scholarly journals NETWORK ATTACKS RELATED TO SMART HEALTHCARE AND THEIR IMPACT EVALUATION

Author(s):  
H. El Fadili ◽  
T. Mazri

Abstract. The Internet of Things (IoT) has frequently been used by people as a way to facilitate their connection to all types of devices. Thanks to this technology, healthcare field can also benefit from a perfect interaction taking advantage of a better diagnostic and treatment that facilitate life for both patients and doctors. Unfortunately, and similarly to other domains based on technology, the smart healthcare does also use IT programs and wireless network to exchange and analyse data the fact that makes it highly exposed to malicious actions. Moreover, if a good security level is not provided in order to save patients information once hackers get access to the mentioned data, patients might be affected or even lose their lives. This paper presents an overview of the security issues in smart healthcare fields and gives a state of art of some well-known network attacks in the field of smart healthcare. We also propose an impact evaluation of those attacks by adopting four scales of evaluation ‘Minor’, ‘Significant’, ‘Serious’ and ‘Critical’ proposed by EBIOS Gravity assessment. The proposed evaluation is classified based on three criteria: sensor’s nature, application field and intervention time.

Author(s):  
N. El-Bakkouri ◽  
T. Mazri

Abstract. The Internet of Things had become more usually those recent years, it helps the human to be connected to every devices, to The Internet of Things had become more usually those recent years, it helps the human to be connected to every devices, to communicate and to share information for each other, the IoT gives many benefits to HealthCare systems and applications, it help to diagnostic and to monitor patients more closely and easier, but as other domain based on technologies, the smart Health use IT programs and Wireless network to exchange and analyse data which may be stooling by attackers if it doesn't secured and controlled permanently, as a fact of this weakness, it's possible to injure or kill some patient without being detected, this article discussing the Smart Health system, its benefits and examples of its using, also, it gives a view about security issues that can touch to this domain and best practice to follow for securing, detecting and avoiding security risks.


2020 ◽  
Vol 7 (1) ◽  
pp. 22-28
Author(s):  
Vladimir Eliseev ◽  
Anastasiya Gurina

  Abstract— The paper investigates the causes of widespread use by cybercriminals of the Internet of Things for organizing network attacks and other illegal use. An analysis of existing approaches and technologies for protecting networked computer devices is presented, as well as the main factors that prevent their use in the world of Internet of Things. An approach is suggested that ensures the integration of protective mechanisms directly into the composition of Things. Various variants of technology implementation are considered. Key aspects and potential ways of implementing the proposed approach are noted.Tóm tắt— Bài báo nghiên cứu về các phương thức được tội phạm mạng sử dụng rộng rãi trong Internet vạn vật (IoT), để tổ chức các tấn công mạng và các hành vi bất hợp pháp khác. Bài báo phân tích các phương pháp và công nghệ hiện có để bảo vệ các thiết bị kết nối mạng, cũng như các yếu tố chính để ngăn chặn việc sử dụng chúng trong IoT. Cách tiếp cận được đề xuất là đảm bảo việc tích hợp các cơ chế bảo vệ trực tiếp vào cấu trúc của IoT. Bài báo cũng xem xét các biến thể khác của việc thực hiện công nghệ này. Từ đó, đưa ra lưu ý về các khía cạnh chính và cách thức cài đặt tiềm năng để thực hiện phương pháp được đề xuất. 


Author(s):  
Aman Tyagi

Elderly population in the Asian countries is increasing at a very fast rate. Lack of healthcare resources and infrastructure in many countries makes the task of provding proper healthcare difficult. Internet of things (IoT) in healthcare can address the problem effectively. Patient care is possible at home using IoT devices. IoT devices are used to collect different types of data. Various algorithms may be used to analyse data. IoT devices are connected to the internet and all the data of the patients with various health reports are available online and hence security issues arise. IoT sensors, IoT communication technologies, IoT gadgets, components of IoT, IoT layers, cloud and fog computing, benefits of IoT, IoT-based algorithms, IoT security issues, and IoT challenges are discussed in the chapter. Nowadays global epidemic COVID19 has demolished the economy and health services of all the countries worldwide. Usefulness of IoT in COVID19-related issues is explained here.


Author(s):  
Issmat Shah Masoodi ◽  
Bisma Javid

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions.


2019 ◽  
Vol 7 (2) ◽  
pp. 21-40 ◽  
Author(s):  
Parthasarathy Panchatcharam ◽  
Vivekanandan S.

Wellbeing is fundament requirement. What's more, it is human appropriate to get quality health care. These days, India is confronting numerous medical problems in light of fewer assets. This survey article displays the idea of solving health issues by utilizing a recent innovation, the Internet of Things (IOT). The Internet of Things with their developing interdisciplinary applications has changed our lives. Smart health care being one such IoT application interfaces brilliant gadgets, machines, patients, specialists, and sensors to the web. At long last, the difficulties and prospects of the improvement of IoT-based medicinal service frameworks are talked about in detail. This review additionally summarizes the security and protection worries of IoT, administrations and application of IoT and smart healthcare services that have changed the customary medicinal services framework by making healthcare administration more proficient through their applications.


2013 ◽  
Vol 765-767 ◽  
pp. 1726-1729
Author(s):  
Yan Bing Liu ◽  
Wen Jing Ren

Security and privacy is always the most important issues by the public in the Internet of Things. The core problems are associated with the diversifying of the Internet towards an Internet of things, and the different requirements to the security level for application. Therefore, this paper is to put forward an authentication model and protocol to cope with the problem. The protocol is adopted with attribute-based encryption to replace the traditional identity-based encryption (IBE), and then make formalization analysis to the security of the protocol by using BAN logic.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


2017 ◽  
Vol 9 (1) ◽  
pp. 57-75 ◽  
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund

This study investigates actors in the ecosystems of the Internet of Things (IoT). Previous research suggests that unstructured ecosystems make one of the greatest challenges for creating business models for the IoT. The present study concludes four contributions. First, the study reviews literature to develop a framework for role mechanisms in ecosystems and applies the framework to analyse data from fifteen interviews in six cases. Second, it identifies four diverse actor roles in IoT ecosystems: butterfly, ant and greenfly, spider, and the swarm of bees. Third, the study shows how actors take and make different roles in four emerging IoT ecosystems; product-, company-, industry-, and peer to peer ecosystems, which are structured in accordance with the identified actors' role behavior. Fourth, it suggests a new role pattern, role replication, where companies replicate their value designs and networks to other contexts.


Author(s):  
D. R. Kolisnyk ◽  
◽  
K. S. Misevych ◽  
S. V. Kovalenko

The article considers the issues of system architecture IoT-Fog-Cloud, considers the interaction between the three levels of IoT, Fog and Cloud for the effective implementation of programs for big data analysis and cybersecurity. The article also discusses security issues, solutions and directions for future research in the field of the Internet of Things and nebulous computing.


Sign in / Sign up

Export Citation Format

Share Document