Privacy in the Internet of Things for Smart Healthcare

被引:88
作者
He, Daojing [1 ]
Ye, Ran [1 ]
Chan, Sammy [2 ]
Guizani, Mohsen [3 ]
Xu, Yanping [4 ]
机构
[1] East China Normal Univ, Sch Comp Sci & Software Engn, Shanghai, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
[3] Univ Idaho, Elect & Comp Engn Dept, Moscow, ID 83843 USA
[4] Hangzhou Dianzi Univ, Hangzhou, Zhejiang, Peoples R China
基金
美国国家科学基金会; 国家重点研发计划;
关键词
Internet of things - Authentication - Health care - Real time systems - Wearable technology;
D O I
10.1109/MCOM.2018.1700809
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of wearable biosensors and wireless communication technologies, various smart healthcare systems are proposed to monitor the health of patients in real time. However, many security problems exist in these systems. For example, a password guessing attack can compromise IoT devices, leading to invasion of health data privacy. After giving an overview of security threats of healthcare IoT, this article studies security vulnerabilities of password building and presents a password strength evaluation method that takes into account users' personal information.
引用
收藏
页码:38 / 44
页数:7
相关论文
共 14 条
[1]  
[Anonymous], 2017, HLTH TECHNOL BERL
[2]  
[Anonymous], 2016, 87 MICR MEAS C ARFTG
[3]   Integration of Cloud computing and Internet of Things: A survey [J].
Botta, Alessio ;
de Donato, Walter ;
Persico, Valerio ;
Pescape, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :684-700
[4]  
Castelluccia Claude, 2012, Privacy Enhancing Technologies. Proceedings 12th International Symposium, PETS 2012, P1, DOI 10.1007/978-3-642-31680-7_1
[5]   A Large-Scale Evaluation of High-Impact Password Strength Meters [J].
De Carnavalet, Xavier De Carne ;
Mannan, Mohammad .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 18 (01) :1-32
[6]   Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges [J].
Gravina, Raffaele ;
Alinia, Parastoo ;
Ghasemzadeh, Hassan ;
Fortino, Giancarlo .
INFORMATION FUSION, 2017, 35 :68-80
[7]   An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order [J].
Gross, Hannes ;
Mangard, Stefan ;
Korak, Thomas .
TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 :95-112
[8]  
Hyunmin Kim, 2017, 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). Proceedings, P74, DOI 10.1109/ISVLSI.2017.22
[9]   Advanced social engineering attacks [J].
Krombholz, Katharina ;
Hobel, Heidelinde ;
Huber, Markus ;
Weippl, Edgar .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 :113-122
[10]  
Li Y., 2016, PROC IEEE INFOCOM 20, P1242