IoT Sensor Initiated Healthcare Data Security

被引:27
作者
Besher, Kedir Mamo [1 ]
Subah, Zareen [1 ]
Ali, Mohammed Zamshed [1 ]
机构
[1] Univ Texas Dallas, Dept Elect & Comp Engn ECE, Richardson, TX 75080 USA
关键词
Medical services; Sensors; Cloud computing; Encryption; Data communication; IoT; cybersecurity; healthcare; encryption; networks; end-to-end; privacy;
D O I
10.1109/JSEN.2020.3013634
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
While the Internet of Things (IoT) has been instrumental in healthcare data transmission, it also presents vulnerabilities and security risks to patients' personalized health information for remote medical treatment. Currently most published security solutions available for healthcare data are not focused on data flow all the way from IoT sensor devices placed on a patient's body through network routers to doctor's offices. In this paper, we studied how the IoT network facilitates healthcare data transmission for remote medical treatment, explored security risks associated with unsecured data transmission, especially between IoT sensor devices and network routers, and then proposed an encrypted security solution initiated at IoT sensor devices. Our proposed solution provides a cryptography algorithm embedded into the sensor device such that the packets generated with patient's health data are encrypted right at the sensor device before being transmitted. The proof of concept has been verified using a lab setup with two level encryption at the IoT sensor level and two level decryption at the receiving end at the doctor's office. Test results are promising for an end-to-end security solution of healthcare data transmission in IoT. This paper also opens up further research avenues on IoT sensor driven security.
引用
收藏
页码:11977 / 11982
页数:6
相关论文
共 11 条
[1]  
Al Haddad Andre, 2017, 2017 Conference on Lasers and Electro-Optics Europe & European Quantum Electronics Conference (CLEO/Europe-EQEC), DOI 10.1109/CLEOE-EQEC.2017.8087761
[2]   Prioritizing Health Care Data Traffic in a Congested IoT Cloud Network [J].
Beitelspacher, Sara ;
Mubashir, Mohammad ;
Besher, Kedir Mamo ;
Ali, Mohammed Zamshed .
2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2020,
[3]  
Djenna A, 2018, 2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET)
[4]  
Markakis E, 2019, 2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P91, DOI [10.1109/wf-iot.2019.8767249, 10.1109/WF-IoT.2019.8767249]
[5]  
Nausheen F, 2018, PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), P517, DOI 10.1109/ICISC.2018.8399126
[6]  
Rizk D, 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P227, DOI [10.1109/isi.2019.8823430, 10.1109/ISI.2019.8823430]
[7]  
RSS, IOT EXPL DOES IOT SY
[8]   Technologies and Challenges for Cognitive Radio Enabled Medical Wireless Body Area Networks [J].
Sodagari, Shabnam ;
Bozorgchami, Bahareh ;
Aghvami, Hamid .
IEEE ACCESS, 2018, 6 :29567-29586
[9]   Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare [J].
Tao, Hai ;
Bhuiyan, Md Zakirul Alam ;
Abdalla, Ahmed N. ;
Hassan, Mohammad Mehedi ;
Zain, Jasni Mohamad ;
Hayajneh, Thaier .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :410-420
[10]  
Vashi S, 2017, 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), P492, DOI 10.1109/I-SMAC.2017.8058399