Secure Framework for Internet of Things Based e-Health System

2019 ◽  
Vol 10 (4) ◽  
pp. 16-29 ◽  
Author(s):  
Adil Bashir ◽  
Ajaz Hussain Mir

Internet of Things (IoT) is the emerging technology finding applications in a wide range of fields that include smart homes, intelligent transportation, e-health, supply chain management. Among IoT applications, e-health is one of the most promising application in which smart devices capable of monitoring physiological parameters of patients are implanted in or around their bodies which automatically sense and transmit collected data to medical consultants. However, security issues for electronic patient records (EPR) in-transit hinder the usage of IoT in e-health systems. Among these issues, EPR confidentiality and entity authentication are major concerns. In this article, confidentiality of EPR and its secure transmission over network is focused mainly. A security framework is proposed where-in smart devices encrypt sensed physiological data with Light-Weight Encryption Algorithm and Advanced Encryption Standard cryptographic algorithms. The security framework and the designed protocol provides better security and are energy efficient as presented in the evaluation section.

Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2784 ◽  
Author(s):  
Chao Qu ◽  
Ming Tao ◽  
Ruifen Yuan

With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy. On the other hand, the smart devices in IoT are always lightweight and have less energy and memory. This makes the application of blockchain difficult. Against this background, this paper proposes a blockchain model based on hypergraphs. The aims of this model are to reduce the storage consumption and to solve the additional security issues. In the model, we use the hyperedge as the organization of storage nodes and convert the entire networked data storage into part network storage. We discuss the design of the model and security strategy in detail, introducing some use cases in a smart home network and evaluating the storage performance of the model through simulation experiments and an evaluation of the network.


Internet-of-Things (IoT) is an inevitable domain of technology that is going to capture the connectivity of the majority of the smart devices in the coming days supported by huge advancement in mobile computing. However, IoT still suffers serious security issues when it comes to performing extensive communication over a broad range of heterogeneous devices. A review of existing secure routing schemes shows that they are complex in operation overlooking the communication performance and resource-constrained factors. Therefore, the proposed system introduces a very novel, simple, and cost-effective, secure routing scheme that is not only capable of identifying the threats without any apriority information of adversary, but they are equally capable of isolating the threats from the connectivity of regular IoT nodes. The simulated outcome of the proposed system shows that it offers a better solution towards security in contrast to existing security approaches frequently exercised in IoT at present


2016 ◽  
Vol 24 (4) ◽  
pp. 217-221 ◽  
Author(s):  
Irakli Abashidze ◽  
Marcin Dąbrowski

Abstract Internet of Things (IoT) affects different areas of human activities: everyday life of ordinary citizens, work style of marketing teams, factories and even entire cities. Large companies try to implement the technology in their marketing strategy that reshapes not only communication style and product promotion but consumers’ expectations, perceptions and requirements towards companies. IoT is expected to become a huge network that will encompass not only smart devices but significantly influence humans’ behavior, in this particular case - decision making style in different phases of purchase process. Therefore, the need for comprehensive scientific research is necessary. The issue needs to be reviewed from various points of view, such as opportunities, advantages, disadvantages, legal and technical considerations. The paper is an attempt to review different aspects of using Internet of Things for marketing purposes, identify some of the major problems and present possible ways of solution.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1492 ◽  
Author(s):  
Pantaleone Nespoli ◽  
David Useche Pelaez ◽  
Daniel Díaz López ◽  
Félix Gómez Mármol

The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in several daily appliances. Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems. On the downside, the great benefit carried by the IoT paradigm in our life brings simultaneously severe security issues, since the information exchanged among the objects frequently remains unprotected from malicious attackers. The paper at hand proposes COSMOS (Collaborative, Seamless and Adaptive Sentinel for the Internet of Things), a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. Additionally, we discuss the current deployment of the sentinel on a commodity device (i.e., Raspberry Pi). Exhaustive experiments are conducted on the sentinel, demonstrating that it performs meticulously even in heavily stressing conditions. Each defensive layer is tested, reaching a remarkable performance, thus proving the applicability of COSMOS in a distributed and dynamic scenario such as IoT. With the aim of easing the enjoyment of the proposed sentinel, we further developed a friendly and ease-to-use COSMOS App, so that end-users can manage sentinel(s) directly using their own devices (e.g., smartphone).


