A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process

被引:76
作者
Gope, Prosanta [1 ]
Gheraibia, Youcef [2 ]
Kabir, Sohag [3 ]
Sikdar, Biplab [4 ]
机构
[1] Univ Sheffield, Dept Comp Sci, Sheffield S10 2TG, S Yorkshire, England
[2] Univ York, Dept Comp Sci, York YO10 5DD, N Yorkshire, England
[3] Univ Bradford, Dept Comp Sci, Bradford BD7 1DP, W Yorkshire, England
[4] Natl Univ Singapore, Singapore 119077, Singapore
关键词
Internet of Things; Medical services; Decision making; Monitoring; Authentication; Informatics; IoT; Healthcare; machine learning; fault tolerance; sensor fusion;
D O I
10.1109/JBHI.2020.3007488
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of Internet of Things (IoT) has escalated the information sharing among various smart devices by many folds, irrespective of their geographical locations. Recently, applications like e-healthcare monitoring has attracted wide attention from the research community, where both the security and the effectiveness of the system are greatly imperative. However, to the best of our knowledge none of the existing literature can accomplish both these objectives (e.g., existing systems are not secure against physical attacks). This paper addresses the shortcomings in existing IoT-based healthcare system. We propose an enhanced system by introducing a Physical Unclonable Function (PUF)-based authentication scheme and a data driven fault-tolerant decision-making scheme for designing an IoT-based modern healthcare system. Analyses show that our proposed scheme is more secure and efficient than existing systems. Hence, it will be useful in designing an advanced IoT-based healthcare system.
引用
收藏
页码:862 / 873
页数:12
相关论文
共 38 条
  • [21] Ng J. W., 2004, P 6 INT C UB COMP UB, P1
  • [22] Activity classification using realistic data from wearable sensors
    Pärkkä, J
    Ermes, M
    Korpipää, P
    Mäntyjärvi, J
    Peltola, J
    Korhonen, I
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2006, 10 (01): : 119 - 128
  • [23] Rogaway P., 2003, ACM Transactions on Information and Systems Security, V6, P365, DOI 10.1145/937527.937529
  • [24] Sengupta Sushanta, 2020, Emerging Technology in Modelling and Graphics. Proceedings of IEM Graph 2018. Advances in Intelligent Systems and Computing (AISC 937), P501, DOI 10.1007/978-981-13-7403-6_44
  • [25] Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks
    Shuai, Mengxia
    Liu, Bin
    Yu, Nenghai
    Xiong, Ling
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019,
  • [26] Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review
    Shuwandy, Moceheb Lazam
    Zaidan, B. B.
    Zaidan, A. A.
    Albahri, A. S.
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (02)
  • [27] SPURIOUS CORRELATION - A CAUSAL INTERPRETATION
    SIMON, HA
    [J]. JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 1954, 49 (267) : 467 - 479
  • [28] An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
    Sowjanya, K.
    Dasgupta, Mou
    Ray, Sangram
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (01) : 129 - 146
  • [29] Subasi A, 2018, 2018 15TH LEARNING AND TECHNOLOGY CONFERENCE (L&T), P29, DOI 10.1109/LT.2018.8368507
  • [30] Physical unclonable functions for device authentication and secret key generation
    Suh, G. Edward
    Devadas, Srinivas
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 9 - +