A Secure Framework for Remote Healthcare Monitoring using the Internet of Medical Things

被引:4
作者
Salem, Osman [1 ]
Mehaoua, Ahmed [1 ]
机构
[1] Univ Paris, Borelli Res Ctr, CNRS UMR 9010, Paris, France
来源
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) | 2022年
关键词
Anomaly Detection; PELT; ECC; ECDH; BLE; IoMT; WBANs; SYSTEMS;
D O I
10.1109/ICC45855.2022.9839025
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we propose a secure framework for healthcare monitoring using the Internet of Medical Things (IoMT). In spite of their deployment, these devices still vulnerable to several cyber-attacks, ranging from unauthorized access to private medical data to data modification and injection. These attacks can compromise the privacy of the monitored patient, reduce the reliability of the monitoring system and may harm the life of monitored patient. In this paper, we propose a new framework to detect attacks and secure the communications in IoMT. To prevent eavesdropping and modification attacks, we propose the Ephemeral Elliptic Curves Diffie-Hellman (EECDH) to derive a session key used to provide confidentiality and authenticity. To detect injected measurements, flooding triggered by compromised devices and medical changes in physiological data, we applied the sequential change point detection algorithm Pruned Exact Linear Time (PELT) followed by the boxplot. Our experimental results show that our approach is able to increase the reliability and the accuracy of remote monitoring system, while reducing the false alarms triggered by injected measurements.
引用
收藏
页码:1233 / 1238
页数:6
相关论文
共 18 条
[1]   LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT [J].
Aghili, Seyed Farhad ;
Mala, Hamid ;
Shojafar, Mohammad ;
Peris-Lopez, Pedro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :410-424
[2]  
[Anonymous], 2018, SECURITY COMMUNICATI
[3]   Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device [J].
Ayub, Muhammad Faizan ;
Saleem, Muhammad Asad ;
Altaf, Izwa ;
Mahmood, Khalid ;
Kumari, Saru .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55 (55)
[4]   Security and Vulnerability of Extreme Automation Systems: The IoMT and IoA Case Studies [J].
Fiaidhi, Jinan ;
Mohammed, Sabah .
IT PROFESSIONAL, 2019, 21 (04) :48-55
[5]   Review of Security and Privacy for the Internet of Medical Things (IoMT) Resolving the protection concerns for the novel circular economy bioinformatics [J].
Hatzivasilis, George ;
Soultatos, Othonas ;
Ioannidis, Sotiris ;
Verikoukis, Christos ;
Demetriou, Giorgos ;
Tsatsoulis, Christos Iraklis .
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, :457-464
[6]  
Hills B., 2020, MACHINE MIDDLE MITM
[7]  
Khamparia A, 2021, COMPUTATIONAL INTELL, V5
[8]  
KHAN MU, 2021, WIRELESS PERS COMMUN, DOI DOI 10.1111/1541-4337.12793
[9]   Optimal Detection of Changepoints With a Linear Computational Cost [J].
Killick, R. ;
Fearnhead, P. ;
Eckley, I. A. .
JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2012, 107 (500) :1590-1598
[10]  
Killick R, 2014, J STAT SOFTW, V58, P1