Security Framework for IoT Based Real-Time Health Applications

被引:19
|
作者
Hussain, Aamir [1 ]
Ali, Tariq [2 ]
Althobiani, Faisal [3 ]
Draz, Umar [4 ]
Irfan, Muhammad [5 ]
Yasin, Sana [6 ]
Shafiq, Saher [1 ]
Safdar, Zanab [4 ]
Glowacz, Adam [7 ]
Nowakowski, Grzegorz [8 ]
Khan, Muhammad Salman [9 ]
Alqhtani, Samar [10 ]
机构
[1] MNS Univ Agr Multan, Dept Comp Sci, Multan 60000, Pakistan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
[3] King Abdulaziz Univ, Fac Maritime Studies, POB 80401, Jeddah, Saudi Arabia
[4] Univ Sahiwal, Dept Comp Sci, Sahiwal 57000, Pakistan
[5] Najran Univ, Dept Elect Engn, Coll Engn, Najran 61441, Saudi Arabia
[6] Univ Okara, Dept Comp Sci, Okara 56130, Pakistan
[7] AGH Univ Sci & Technol, Dept Automat Control & Robot, Fac Elect Engn Automat Comp Sci & Biomed Engn, Al A Mickiewicza 30, PL-30059 Krakow, Poland
[8] Cracow Univ Technol, Fac Elect & Comp Engn, Warszawska 24 Str, PL-31155 Krakow, Poland
[9] COMSATS Univ Islamabad, Dept Comp Sci, Lahore Campus, Lahore 54000, Pakistan
[10] Najran Univ Saudi Arabia, Coll Comp Sci & Informat Syst, Najran 61441, Saudi Arabia
关键词
e-health; IoT and data privacy; IoT layered architecture; CoAP; MONITORING-SYSTEM; CARE; AUTHENTICATION; MANAGEMENT; INTERNET; PRIVACY; CHALLENGES; NETWORKS; THINGS; SAFETY;
D O I
10.3390/electronics10060719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication over the public network. IoT-based health monitoring systems work in a layered manner, comprising a perception layer, a network layer, and an application layer. Each layer has some security, and privacy concerns that need to be addressed accordingly. A lot of research has been conducted to resolve these security issues in different domains of IoT. Several frameworks for the security of IoT-based e-health systems have also been developed. This paper introduces a security framework for real-time health monitoring systems to ensure data confidentiality, integrity, and authenticity by using two common IoT protocols, namely constrained application protocol (CoAP) and message query telemetry transports (MQTT). This security framework aims to defend sensor data against the security loopholes while it is continuously transmitting over the layers and uses hypertext transfer protocols (HTTPs) for this purpose. As a result, it shields from the breach with a very low ratio of risk. The methodology of this paper focuses on how the security framework of IoT-based real-time health systems is protected under the tiers of CoAP and HTTPs. CoAP works alongside HTTPs and is responsible for providing end-to-end security solutions.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [1] Secure IoT e-Health Applications using VICINITY Framework and GDPR guidelines
    Koutli, Maria
    Theologou, Natalia
    Tryferidis, Athanasios
    Tzovaras, Dimitrios
    Kagkini, Aimilia
    Zandes, Dimitrios
    Karkaletsis, Konstantinos
    Kaggelides, Konstantinos
    Miralles, Jorge Almela
    Oravec, Viktor
    Vanya, Stefan
    2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, : 263 - 270
  • [2] Scalability of Real-Time IoT-based Applications for Smart Cities
    Zyrianoff, Ivan
    Borelli, Fabrizio
    Biondi, Gabriela
    Heideker, Alexandre
    Kamienski, Carlos
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 693 - 698
  • [3] Real-time Approach for Decision Making in IoT-based Applications
    Harb, Hassan
    Nader, Diana Abi
    Sabeh, Kassem
    Makhoul, Abdallah
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS (SENSORNETS), 2021, : 223 - 230
  • [4] A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions
    Burhan, Muhammad
    Alam, Hina
    Arsalan, Ahmad
    Rehman, Rana Asif
    Anwar, Muhammad
    Faheem, Muhammad
    Ashraf, Muhammad Waqar
    IEEE ACCESS, 2023, 11 : 73303 - 73329
  • [5] Security Framework of IoT-Based Smart Home
    Sotoudeh, Shahrouz
    Hashemi, Sattar
    Garakani, Hossein Gharaee
    2020 10TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2020, : 251 - 256
  • [6] Real-Time Task Scheduling in Fog-Cloud Computing Framework for IoT Applications: A Fuzzy Logic based Approach
    Ali, Hala S.
    Rout, Rashmi Ranjan
    Parimi, Priyanka
    Das, Sajal K.
    2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, : 556 - 564
  • [7] An analytical approach to real-time cloud services on IoT-based applications for smart city planning
    Khan, Md Shahrukh Adnan
    Kadir, Kazi Mahtab
    Alam, Md Khairul
    Mahmud, Shoaib
    Hossain, Shah Reza Mohammad Fahad Ui
    Sikder, Md Pabel
    Jefreen, Fiza
    Kamal, Ainun
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (5-6) : 507 - 523
  • [8] DAM: A Theoretical Framework for Sensor Security in IoT Applications
    Gulzar, Bisma
    Gupta, Ankur
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (03): : 309 - 327
  • [9] A systematic review of innovations for real-time image security in IoT applications using machine learning and blockchain
    Rai, Manish
    Kumar, Sunil
    Rathore, Pramod Singh
    JOURNAL OF INTELLIGENT MANUFACTURING, 2024,
  • [10] Energy efficient resource management for real-time IoT applications
    Fereira, Rolden John
    Ranaweera, Chathurika
    Lee, Kevin
    Schneider, Jean-Guy
    INTERNET OF THINGS, 2025, 30