Privacy in the Internet of Things for Smart Healthcare

被引:86
作者
He, Daojing [1 ]
Ye, Ran [1 ]
Chan, Sammy [2 ]
Guizani, Mohsen [3 ]
Xu, Yanping [4 ]
机构
[1] East China Normal Univ, Sch Comp Sci & Software Engn, Shanghai, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
[3] Univ Idaho, Elect & Comp Engn Dept, Moscow, ID 83843 USA
[4] Hangzhou Dianzi Univ, Hangzhou, Zhejiang, Peoples R China
基金
美国国家科学基金会; 国家重点研发计划;
关键词
D O I
10.1109/MCOM.2018.1700809
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of wearable biosensors and wireless communication technologies, various smart healthcare systems are proposed to monitor the health of patients in real time. However, many security problems exist in these systems. For example, a password guessing attack can compromise IoT devices, leading to invasion of health data privacy. After giving an overview of security threats of healthcare IoT, this article studies security vulnerabilities of password building and presents a password strength evaluation method that takes into account users' personal information.
引用
收藏
页码:38 / 44
页数:7
相关论文
共 14 条
  • [1] [Anonymous], 2017, HLTH TECHNOL BERL
  • [2] [Anonymous], 2016, 87 MICR MEAS C ARFTG
  • [3] Integration of Cloud computing and Internet of Things: A survey
    Botta, Alessio
    de Donato, Walter
    Persico, Valerio
    Pescape, Antonio
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 : 684 - 700
  • [4] Castelluccia Claude, 2012, Privacy Enhancing Technologies. Proceedings 12th International Symposium, PETS 2012, P1, DOI 10.1007/978-3-642-31680-7_1
  • [5] A Large-Scale Evaluation of High-Impact Password Strength Meters
    De Carnavalet, Xavier De Carne
    Mannan, Mohammad
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 18 (01) : 1 - 32
  • [6] Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges
    Gravina, Raffaele
    Alinia, Parastoo
    Ghasemzadeh, Hassan
    Fortino, Giancarlo
    [J]. INFORMATION FUSION, 2017, 35 : 68 - 80
  • [7] An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
    Gross, Hannes
    Mangard, Stefan
    Korak, Thomas
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 95 - 112
  • [8] Hyunmin Kim, 2017, 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). Proceedings, P74, DOI 10.1109/ISVLSI.2017.22
  • [9] Advanced social engineering attacks
    Krombholz, Katharina
    Hobel, Heidelinde
    Huber, Markus
    Weippl, Edgar
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 (113-122) : 113 - 122
  • [10] Li Y., 2016, PROC IEEE INFOCOM 20, P1242