2020 ◽  
Vol 10 (21) ◽  
pp. 7699
Author(s):  
Shin-Hung Pan ◽  
Shu-Ching Wang

Because the Internet of Things (IoT) can provide a global service network through various smart devices, the IoT has been widely used in smart transportation, smart cities, smart healthcare, and factory automation through the Internet connection. With the large-scale establishment and 5G (fifth generation) wireless networks, the cellular Internet of Things (CIoT) will continue to be developed and applied to a wide range of applications. In order to provide a reliable application of CIoT, a safe and reliable network topology MECIoT is proposed in this study. To improve the reliability and fault-tolerant capability of the network proposed, the problem of reaching agreement should be revisited. Therefore, the applications in the system can still be performed correctly even if some processing units (PUs) in the system have failed. In this study, a new protocol is proposed to allow all normal PUs in MECIoT to reach an agreement with the minimum amount of data exchanges required and the maximum number of failed PUs allowed in MECIoT. In the end, the optimality of the protocol has been proven by mathematical method.


Author(s):  
Pratheksha Rai N

Health is the important key for any living. The monitoring of one’s health is so important in today’s busy world ,that most of the people run out of time when they get to know the disease, which actually is not fatal. Smart Health Monitoring system gives you a track of your health, making your work easier to know the data of your health without running every time to hospital. This paper is a study about Smart health Monitoring system using Internet of things (IOT).Internet of things plays An very prominent role in wide range of healthcare applications and it also serves as a catalyst for the healthcare. Smart devices and wireless sensor networks are used here for the analysis of different health parameters in real-time.


2020 ◽  
Vol 2 (4) ◽  
pp. 190-199 ◽  
Author(s):  
Dr. S. Smys ◽  
Dr. Abul Basar ◽  
Dr. Haoxiang Wang

Internet of things (IoT) is a promising solution to connect and access every device through internet. Every day the device count increases with large diversity in shape, size, usage and complexity. Since IoT drive the world and changes people lives with its wide range of services and applications. However, IoT provides numerous services through applications, it faces severe security issues and vulnerable to attacks such as sinkhole attack, eaves dropping, denial of service attacks, etc., Intrusion detection system is used to detect such attacks when the network security is breached. This research work proposed an intrusion detection system for IoT network and detect different types of attacks based on hybrid convolutional neural network model. Proposed model is suitable for wide range of IoT applications. Proposed research work is validated and compared with conventional machine learning and deep learning model. Experimental result demonstrate that proposed hybrid model is more sensitive to attacks in the IoT network.


Author(s):  
Abdelkader Khobzaoui ◽  
Kadda Benyahia ◽  
Boualem Mansouri ◽  
Sofiane Boukli-Hacene

Internet of Things (IoT) is a set of connected smart devices providing and sharing rich data in real-time without involving a human being. However, IoT is a security nightmare because like in the early computer systems, security issues are not considered in the design step. Thereby, each IoT system could be susceptible to malicious users and uses. To avoid these types of situations, many approaches and techniques are proposed by both academic and industrial researches.DNA computing is an emerging and relatively new field dealing with data encryption using a DNA computing concepts. This technique allows rapid and secure data transfer between connected objects with low power consumption. In this paper, authors propose a symmetric cryptography method based on DNA. This method consists in cutting the message to encrypt/decrypt in blocks of characters and use a symmetric key extracted from a chromosome for encryption and decryption. Implemented on the embedded platform of a Raspberry Pi, the proposed method shows good performances in terms of robustness, complexity and attack resistance.


2021 ◽  
Author(s):  
Yousef MethkalAbd Algani ◽  
Balaji S ◽  
AlbertRaj A. ◽  
Elangovan G. ◽  
Sathish Kumar P.J. ◽  
...  

Abstract The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of Wi-Fi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among various devices c,onnected over a network. The HTTP POST and HTTP GET command that supports the RESTful service have been used to ensure the transmission and reception of packets between the IOT Gateway and Cloud Database. The emerging smart technologies based on the Internet of Things (IoT) facilitated features like automation, controllability, interconnectivity, reliability which in turn turn paved the way for a wide range of acceptance amongst the masses. The Internet of Things (IoT) has brought in many new emerging technologies into varoius field like our daily lives, industry, agricultural sector, and many more. The world is experiencing the explosive growth with the advent of Internet of Things (IoT) these years. The potential growth of IoT is enoromous which is evidenced by all the human beings in our day to day life.


2022 ◽  
pp. 148-175
Author(s):  
Anish Khan ◽  
Dragan Peraković

The internet of things is a cutting-edge technology that is vulnerable to all sorts of fictitious solutions. As a new phase of computing emerges in the digital world, it intends to produce a huge number of smart gadgets that can host a wide range of applications and operations. IoT gadgets are a perfect target for cyber assaults because of their wide dispersion, availability/accessibility, and top-notch computing power. Furthermore, as numerous IoT devices gather and investigate private data, they become a gold mine for hostile actors. Hence, the matter of fact is that security, particularly the potential to diagnose compromised nodes, as well as the collection and preservation of testimony of an attack or illegal activity, have become top priorities. This chapter delves into the timeline and the most challenging security and privacy issues that exist in the present scenario. In addition to this, some open issues and future research directions are also discussed.


Sign in / Sign up

Export Citation Format

Share Document