This has motivated this work and provided the following contributions: (1) definition of the main requirements and limitations of outdoor localization techniques for the IoT ecosystem, (2) description of the most relevant GNSS-free outdoor localization methods with a focus on LPWAN technologies, (3) survey the most relevant methods used within the IoT ecosystem for improving GNSS-free localization accuracy, and (4) discussion covering the open challenges and future directions within the field. Some of the important open issues that have different requirements in different IoT systems include energy consumption, security and privacy, accuracy, and scalability. This paper provides an overview of research works that have been published between 2018 to July 2021 and made available through the Google Scholar database.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Yuwen Pu ◽  
Jin Luo ◽  
Chunqiang Hu ◽  
Jiguo Yu ◽  
Ruifeng Zhao ◽  
...  

As the next generation of information and communication infrastructure, Internet of Things (IoT) enables many advanced applications such as smart healthcare, smart grid, smart home, and so on, which provide the most flexibility and convenience in our daily life. However, pervasive security and privacy issues are also increasing in IoT. For instance, an attacker can get health condition of a patient via analyzing real-time records in a smart healthcare application. Therefore, it is very important for users to protect their private data. In this paper, we present two efficient data aggregation schemes to preserve private data of customers. In the first scheme, each IoT device slices its actual data randomly, keeps one piece to itself, and sends the remaining pieces to other devices which are in the same group via symmetric encryption. Then, each IoT device adds the received pieces and the held piece together to get an immediate result, which is sent to the aggregator after the computation. Moreover, homomorphic encryption and AES encryption are employed to guarantee secure communication. In the second scheme, the slicing strategy is also employed. Noise data are introduced to prevent the exchanged actual data of devices from disclosure when the devices blend data each other. AES encryption is also employed to guarantee secure communication between devices and aggregator, compared to homomorphic encryption, which has significantly less computational cost. Analysis shows that integrity and confidentiality of IoT devices’ data can be guaranteed in our schemes. Both schemes can resist external attack, internal attack, colluding attack, and so on.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-4
Author(s):  
Amit Kumar Singh ◽  
Jonathan Wu ◽  
Ali Al-Haj ◽  
Calton Pu

2021 ◽  
pp. 17-37
Author(s):  
Mandeep Singh ◽  
Namrata Sukhija ◽  
Anupam Sharma ◽  
Megha Gupta ◽  
Puneet Kumar Aggarwal

Author(s):  
Qi Xie ◽  
Keheng Li ◽  
Xiao Tan ◽  
Lidong Han ◽  
Wen Tang ◽  
...  

AbstractSmart city can improve the efficiency of managing assets and resources, optimize urban services and improve the quality of citizens’ life. Wireless sensor networks (WSNs) can solve many problems in smart city, such as smart transportation, smart healthcare and smart energy. However, security and privacy are the biggest challenges for WSN. Recently, Banerjee et al. proposed a security-enhanced authentication and key agreement scheme for WSN, but their scheme cannot resist offline password guessing attack, impersonation attack, and does not achieve session key secrecy, identity unlinkability, and perfect forward secrecy. In order to fix these flaws, a secure and privacy-preserving authentication protocol for WSN in smart city is proposed. We prove the security of the proposed protocol by using applied pi calculus-based formal verification tool ProVerif and show that it has high computational efficiency by comparison with some related schemes.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Jia-Ning Luo ◽  
Jimmy Ming-Tai Wu

The wide applications of the Internet of Things and cloud computing technologies have driven the development of many industries. With the improvement of living standards, health has become the top priority of people’s attention. The emergence of the wireless body area network (WBAN) enables people to master their physical condition all the time and make it more convenient for patients and doctors to communicate with each other. Doctors can provide real-time online treatment with cloud-based smart healthcare environments for patients. In this process, patients, health records, and doctors need to maintain security and privacy. Recently, Kumari et al. proposed a secure framework for the smart medical system. However, we found that their framework cannot provide the anonymity of patients and doctors, data confidentiality, and patient unlinkability and also is subject to impersonation attacks and desynchronization attacks. In order to ensure the security and privacy of patients and doctors, we propose an authentication and key exchange protocol in cloud-based smart healthcare environments. Formal and informal security analyses, as well as performance analysis, demonstrated that our protocol is suitable for these environments.


Author(s):  
Laila Fetjah ◽  
Kebira Azbeg ◽  
Ouail Ouchetto ◽  
Said Jai Andaloussi

With the rapid development in smart medical devices, Internet of things has a large applicability in healthcare sector. The current system is based on a centralized communication with cloud servers. However, this architecture increases security and privacy risks. This paper describes an architecture of a smart healthcare system for remote patient monitoring. To ensure security and privacy, the architecture uses the Blockchain technology. For data analysis, smart contracts and artificial intelligence are used. The architecture is divided into three layers: smart medical devices layer, fog layer and cloud layer. To validate the proposed approach, a scenario based on diabetes management system is described. The architecture is applied to provide remote diabetic patients monitoring. The system could suggest treatments, generate proactive predictions and predict future complications as well as alerting physicians in case of emergency.


Sensors ◽  
2021 ◽  
Vol 21 (20) ◽  
pp. 6886
Author(s):  
Edgar Batista ◽  
M. Angels Moncusi ◽  
Pablo López-Aguilar ◽  
Antoni Martínez-Ballesté ◽  
Agusti Solanas

The advances in the miniaturisation of electronic devices and the deployment of cheaper and faster data networks have propelled environments augmented with contextual and real-time information, such as smart homes and smart cities. These context-aware environments have opened the door to numerous opportunities for providing added-value, accurate and personalised services to citizens. In particular, smart healthcare, regarded as the natural evolution of electronic health and mobile health, contributes to enhance medical services and people’s welfare, while shortening waiting times and decreasing healthcare expenditure. However, the large number, variety and complexity of devices and systems involved in smart health systems involve a number of challenging considerations to be considered, particularly from security and privacy perspectives. To this aim, this article provides a thorough technical review on the deployment of secure smart health services, ranging from the very collection of sensors data (either related to the medical conditions of individuals or to their immediate context), the transmission of these data through wireless communication networks, to the final storage and analysis of such information in the appropriate health information systems. As a result, we provide practitioners with a comprehensive overview of the existing vulnerabilities and solutions in the technical side of smart healthcare.


Sign in / Sign up

Export Citation Format

Share Document