Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security

被引:7
作者
Yamout, Youssef [1 ]
Yeasar, Tashaffi Samin [1 ]
Iqbal, Shahrear [2 ]
Zulkernine, Mohammad [1 ]
机构
[1] Queens Univ, 21-25 Union St, Kingston, ON K7L 2N8, Canada
[2] Natl Res Council Canada, 46 Dineen Dr, Fredericton, NB E3B 9W4, Canada
关键词
Smart aging care system; IoT; smart home; smart healthcare; security issues; countermeasures; IMPLANTABLE MEDICAL DEVICES; PRIVACY ISSUES; TECHNOLOGY; USABILITY; ATTACKS; HOUSE; PUMPS;
D O I
10.1145/3610225
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The upward trend in the percentage of the population older than 65 has made smart aging more relevant than ever before. Growing old in a traditional assisted living facility can take a toll on the mental well-being of the elderly individual, on top of other factors like extravagant costs, potential negligence from caregivers, and a ceaseless demand for healthcare personnel. Aging in one's own space instead of a senior residence is the desirable alternative thanks to enabling technologies like the Internet of Things (IoT). The IoT facilitates connected healthcare, safety, entertainment, and social well-being of the older population. However, it suffers from a multitude of security vulnerabilities. Although researchers have investigated the security challenges of several IoT ecosystems, IoT systems in the context of smart aging care have not been well studied from a security perspective. In this article, we present an in-depth analysis of smart aging care system security issues. A smart aging care system is essentially a superset of smart homes and healthcare monitoring systems. The sheer variety of technologies at play and the amount of data generated, combined with physical vulnerabilities and a lack of technological exposure of the intended occupant group put smart aging care systems at great risk. Attacks against relatively benign smart home devices can bring serious consequences because of the context in which these devices are employed. Thus, the purpose of our study is four-fold: (i) defining the components and functionalities of a smart aging care system, (ii) identifying security vulnerabilities and outlining suitable countermeasures for them, (iii) analyzing how the attacks uniquely impact senior users' Quality of Life (QoL), (iv) highlighting avenues for future research and how the threat landscape in smart aging care systems differ from general smart homes.
引用
收藏
页数:35
相关论文
共 137 条
[1]  
Acar Abbas, 2020, WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, P207, DOI 10.1145/3395351.3399421
[2]   Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms [J].
Ahanger, Tariq Ahamed ;
Aljumah, Abdullah .
IEEE ACCESS, 2019, 7 :11020-11028
[3]   Securing Insulin Pump System Using Deep Learning and Gesture Recognition [J].
Ahmad, Usman ;
Song, Hong ;
Bilal, Awais ;
Saleem, Shahzad ;
Ullah, Asad .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :1716-1719
[4]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[5]   Emerging IoT domains, current standings and open research challenges: a review [J].
Ali, Omer ;
Ishak, Mohamad Khairi ;
Bhatti, Muhammad Kamran Liaquat .
PEERJ COMPUTER SCIENCE, 2021, 7 :1-49
[6]   SoK: Security Evaluation of Home-Based IoT Deployments [J].
Alrawi, Omar ;
Lever, Chaz ;
Antonakakis, Manos ;
Monrose, Fabian .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :1362-1380
[7]  
Angrishi K, 2017, Arxiv, DOI arXiv:1702.03681
[8]  
[Anonymous], 2012, International Journal of Information and Education Technology, V2, P149, DOI DOI 10.7763/IJIET.2012.V2.98
[9]  
[Anonymous], 2016, BadTunnel: NetBIOS Name Service spoofing over the Internet
[10]  
[Anonymous], 2008, CHI 08 HUM FACT COMP, DOI DOI 10.1145/1358628.1358911