Security Framework for IoT Based Real-Time Health Applications

被引:19
|
作者
Hussain, Aamir [1 ]
Ali, Tariq [2 ]
Althobiani, Faisal [3 ]
Draz, Umar [4 ]
Irfan, Muhammad [5 ]
Yasin, Sana [6 ]
Shafiq, Saher [1 ]
Safdar, Zanab [4 ]
Glowacz, Adam [7 ]
Nowakowski, Grzegorz [8 ]
Khan, Muhammad Salman [9 ]
Alqhtani, Samar [10 ]
机构
[1] MNS Univ Agr Multan, Dept Comp Sci, Multan 60000, Pakistan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
[3] King Abdulaziz Univ, Fac Maritime Studies, POB 80401, Jeddah, Saudi Arabia
[4] Univ Sahiwal, Dept Comp Sci, Sahiwal 57000, Pakistan
[5] Najran Univ, Dept Elect Engn, Coll Engn, Najran 61441, Saudi Arabia
[6] Univ Okara, Dept Comp Sci, Okara 56130, Pakistan
[7] AGH Univ Sci & Technol, Dept Automat Control & Robot, Fac Elect Engn Automat Comp Sci & Biomed Engn, Al A Mickiewicza 30, PL-30059 Krakow, Poland
[8] Cracow Univ Technol, Fac Elect & Comp Engn, Warszawska 24 Str, PL-31155 Krakow, Poland
[9] COMSATS Univ Islamabad, Dept Comp Sci, Lahore Campus, Lahore 54000, Pakistan
[10] Najran Univ Saudi Arabia, Coll Comp Sci & Informat Syst, Najran 61441, Saudi Arabia
关键词
e-health; IoT and data privacy; IoT layered architecture; CoAP; MONITORING-SYSTEM; CARE; AUTHENTICATION; MANAGEMENT; INTERNET; PRIVACY; CHALLENGES; NETWORKS; THINGS; SAFETY;
D O I
10.3390/electronics10060719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication over the public network. IoT-based health monitoring systems work in a layered manner, comprising a perception layer, a network layer, and an application layer. Each layer has some security, and privacy concerns that need to be addressed accordingly. A lot of research has been conducted to resolve these security issues in different domains of IoT. Several frameworks for the security of IoT-based e-health systems have also been developed. This paper introduces a security framework for real-time health monitoring systems to ensure data confidentiality, integrity, and authenticity by using two common IoT protocols, namely constrained application protocol (CoAP) and message query telemetry transports (MQTT). This security framework aims to defend sensor data against the security loopholes while it is continuously transmitting over the layers and uses hypertext transfer protocols (HTTPs) for this purpose. As a result, it shields from the breach with a very low ratio of risk. The methodology of this paper focuses on how the security framework of IoT-based real-time health systems is protected under the tiers of CoAP and HTTPs. CoAP works alongside HTTPs and is responsible for providing end-to-end security solutions.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [21] IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework
    Parai, Krittibas
    Islam, S. K. Hafizul
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 138
  • [22] Security and Privacy in IoT-Cloud-Based e-Health Systems-A Comprehensive Review
    Butpheng, Chanapha
    Yeh, Kuo-Hui
    Xiong, Hu
    SYMMETRY-BASEL, 2020, 12 (07):
  • [23] Design and implementation of a framework for blockchain based security using IoT
    Sureshkumar, T.
    Sivaraj, R.
    Vijayakumar, M.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (01) : 905 - 918
  • [24] A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey
    Bouzidi, Mohammed
    Gupta, Nishu
    Cheikh, Faouzi Alaya
    Shalaginov, Andrii
    Derawi, Mohammad
    IEEE ACCESS, 2022, 10 : 101362 - 101384
  • [25] Real-Time Performance of Industrial IoT Communication Technologies: A Review
    Behnke, Ilja
    Austad, Henrik
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (05): : 7399 - 7410
  • [26] A Security Framework for IoT Authentication and Authorization based on Blockchain Technology
    Pajooh, Houshyar Honar
    Rashid, M. A.
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 264 - 271
  • [27] A Security-Enabled Safety Assurance Framework for IoT-Based Smart Homes
    Kabir, Sohag
    Gope, Prosanta
    Mohanty, Saraju P.
    IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2023, 59 (01) : 6 - 14
  • [28] Real-Time Deep Anomaly Detection Framework for Multivariate Time-Series Data in Industrial IoT
    Nizam, Hussain
    Zafar, Samra
    Lv, Zefeng
    Wang, Fan
    Hu, Xiaopeng
    IEEE SENSORS JOURNAL, 2022, 22 (23) : 22836 - 22849
  • [29] A Lightweight Authentication and Authorization Framework for Blockchain-Enabled IoT Network in Health-Informatics
    Tahir, Muhammad
    Sardaraz, Muhammad
    Muhammad, Shakoor
    Khan, Muhammad Saud
    SUSTAINABILITY, 2020, 12 (17)
  • [30] A Real-Time Biometric Encryption Scheme Based on Fuzzy Logic for IoT
    Moradi, Masoud
    Moradkhani, Masoud
    Tavakoli, Mohammad Bagher
    JOURNAL OF SENSORS, 2022, 2022